Precisez la nature de l'information logique ou analogique pour chaque exaple ci dessous

Answers

Answer 1

Answer:

Bonjour pourriez vous m'aider svp ?

Précisez la nature de l'information (logique ou analogique pour chaque exemple ci dessous:

a) poids

b) conformité d'une pièce de monnaie

c) niveau d'eau dans une bouteille

d)porte ouverte ou fermée

e) force de pression

f) présence d'une personne dans une pièce

g)position angulaire

h) température inférieur ou supérieur à 15°C

i) vitesse du vent

j) présence de matériaux métallique à proximité


Related Questions

A file named "dogs. Txt" exists and has 60 lines of data. You open the file with the following line of code.

aFile = open("games. Txt", "W")

You write 10 lines to the file in the program. How many lines are in the file when you close your file?

Answers

The wc command can be used to determine a file's line, character, word, and byte counts. We add the -l option to wc in order to count the number of lines. This will provide the file's name and the total amount of lines.

What lines are in the file when you close your file?

This is the simplest method for counting the lines in a text file in Python. Read all lines from a file and save them in a list using the readlines() function.

The length of the list, which is simply the total number of lines in a file, may then be determined using the len() function.

To see a file's initial few lines, use the head command. The head command will only print the first 10 lines by default. The coreutils package.

Therefore, already installed on our machine, is included with the head command. Be aware that spaces, tabs, and newlines all count as additional bytes.

Learn more about file here:

https://brainly.com/question/16379582

#SPJ2

A _____ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

Answers

Answer:

A host-based intrusion prevention system is a type of IDPS that monitors characteristics of a single host and the events occurring within that host for suspicious activity (NIST SP 800-94, February 2007; p.9). Page 3 National Archives and Records Administration

Explanation:

What is meaning of lunch bar

Answers

A lunch bar is a restaurant where the public may purchase cold meals in containers, cold wrapped sandwiches, drinks, or items retrieved through coin operated compartments for consumption on or off the premises.

What should you do when you are working on an unclassified system and receive an email.

Answers

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

What is the type of data in the list [103, 405, 527, 396, 503]?

A.
Booleans
B.
strings
C.
integers
D.
alphanumeric

Answers

D. Alphanumeric.

Alphanumeric, also known as alphameric, simply refers to the type of Latin and Arabic characters representing the numbers 0 - 9, the letters A - Z (both uppercase and lowercase), and some common symbols such as @ # * and &.

Hope Helps! :)

3. credence is a student in college.
a. what hardware tool would you suggest for his computing system? include an explanation and the cost.

b. what software program would you suggest? include an explanation and the cost.


c. what operating system might you suggest (mac, windows, ios, android, etc) and why?

Answers

Answer: Hardware info this is a free software to read your CPU RAM GPU temp and usage

i would suggets get win rar as a zip un packer and its free

Windows 10, easy to work with and its free

Explanation:

There are they mainly are the suggested the computer system are the RAM, CPU, are the add-on the cost. Adobe, was the mainly in the used are the no cost was the included. Windows 10, was the repeatedly in the used are the easy.

What is computer?

The term computer refers to the main work of the input, processing, and the output. The computer was the based on the binary language as the data was the converted to the human language. The computer was the great invention. The computer is the mostly in the used are the main purposes.

Hardware was the main tool in the computer they are the mainly in the RAM, CPU, are the usage was the add-on the cost. The best software program was the Adobe is the best software there are the no cost was the included. The Windows 10 was the easy to use and the systematically programme.

Learn more about on computer, here:

https://brainly.com/question/21080395

#SPJ5

Why is math in coding so hard
HELPPP PLEASEEE

Answers

I cannot solve this problem for you, But I will try my best to help you.

An image sprite component is an animated object that can interact with a canvas, balls, and other image sprites.

A 'sprite' that can be placed on a Canvas, where it can react to touches and drags, interact with other sprites (Balls and other ImageSprites) and the edge of the Canvas, and move according to its property values. Its appearance is that of the image specified in its Picture property (unless its Visible property is False.

