Answer:graphics card
Explanation:
Answer:
graphics card
Explanation:
Which artistic technique uses multiple layers of small calligraphic or scribbled marks?
A. random hatching
B. crosshatching
C. shading
D. stippling
E. scrumbling
Answer:
E. scrumbling
Explanation:
Write a python program that gets a number using keyboard input. If the number is positive, the program should call countdown
Answer:
def countdown():
print("This is countdown")
number = int(input("Enter number: "))
if (number > 0):
countdown()
Explanation:
This is literally what you asked, but what is the purpose?
Which term describes the surrounding area of this image?
The surrounding area of this image is called
Surroundings
Foreground
Background
This area is also called a
Negative
Positive
Neutral
Answer: background/negative
Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.
What are the inputs and outputs of the app "Spotify"?
Hey the I/O for Spotify would be. for I or input keyboard and mouse.
and for O or output the sound files being sent from the server to the pc
Hope this helps.
-Toby aka scav
Answer:
Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.
Explanation:
6n^3+n-2 C++ code using Dev
i need only the code
Answer:
A = 6*pow(n,3) +n - 2
Explanation:
I'm not sure if this what you need but that's what I can help you with :)
Advantages of special purpose computer
Answer:
The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..
Explanation:
Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example
Answer:
ex. telling your children if you clean up you get new toys
Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Write the definition of the function double Array that initializes the elements of beta to two times the corresponding elements in alpha. Make sure that you prevent the function from modifying the elements of alpha. Write the definition of the function copy AlphaBeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. Make sure that you prevent the function from modifying the elements of alpha and beta. Write the definition of the function printArray that prints any one-dimensional array of type int. Print 15 elements per line.
Answer:
In Java:
public static int[] inputArray(){
Scanner input = new Scanner(System.in);
int[] alpha = new int[20];
for(int i = 0;i<20;i++){
alpha[i] = input.nextInt();
}
return alpha;}
public static int[] doubleArray(int [] alpha){
int[] beta = new int[20];
for(int i = 0;i<20;i++){
beta[i] = 2 * alpha[i];
}
return beta;
}
public static int[] copyAlphaBeta(int [] alpha, int [] beta){
int [] AlphaBeta = new int[10];
for(int i = 0;i<5;i++){
AlphaBeta[i] = alpha[i];
}
int count = 5;
for(int i = 15;i<20;i++){
AlphaBeta[count] = beta[i];
count++;
}
return AlphaBeta;
}
public static void printArray(int [] alpha){
for(int i = 0;i<20;i++){
System.out.print(alpha[i]+" ");
if((i+1)%15 == 0){
System.out.println(" ");
}
}
}
Explanation:
The inputArray is defined here
public static int[] inputArray(){
Scanner input = new Scanner(System.in);
This declares alpha array of 20 elements
int[] alpha = new int[20];
The following iteration gets input from the user into the array
for(int i = 0;i<20;i++){
alpha[i] = input.nextInt();
}
This returns the alpha array
return alpha;}
The doubleArray is defined here. It takes the alpha array as its input parameter
public static int[] doubleArray(int [] alpha){
This declares beta of 20 integers
int[] beta = new int[20];
This populates beta by 2 * alpha[i]
for(int i = 0;i<20;i++){
beta[i] = 2 * alpha[i];
}
This returns the alpha array
return beta;}
The copyAlphaBeta array is defines here
public static int[] copyAlphaBeta(int [] alpha, int [] beta){
This declares AlphaBeta as 10 elements
int [] AlphaBeta = new int[10];
This populates the first 5 elements of AlphaBeta with the first 5 of alpha
for(int i = 0;i<5;i++){
AlphaBeta[i] = alpha[i];
}
int count = 5;
This populates the last 5 elements of AlphaBeta with the last 5 of beta
for(int i = 15;i<20;i++){
AlphaBeta[count] = beta[i];
count++;
}
This returns the AlphaBeta array
return AlphaBeta;
}
The printArray is defined here. It takes the alpha array as its input parameter
public static void printArray(int [] alpha){
This iterates through alpha array
for(int i = 0;i<20;i++){
This prints each element of the array
System.out.print(alpha[i]+" ");
A new line is started after the 15th element
if((i+1)%15 == 0){
System.out.println(" ");
}
}
}
See attachment for complete program which includes the main
Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.
You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?
