Answer:
All of these actions contribute to recommendations you see online.
Which of the following is NOT correct?
A. Computer is capable of processing only
digital signals.
B. Appropriate software is required for
processing the data.
C. Computer is capable of processing digital
as well as analog signals.
D. Computer is capable of analyzing both
quantitative and qualitative data.
Answer:A
Explanation:
When reading electronic texts, it is important to _____.
a) set a purpose for research before reading
b) evaluate the reliability of the source
c) only read texts that support your own point of view
d) look for texts that have strong opinions on a subject
Answer:
b) evaluate the reliability of the source
Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.
Answer:
Redirection
Explanation:
This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.
Answer:
The ismap attribute is used in this case to identify the type of image map.
Explanation:
Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.
What invention do you wish existed during this quarantine? (I have to do a sales pitch for an invention in Spanish, the invention can be related to quarantine or after quarantine too.)
Answer:
Money
Explanation:
Car Insurance
Write the importance of cyber law? In point .
Answer:
Cyber law is important because it covers all aspects of transactions and behavior related to the internet, the worldwide web and cyberspace.it controls crimes that could pose a major threat to the security and financial health of nations.
Answer: Cyber law is important because It covers all the aspects of transactions and behavior by concerning the internet
Explanation:
What is the disadvantage of server based network?
Answer:
do u have different networks too?
Answer:
The disadvantage of server based network are:
If one of the servers go down all the users are affected and it may bring the whole network down.More expensive to set up and maintain.ExpensiveAdministrating specialist staff such as a network manager is needed.Ryder has discovered the power of creating and viewing multiple workbooks. Ryder wants to use a layout in which the workbooks overlap each other with all the title bars visible. Ryder opens all of the workbooks, and then he clicks the View tab on the Ribbon and clicks the Arrange All button. What should he do next to obtain the desired layout?
Answer:
Click the Cascade option button
Explanation:
Based on the description of what Ryder is attempting to accomplish, the next step that he needs to do would be to Click the Cascade option button. This option will cause all the windows of the currently running applications to overlap one another but at the same time show their title bars completely visible in order to let the user know their open status. Which is exactly what Ryder is attempting to make as his desired layout for the workbooks. Therefore this is the option he needs.
Trevor works for many different clients and creates a wide variety of business publications. Which two factors in the list below have the most influence over his layout designs? (multiple choice)
audience
color scheme
dynamic tension
goals
Answer:
• Audience
• Goals
Explanation:
Trevor works for many different clients and creates a wide variety of business publications. The two factors in the list below have the most influence over his layout designs are:
a) Audience
From the above question,we can see that Trevor creates different publications for different clients. This is because, the taste, wants or desires of each clients varies. It is not the same. Therefore, the layout of his publication is influence by the target audience that the publication is meant for.
For example, a client may want a publication with big fonts because the target audience who would be reading the publication are elderly people.
Another clients may want his publication designed with smaller fonts and a unique font style.
It is Trevor's duty to make sure that he caters to the needs his client's target audience by satisfying their desires, however different they may be.
b) Goals
The goals of the publication is one of the things that can influence the layout design of Trevor's publication. Let's take for example, a client is creating a publication to reach the teen society, probably a publication on pop music or fashion, this is the goal. Trevor would have to create the publication such that it attracts teens. The layout of the publication would have to come in catchy colours, interesting fonts, musical symbols that would catch the eye of teens and make them want to read such publication.
Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a ......
refracting telescope
reflecting telescope
refracting microscope
reflecting microscope
EXPLAIN WHY YOU CHOOSE THAT ANSWER
Answer:
He is using a REFLECTING TELESCOPE.
Explanation:
A telescope is an optical instrument that is used by scientists or astronomers to view objects that are very faraway such as objects that are in space. For example: the galaxies, the stars, the moon, the planet e.t.c.
The mode of operation of a telescope is, a telescope makes use of either a lens or mirrors which are curved. This lens or mirrors focus the light rays from the faraway objects and uses them to form an image.
We have two types of telescopes.
a. Refracting Telescope: Another name for a refracting telescope is a refractor. The refracting telescope uses a lens to focus the rays of light and form an image.
b. Reflecting telescope: This is also called a reflector. It is different from the refracting telescope because it makes use of curved mirrors to focus the rays of light and form an image. The images formed by reflecting telescopes are very big and clear. Those images are also free from any form of abberation such as chromatic abberation.
From the above question, Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a REFLECTING TELESCOPE. The reason for my answer is because it is said in the question that the optical device makes use of mirrors and it is only a reflecting telescope that uses mirrors.
A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft powerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?
Answer:
I think 128GB of storage would be fine.
Explanation:
It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.
Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come
Answer:
in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium
The evolution of the file system gave a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.
Explanation:
name two components required for wireless networking
(answer fastly)
Explanation:
User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...
Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.
or routers, repeaters, and access points
what is network topology
How was the addition of an improvement over early web design?
Webpages could finally incorporate tables into the design.
Webpage layout could finally format content blocks separately.
Webpage layouts were finally designed using HTML code.
Webpages could finally incorporate images as layout elements.
Answer- B: Webpage layout could finally format content blocks separately.
Explanation: Found it on Quizlet.
Answer:
Webpage layout could finally format content blocks separately.
Explanation: this the answer on edge.
John recently worked on a project about various programming languages. He learned that though procedural language programs are useful, they have disadvantages too. What is a disadvantage of programs written in procedural languages? A. Programs do not represent data complexity. B. Programs take more time to execute. C. Programs are prone to security threats. D. Programs do not interface with multiple platforms.
Answer:
Option A Programs do not represent data complexity.