To have an ImageSprite move 10 pixels to the left every 1000 milliseconds (one second), for example, you would set the Speed property to 10 [pixels], the Interval property to 1000 [milliseconds], the Heading property to 180 [degrees], and the Enabled property to True. A sprite whose Rotates property is True will rotate its image as the sprite's Heading changes. Checking for collisions with a rotated sprite currently checks the sprite's unrotated position so that collision checking will be inaccurate for tall narrow or short wide sprites that are rotated. Any of the sprite properties can be changed at any time under program control.

Understanding this will help you a lot when it comes to this problem.

Which components exist in the contextual tab for tables called Design? Check all that apply. Table Styles Export Table Data Properties Tools Banded Rows External Table Data Table Style Options

Answers

Answer: table styles, properties, tools, external table data, table style options

Explanation: i took the assignment

The components that exist in the contextual tab for tables called Design are table styles, properties, tools, and external table data. The correct options are a, c, d, and f.

What are contextual tabs?

A contextual tab is a concealed tab regulation in the Office ribbon that appears in the tab row when a specific event in the Office document occurs. For example, when a table is selected, the Table Design tab appears on the Excel ribbon.

Contextual tabs appear in Excel when you create or edit an object such as a chart, table, or diagram. The contextual tabs provide you with the options and tools you need to work with these objects, and when you exit the object, the tools are removed.

Therefore, the correct options are a, c, d, and f. Table styles, properties, tools, and external table data.

To learn more about contextual tabs, refer to the below link:

https://brainly.com/question/26680062

#SPJ2

How has the Internet of Things affected business

Answers

Answer:

With better information about the consumers and the market, the productivity of any business can be increased notably. IoT devices can be connected to each other and controlled to improve efficiency, which in turn has direct effects on the productivity of the business. More can be done in less time.

Explanation:

Answer: Business equipment can be continually adjusted based on analysis of data

Explanation: Took the test.

Special web browsers, called _______ browsers, are designed to run on portable devices such as smartphones and tablets

Answers

Answer:

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets.

Mobile browsers are web browsers specifically optimized and designed to operate on portable devices such as smartphones and tablets. These browsers are tailored to meet the unique requirements and constraints of mobile devices, including smaller screens, touch-based input, and limited processing power.

Mobile browsers offer a user-friendly interface that accommodates the smaller screen size of mobile devices, allowing users to navigate websites and access web content efficiently. They often incorporate features like pinch-to-zoom, gesture-based controls, and responsive design support to enhance the browsing experience on mobile devices

To learn more on Mobile browsers click:

https://brainly.com/question/19561587

#SPJ6

How can I log Into the instagram app if this pop up appears?

Answers

Answer:

tou sex die sojdifnfidjd7dhubdud

You could try changing your password

You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

Answers

Parse Int() is a(n) static method because you use it with the class name and not with an object.

Is parseInt a static method?

The term or computer language (Java - parse Int() Method) is known to be a method that is often used to get back the primitive data type of a particular String.

Conclusively, the  parse Xxx() is known to be a static method and one can use it to make or have one or more argument.

Learn more about object from

https://brainly.com/question/24445340

1.5 code practice question 4

Answers

Answer:

Do you know what the question is for this?

Explanation:

Do you know What the question is?

_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted

Answers

Answer:

Passive attacks

Explanation:

A passive attack can listen to network traffic but does not interact with the packets.

Hope this helps :)

how do i use marketing in my everyday life

Answers

1. Subscribe to more emails
2. Look at billboards
3. Stop muting those pesky commercials
4. Listen to music
5. Step away from your work

Imagine that a school decided to use a database to track television shows that students are watching. What would be some of the advantages and disadvantages of tracking students in this way? what is something to type? please hurry

Answers

Answer:

It would cause a discussion upon privacy and the validity of the information

There is also the variable of watching multiple tv shows consecutively on one day. Hope this helped

Explanation:

You're going to be mowing lawns as a summer job. How long will it take for your
hearing to be damaged without hearing protection?

1. Less than 15 mins

2. 1 hour

3. 4 hours

4. There is no hearing damage risk

Answers

hshshshhshshs 3. 4 hours

It would take 4 hours for your hearing to be damaged without hearing protection.

Personal protective equipment (PPE) are equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses. Personal protective include items such as gloves, safety glasses and shoes, earplugs or muffs.