Answer:
The responses to this question can be defined as follows:
Explanation:
Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.
name 20 input device
Answer:
I wish that is helpful
.........
Answer:
Some Input devices are;
KeyboardMouseLight penMicrophoneDocument scannerCharacter readerBar-Code readerTrack pointTouch padTrack ballDigital cameraMagnetic Ink Character readerMagnetic stripTouch screenAdd (11011)2 + (111)2
Answer:
(11011)2+(111)2=(100010)2
hope it helps.
Answer:
(100010)square is the correct answer Hope it helps you have a great day keep smiling be happy stay safe ☺
If columns are labelled alphabetically, what will be the label for the cell in row 1, column 16,384?
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Hope this helps!
2. BIOS is contained in ROM and not in RAM. Can you guess why?
Answer:
Because RAM is only used for short term storage (and doesn't contain anything that will need to be accessed often) RAM it loses its contents when turned off. So when you power on a computer, it has to start running bootup code which has to be stored in ROM
what, if anything, is returned by the method call rearrange ("apple")?
Answer:
[tex] \boxed{E} \to \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}[/tex]
Given the following table of students, assignments, and grades for a single class:
Student_ID
Student_Name
Assignment_1_Date
Assignment_1_Name
Assignment_1_Grade
Assignment_2_Date
Assignment_2_Name
Assignment_2_Grade
Assignment_3_Date
Assignment_3_Name
Assignment_3_Grade
1011
Susan J. Smith
2015-06-01
Homework - Chapter Seven
76
2015-06-05
Chapter 7 Quiz
88
2015-06-12
Homework – Chapter 8
A
2332
Jones, Jamal K.
2015-06-01
Homework - Chapter Seven
84
2015-06-05
Quiz – Chapter 7
89
2015-06-12
Homework – Chapter 8
95
3432
Brown, Ronald
2015-06-01
Homework - Chapter Seven
66
2015-06-05
Quiz – Chapter 7
78
2015-06-12
Homework – Chapter 8
B
5435
Killen, Katie
2015-06-01
Homework - Chapter Seven
97
2015-06-05
Chapter 7 – Quiz
95
2015-06-12
Homework – Chapter 8
94
7574
Powell, B.
2015-06-01
Homework - Chapter Seven
68
2015-06-05
Quiz – Chapter 7
89
9677
Pat Hayes
6/1/2015
Homework - Chapter Seven
89
2015-06-05
Quiz – Chapter 7
85
2015-06-12
Homework – Chapter 8
99
Examine the data in the table above and identify any columns that contain data inconsistencies. Place an X in the Consistent or Inconsistent column.
Answer:
i need more
Explanation:
i need more
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design
Answer:
C. object-oriented design
Explanation:
Answer:
c. object- oriented design.
Explanation:
i took the test.
This component of the CPU is responsible for fetching the data, converting it, and de-converting
A) ALU
B) RAM
C) Control Unit
D) None of the above
In CPU there are two components name ALU and CU(Control unit) which ALU's function is to solve mathematic sequence and CU fuction is to vetch data to memory and manage commands and input & output.
#See pic for how the data proceed
which among the following if absent, a computer is not complete.
A. mouse
B. DVD
C. user
D. projector
Answer:
user because all the other things the computer need
A data science experiment you are conducting has retrieved two historical observations for the price of Bitcoin(BTC) on December 2, 2017 of 11234 and 12475. Create a Python script that stores these two historicalobservations in a list variable namedbtcdec1.Your data science experiment requires four additional data tasks. The first task is to use the listappend()method to add the BTC price of 14560 to the listbtcdec1. The second task is to create a new empty listnamedbtcdec2and append the BTC prices of 15630, 12475, and 14972. The third task required you to usethe listextend()method to add the contents ofbtcdec2into the listbtcdec1. The fourth and final taskrequires you to use the listsort()method of the listbtcdec1to sort the items in the newly extended list,then use theprintstatement to output the content of listbtcdec1to the Python console.Starter code:_______.
