Answer:
b) evaluate the reliability of the source
Write the importance of cyber law? In point .
Answer:
Cyber law is important because it covers all aspects of transactions and behavior related to the internet, the worldwide web and cyberspace.it controls crimes that could pose a major threat to the security and financial health of nations.
Answer: Cyber law is important because It covers all the aspects of transactions and behavior by concerning the internet
Explanation:
Kali, a python programmer is using the turtle module to write the word hello, which code should she use to indicate the location to begin writing the word? A. # pick up the turtle and move it to it's starting location. B prenup (-100,200) Goto() Pendown() C. Penup() Goto(-100,200) Pendiente D. # pick up the turtle and move it to (-100,200)
Answer:
C:
penup()
goto(-100, 200)
pendown()
Explanation:
This is the correct syntax.
Option A is just a note since is has a #
Option B doesn't have the correct syntax.
Option C is also just a note
Thus, Option C is the correct option.
Answer:
Answer is C.
Explanation:
penup()
goto(-100, 200)
pendown()
Billy, a network programmer, asked his customer if he was having problems
connecting the node to the Internet. The customer looked confused about the
word "node." What did Billy mean by node?
O A. A new type of computer
O B. The devices connected to a network
O C. A security issue in the network
O D. A new software module
Answer:
the correct answer is,
B. The devices connected to a network
According to the question, the devices connected to a network are meant by the word "node." Thus, it's B.
What is a network?A network may be characterized as a series or sequences of computers that are generally sharing resources organized on or delivered by network nodes. Computers significantly utilize common communication protocols over digital interconnections in order to make a connection with each other.
The word "node" that is revealed by Billy to his customer accurately describes a series of devices that are more frequently connected to a network. He asked his customer if he was having problems connecting the node to the Internet. In response to this, his customer was immediately confused by this specific word.
Therefore, according to the question, the devices connected to a network are meant by the word "node." Thus, it's B.
To learn more about Network programmers, refer to the link:
https://brainly.com/question/28465761
#SPJ7
Explain the term criteria when building a query.
Answer:
A criteria in query is used to compare to query field values so as to determine whether to include the record that contains each value.
Explanation:
A criteria in query is used to compare to query field values so as to determine whether to include the record that contains each value. Query criteria is used to limit the result from a query retrieving only specific items.
Only when an item matches all the criteria can it be shown as a query results. Query criterias can be simple making use of basic operators and constants while some may be complex, and use functions, special operators,.
Positives and negatives side effects of government the stimulus check
Help pls☹️
Answer:
Stımulus check ıs the check offered to cıtızens of America inorder to help them to meet thier needs at that particular point in time. This is done, if there is an unforseen circumstances that made them not to earn an income.
Some of the postitves of stimulus check include:
1. Ability of the citizens to pay for their rent and other bills.
2. Ability to do some shopping and feeding
3. It create the sense of recognition among the citizens that the government always remember them in their moment of their needs.
4. To let the working class people know that their tax payment is used judiciously in helping other citizens.
The negative side effects of stimulus check include:
1. It makes people lazy since it is free money.
2. More money would be spent in the course of trying to meet the needs of everyone.
3. People would manipulate the system thereby getting more than one stimulus pay check.
4. Working class people would be angry with the system. This is because, they wil feel that all their hard work and taxes isbeing used to feed some lazy citizens who has never contributed anything to the country.
5. It would increase the debt profile of the government.
Explanation:
Middle question: computer science 7th grade
Answer:
i don't UNderstand why did they ask such a questions to a 7th grader
But here is the answer:
Brute Force to me is the simplest type of Hacking method.
in my opinion, bruteforcing is more useful when you do it to a person you personaly knows.
Wordlist: Wordlist is a file (made in notepad) that has many password that the attacker have guessed of the target. Wordlist is a dict file.
WIKIPEDIA DEFINES LIKE THIS: In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
Mark as BRAINLIEST If you are satisfied : )
Which objects appear on the slide after she clicks OK? Check all that apply.
A fully completed table
A fully completed chart
A table with blank values
A chart with blank values
A table with sample values
A chart with sample values
Answer:
table w samples and a chart w samples
Explanation:
Answer:
A table with sample values
A chart with sample values
Explanation:
Answers green checked on E.
How do I add winning conditions to this rock paper scissors code in python? Please keep it simple as I am not allowed to include code we have not learned yet.
import random
choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")
computer = random.randint(1, 3)
if computer == 1:
print("Computer played R.")
elif computer == 2:
print("Computer played P.")
else:
print("Computer played S.")