The sound of a lawn mower has a decibel level of 90dB. Hence, hearing begins to be damaged after 4 hours of exposure to this sound.

Find out more at: https://brainly.com/question/18003651

Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance

Answers

You should engage a professional for assistance when you encounter internal hardware issues during troubleshooting.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, an end user should always engage a professional for assistance when internal hardware components of a computer are faulty.

Read more on computer here: brainly.com/question/959479

Question 38 of 40
What is efficiency?
A. Doing more than one task at a time
B. The activity of selecting what to do next
C. A measure of output for any given project, task, or activity
D. The ability to do something well without wasted time or effort

Answers

Answer:

The answer should be d i think.

Consider the following code, which is a portion of SomeClass. The instance variable is initialized by the constructor. The method is supposed to multiply the value passed as a parameter by the instance variable and update the value of the instance variable. However, there is a problem. Re-write this code, without renaming any variable names, to resolve the problem.

private int number;

public void multiplyNumbers(int number)

{

number = number * number;

System. Out. Println("The local variable is: " + number);

System. Out. Println("The instance variable is: " + number);

}

Answers

Use the knowledge of computational language in JAVA to write a code which is a portion of SomeClass.

How to write code that uses a file?

To make it simpler the code is described as:

SomeClass

private int number;

public void subtractNumbers(int number)

{

   number = number − number;

   System.out.println("The local variable is: " + number);

   System.out.println("The instance variable is: " + number);

}

See more about Java at  brainly.com/question/2266606

Answer:

Correct code (For everyone confused):

private int number;

public void multiplyNumbers(int number) {

 this.number = this.number * number;
 System.out.println("The local variable is: " + number);
 System.out.println("The instance variable is: " + this.number);

}

Explanation:

the this. command allows the instance variable of the class to be called instead of the variable in the constructor which as shown can stay the same while still changing the instance variable of the same name. Allowing for the code to be, say if int number was 5. Then the instance variable would be, 5 + 5, which would print:

The local variable is: 5
The instance variable is: 10

What is the relationship of temperature to density?

Answers

Answer:

Density is directly proportional to pressure and indirectly proportional to temperature. As pressure increases, with temperature constant, density increases. Conversely when temperature increases, with pressure constant, density decreases.

Which command prints partial or full environment variables?.

Answers

Answer:

printenv command

The command that prints partial or full environment variables is known as "printenv" command.

How can one print all the variables of the environment?

One can definitely print all the variables of the environment with the help of using env command. This env command is generally utilized by shell scripts in order to launch the correct interpreter but you can also use the env command to list available environment variables.

The env command if applied without any arguments and options, will print all the available environment variables. Apart from this, the env command also displays the values of environment variables specified in the context of the question.

Therefore, the "printenv" command is a type of command that prints partial or full environment variables.

To learn more about Computer commands, refer to the link:

https://brainly.com/question/25808182

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which command prints partial or full environment variables?

printenv.printvar.printgov.


Explain the Paragraph tag and its attributes.

Answers

Answer:

Attribute Value Description

align left right center justify Obsolete Specifies the horizontal alignment of the text within a paragraph. Use the CSS text-align property instead.

What is.the web usually called?

Answers

Answer:

the internet?

Explanation:

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Answers

Coding:

def main():

 name = input("Enter your name: ")

 age = input("Enter your age: ")

 color = input("Enter you favorite color: ")

 birth = input("Enter your birthday: ")

 print(name + " is "+age+" year(s) old.")

 print(name + "'s favorite color is "+color)

 print(name + " was born on "+ birth)

main()

Explanation:

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

difference between manual formatting and formatting in word processor​

Answers

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers, copy and paste or undo redo features.

Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

what is meant by internet surveillance?....ONLY ANSWER IF YOU KNOW​

Answers

Answer:

As a brief definition, Internet surveillance refers to your computer and online activity, online and offline data, and Internet traffic being monitored and logged by government agencies, ISPs, and – potentially – cybercriminals.

Explanation:

can I have brainliest

Answer: I LIKE EM BIG AND JUCIY

Explanation:

I need help please I just need the code to pass

Answers

Answer:

I don't know where is a code on your computer so sorry. :(

Explanation:

How does iteration help the engineering design process?