Answer:
Following are the code to this question:
btcdec1=[11234, 12475] #defining a list btcdec1 that holds two integer values
btcdec1.append(14560)#using append method to add value in btcdec1 list
btcdec2=[]#defining an empty list btcdec2
btcdec2.append(15630)#using append method to add value in btcdec2 list
btcdec2.append(12475)#using append method to add value in btcdec2 list
btcdec2.append(14972)#using append method to add value in btcdec2 list
btcdec1.extend(btcdec2)#using the extend method to add value list into btcdec1
btcdec1.sort()#using sort method to arrange value in ascending order
print(btcdec1)#print list btcdec1
Output:
[11234, 12475, 12475, 14560, 14972, 15630]
Explanation:
In this code a list "btcdec1" is declared, which holds two integer variables, in the next step, it uses the append method to add another element into the list.
In the next step, another empty list "btcdec2" is declared, which uses the append method to hold the integer element, and uses the extend and sort method to add the second list into the first one and then sort the whole list and print its values.
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Answer:
kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h
Explanation:
Answer:
is this even a legit question
You work at a computer repair store. A customer wants you to install a new sound card into his computer to run his home theater system. Currently, the computer uses the sound card built into the motherboard. You need to upgrade the computer with a better sound card that installs into an expansion card slot. Your task is to complete the following:
a. Install the sound card with the optical output.
b. View the Details for each card to identify the card with an optical audio connector.
c. Boot into the BIOS and disable the onboard sound card.
d. Boot into Windows and verify that the new sound card is recognized and the onboard sound card does not appear in Device Manager.
Answer:
Explanation:
The following tasks are needed to complete the installation of the sound card so that it is fully usable.
a. and b. : First, you need to slot the sound card into a pci-e slot in the motherboard and connect the optical cable to the back of the sound card. You can look at the back of the card or the box to see if it has an optical audio connector slot.
c. Next you can boot into the Bios to disable the onboard sound card. Each motherboard is different but the usual way of entering the bios is pressing F12 when turning on the PC. Then navigate to the motherboard options tab/menu and turn off the onboard sound.
d. Finally, turn on the PC, log in and at the bottom left search bar type in Device Manager. Next navigate to sound, video and game controllers and make sure the new sound card is being detected.
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc
Which statement is true for slide or positive film?
A.
Slides or positive films give low color saturation and contrast.
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
C.
Slide or positive films cannot be used to digitize and scan pictures.
D.
Slide or positive films are useful for cheaper compact cameras.
Answer:
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
Explanation:
The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide or positive film.
Answer:
B
Explanation:
Select the correct answer.
The idea that different aspects of health influence each other is known as _____ .
A.
Holistic health
B.
Happy health
C.
Integral health
D.
Perfect health
Answer:
A. Holistic health
Explanation:
Holistic health refers to the method of caring the entire body. It includes physical, mental and emotional health of the individual. The overall health of an individual depends on the fitness of al these aspects of the body. The mind, body and the soul are considered to be interdependent and therefore the fitness of the body depends on the fitness of all of these parts.
Answer:
A
Explanation:
The definition of holistic is relating to the idea that things should be studied as a whole and not just as a sum of their parts. An example of holistic is health care that focuses on the health of the entire body and mind and not just parts of the body.
1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?
The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.
Some characteristics of OS are provided below:
Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.
Type of OS:
Distributed OS.Time-sharing OS.Batch OS.
Learn more about the operating system here:
https://brainly.com/question/2126669
1. Which of the following is used to operate computers and execute tasks?
A. Software
C. Update
B. Application
D. Upgrade
Answer:
a.software
I hope it hel
Combination of one or more columns used to identify particular rows in a relation is a (n)
Answer:
Combination of one or more columns used to identify particular rows in a relation is a key
A key is a combination of one or more columns that is used to identify particular rows in a relation.
KEYS in DBMS (database management system) is an attribute or set of attributes which helps you to identify a row in a relation(table). They allow you to find the relation between two tables.
Keys help you uniquely identify a row in a table by a combination of one or more columns in that table. Key is also helpful for finding unique record or row from the table.
Database key is also helpful for finding unique record or row from the table.
Find out more on DBMS at: https://brainly.in/question/1919695
where are all of your documents saved?
Answer:
create a my document folder so you can easily find it
Have you ever tried using such a camera?
Answer: yeah i mean i use my canon camera
Explanation:
A Zookeeper wants you to create a program to keep track of all of the animals in the zoo and people working for him. You are given 4 files: Mammals.txt, Birds.txt, Reptiles.txt, and Personnel.txt. Your task is to create an array of structs for each file to hold the entries. The first line of each file will be a number indicating how many entries are in the file.
Answer:
I don't know you should figure that out good luck
Explanation:
good luck