Answer:
You wanted simple, but i dodn't know how simple you wanted so I kept it as simple as possible, don't blame me if theres a bug.
Explanation:
import random
choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")
computer = random.randint(1, 3)
if computer == 1 and choice == "R":
print("Computer played Rock.")
print("Tie")
elif computer == 2 and choice == "P":
print("Computer played Paper.")
print("Tie")
elif computer == 3 and choice == "S":
print("Computer played Scissors.")
print("Tie")
elif computer == 1 and choice == "S":
print("Computer played Rock.")
print("You Lose")
elif computer == 2 and choice == "R":
print("Computer played Paper.")
print("You Lose")
elif computer == 3 and choice == "P":
print("Computer played Scissors.")
print("You Lose")
elif computer == 1 and choice == "P":
print("Computer played Rock.")
print("You Win")
elif computer == 2 and choice == "S":
print("Computer played Paper.")
print("You Win")
elif computer == 3 and choice == "R":
print("Computer played Scissor.")
print("You Win")
what does a student use when types text into a word processing program ?
Answer:
Computer Software
Explanation:
Computer software; s a set of instructions that tells a computer what to do or how to perform a task.
Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue
Some of the options in this question are not correct; here is the correct and complete question:
In order for a fictionalized story to be based on real events, the author should include
A. Characters with strong feelings
B. Historical material
C. A narrator
D. Dialogue
The correct answer is B. Historical material
Explanation:
Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.
According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.
In Asch’s study which of these lowered conformity rates
A.) having on person disagree
B.) having only two people in the group
C.) writing answers down instead of saying them
D.) all of these are correct
Answer:
D. all of these are correct
Explanation:
option d is correct answer
Which instruments do volcanologists use to predict volcanic eruptions?
A: Seismograph
B: Rain Gauge
C: Satellite
D: Airplane Equipped with Weather Devices
Answer:
A.) Seismograph
Explanation:
Scientists use seismographs to predict ground movement, which can cause earthquakes and volcanic eruptions
Hope this helps! Good luck!
Determine the speed of rotation of a 20- tooth gear when it is driven by a 40-tooth gear and rotating at 10 rpm
Answer:
20 rpm
Explanation:
if the lager tooth gear is moving a 10 rpm which will move slower than the smaller 20 tooth gear it will push it faster than the 10 rpm
what is syntax?
a. rules for using tags correctly in HTML
b. text containing hyperlinks that can go to other hypertext pages
c. information about how an element should be used by a web browser
d. text used to mark text or images on a webpage
Answer:
a
(would really appreciate the brainliest)
Answer- A: rules for using tags correctly in HTML.
Explanation: Correct on Edg 2020.
How does the team know what to work upon during the iteration? (1 correct answer)
1. The team participates in the iteration planning during which the Lead/Onsite coordinator/Facilitator decides who would work on that.
2. Based on the discussions during iteration planning, team members agree on what each would work on.
3. The Facilitator has regular interaction with the Product Owner. He/she guides the team on the tasks to be taken up.
4. Iteration plans are shared by Product Owner beforehand; any spill over from last iteration is taken up by default.
Answer:
2
Explanation:
In iteration, the entire team participates. A list of backlog and upcoming tasks is made and plan for the execution of these tasks is decided mutually.
Ryder has discovered the power of creating and viewing multiple workbooks. Ryder wants to use a layout in which the workbooks overlap each other with all the title bars visible. Ryder opens all of the workbooks, and then he clicks the View tab on the Ribbon and clicks the Arrange All button. What should he do next to obtain the desired layout?
Answer:
Click the Cascade option button
Explanation:
Based on the description of what Ryder is attempting to accomplish, the next step that he needs to do would be to Click the Cascade option button. This option will cause all the windows of the currently running applications to overlap one another but at the same time show their title bars completely visible in order to let the user know their open status. Which is exactly what Ryder is attempting to make as his desired layout for the workbooks. Therefore this is the option he needs.
Queries are a very useful object in a database, please explain why.
Answer:
they tell the producer what to do to make their website better
Explanation:
pls answer asap do not use internet
what are the differences and similarities between windows os and linux based os
Answer:
key differences between linux and windows operating system linux is free and open resource whereas windows is a commercial operating system whose source code is inaccessible windows is not customizable as against linux is customizable and a user can modify the code and can change it looks and feels
Explanation:
I hope this helps