A.
It lets engineers know how to complete their experiments.

B.
It provides proof positive that an engineer’s plan will work.

C.
It encourages engineers to revisit past steps in the process.

D.
It ensures that all ideas or discoveries are communicated clearly.

Answers

The way that iteration helps the engineering process is that; C.

It encourages engineers to revisit past steps in the process.

What is the importance of the iteration process?

The engineering design process contains a series of steps that helps engineering teams in solving problems.

When we say that design process is iterative, it means that we repeat the steps as many times as required, by making improvements along the way as we learn from previous failure and uncover new design possibilities that help us to arrive at great solutions.

Read more about iteration at; https://brainly.com/question/24793921

Other Questions
Suppose that $2000 is invested at a rate of 3.2%, compounded quarterly. Assuming that no withdrawals are made, find the total amount after 3 years. Round to the nearest cent. (please no links) -2+3x=16what is x equal to 3) A certain medication is prescribed based on the patient's weight at 3mg forevery 20 pounds. How many milligrams of medication would you give a patientwho weighs 180 pounds? 20 points!! Which of statements about the skateboarder's energy is true?As he travels from the top of the ramp to the bottom, KE turns into PE.As he travels from the bottom of the pipe to the top, KE turns into PE.The PE is the greatest at the bottom of the ramp. help me and thanks hans for all the help how many kilograms are in 3650 grams? Identify five elements of good citizenship in Kenya.5m If a fair coin is tossed 4 times, what is the probability, rounded to the nearest thousandth, of getting at least 2 tails? When a cat drops from a tree to the ground, the conversion of takes place. Then cat runs up behind a mouse to obtain its food. After eating its prey, the conversion of takes place inside the cats body Read the following excerpt from Jonathan Swift's "A Modest Proposal":I do therefore humbly offer it to public consideration, that of the hundred and twenty thousand children, already computed, twenty thousand may be reserved for breed, whereof only one fourth part to be males; which is more than we allow to sheep, black cattle, or swine; and my reason is, that these children are seldom the fruits of marriage, a circumstance not much regarded by our savages, therefore, one male will be sufficient to serve four females. That the remaining hundred thousand may, at a year old, be offered in sale to the persons of quality and fortune, through the kingdom, always advising the mother to let them suck plentifully in the last month, so as to render them plump, and fat for a good table. A child will make two dishes at an entertainment for friends, and when the family dines alone, the fore or hind quarter will make a reasonable dish, and seasoned with a little pepper or salt, will be very good boiled on the fourth day, especially in winter. I have reckoned upon a medium that a child just born will weigh 12 pounds, and in a solar year, if tolerably nursed, encreaseth to 28 pounds. I grant this food will be somewhat dear, and therefore very proper for landlords, who, as they have already devoured most of the parents, seem to have the best title to the children. How does the author's word choice in this excerpt imply a message other than the one explicitly stated? Analyze specific phrases within the excerpt and explain how they help the writing to function as satire. Support your answer with evidence from this excerpt and from your general knowledge of "A Modest Proposal E-12 slipped from his bunk and placed his palm on the scanner, Arobotic voice barked out his instructions for the day, he would beworking in the mines again. He hurried down to breakfast, hoping hisweigh-in would warrant a few extra ounces of oatmeal, but themachine dispensed the usual 6.5 ounces into his bowl. It was hard tobelieve there had ever been a time when humans controlled thecomputersWhich statement describes the most likely historical and cultural context ofthe passage?A. A poor boy living in England before the industrial RevolutionB. An enslaved boy living at a special boarding schoolC. An American boy living in outer spaceD. A working class boy living in a future setting can someone answer this question plsss I'm late What were the conditions Mexico asked Americans to follow under the Texas Settlement Program? What is the slope?Find the slope of the line in the graph. Assignment 1. Define Couple? Can someone please help me ? :( How does the berg winds affect the rate of unemployment in Cape Town You lift your pet cat vertically by 2.0 m, andthen you lower it vertically by 2.0 m. During thisexercise, is the total work done by gravity positive,negative, or zero? Explain your answer. Sebastian started watching a movie at 17:30.The movie was 1 hour and 54 minutes long, but part-waythrough he paused it for 13 minutes.What was the time when the movie finished?Give your answer using the 24 hour clock. What are renewable resources?