Explanation:
In procedural languages like C, it doesn't support object oriented design that could encapsulate data in an object that entails a set of relevant attributes and methods which can represent an entity in real life better. This means the procedural language is limited by creating an object-like data structure that can represent data complexity. The procedural language only support the running a program by following a set of instructions in order.
Which of the following are peripherals?
Rasterize
Sneaker-net
Media access control
None of the above
Answer:
D
Explanation:
A peripheral or peripheral device is ancillary device used to put information into and get information out of the computer.
Answer: D
Explanation:
Find the error in the statement below.
if height_variable > 59;
print("You can ride this roller coaster.")
The opening parenthesis should be at the beginning of the second line.
The second line should not be indented.
The semi-colon should be a colon.
The > should be a <
Answer:
The semi-colon, should be a colon
Explanation:
The error in the statement below is a semi colon should be a colon.
What is error?Error is defined as a violation of a code of conduct due to ignorance or imprudence. A bug is a mistake in computer data. An mistake, flaw, failure, or fault in a computer program or system that results in it producing an inaccurate or unexpected result or behaving in an unexpected manner is known as a software bug.
The second line should begin with the opening parenthesis. There is no need to indent the second line. if the measurement tool or instrument is the same between the two operators. It's not required for two operators to produce results that are similar. There are three different sorts of faults: burst errors, multiple bit errors, and single bit errors.
Thus, the error in the statement below is a semi colon should be a colon.
To learn more about error, refer to the link below:
https://brainly.com/question/19575648
#SPJ5
1.
When did text messages over cell phones first begin to occur? |
I
it was first used on December 3rd, 1992
hope this helps
Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save
Answer:
Your answer is D.click the File tab, click Save As, type in the title, click Save
Explanation:
Answer:
C
Explanation:
took the quiz
Kali, a python programmer is using the turtle module to write the word hello, which code should she use to indicate the location to begin writing the word? A. # pick up the turtle and move it to it's starting location. B prenup (-100,200) Goto() Pendown() C. Penup() Goto(-100,200) Pendiente D. # pick up the turtle and move it to (-100,200)
Answer:
C:
penup()
goto(-100, 200)
pendown()
Explanation:
This is the correct syntax.
Option A is just a note since is has a #
Option B doesn't have the correct syntax.
Option C is also just a note
Thus, Option C is the correct option.
Answer:
Answer is C.
Explanation:
penup()
goto(-100, 200)
pendown()
Middle question: computer science 7th grade
Answer:
i don't UNderstand why did they ask such a questions to a 7th grader
But here is the answer:
Brute Force to me is the simplest type of Hacking method.
in my opinion, bruteforcing is more useful when you do it to a person you personaly knows.
Wordlist: Wordlist is a file (made in notepad) that has many password that the attacker have guessed of the target. Wordlist is a dict file.
WIKIPEDIA DEFINES LIKE THIS: In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
Mark as BRAINLIEST If you are satisfied : )
A friend tells you that they cannot afford to pay for the standardized tests that need to be taken to apply for college and military academies. How could you respond?
Answer:
you could respond by giving your money to them.
Explanation:
How many different name servers need to be visited in order to find location of www.flamingflamingo.eu including ROOT server
Answer:
10
Explanation:
Who do many employees think is responsible for safety in the workplace
Answer:
Supervisors.
Explanation:
Supervisors have an overall responsability to ensure the safety of the workers. They must take every precaution reasonable in the circumstances the worker is found in.
on hearing my name you may think that i am interative, but i play a vital role in network by boosting the signal strenght to overcome attenuation. who am i?
Answer: A Network Repeater or Repeater
Explanation:
A Network Repeater also called Signal booster is an electronic device that receives a signal and retransmits the signals in such a way that can cover a wide range of distance without reducing the signal strength or causing Attenuation( a reduction or loss in signal strength which occurs when there is a transmission of signals over long distances).
An example is a Radio repeater.
What are the benefits of using disk cleanup as part of regular maintenance on a computer? Check all of the boxes that apply.
Trash is emptied to clear space on the hard drive.
Files that are no longer needed are deleted to clear space and help the computer run faster.
Accumulated temporary files are deleted to help the computer run faster.
Unnecessary program files that may slow down the computer are deleted.
Answer:
all of the above
Explanation:
Answer:
Trash is emptied to clear space on the hard drive.
Files that are no longer needed are deleted to clear space and help the computer run faster.
Accumulated temporary files are deleted to help the computer run faster.
Unnecessary program files that may slow down the computer are deleted.
Explanation:
It's all of the above
Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography
Answer:
I think it's B) templates
Sorry if it's wrong I'm not sure!!
Explanation:
Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.
In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.
A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.
In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.
Read more on template here: https://brainly.com/question/13859569
Temperature for the month of April 2017 has been recorded by the zambia metrological department as follows : 24.0,17.5,33.0,36.5,36.0,22.5,12.5,44.0,15.5,33.0,41.5,23.5 explain in detail how these temperatures can be accessed and arranged in a 2DA matrix. Write a program to show how they can be arranged in a 3*3 matrix. Find the total sum of all the temperatures using 2DA
Answer:
The sum of the temperatures is: 336
Explanation:
2-Dimensional Array:
A two dimensional array is defined as
int temp [3] [3]
This is how a two dimensional array is defined in C++ programming language.
Here we have defined a 2-D array named temp which can store 3*3 = 9 int values
These 9 values are stored in 3 rows and 3 columns as below:
1, 2, 3
4, 5, 6
7, 8, 9
We are given the temperature for the month of April 2017 recorded by the Zambia metro-logical department.
24.0, 17.5, 33.0, 36.5, 36.0, 22.5, 12.5, 44.0, 15.5, 33.0, 41.5, 23.5
The given temperature values are 12 therefore, we would need a matrix of 3 rows and 4 columns ( 4 rows and 3 columns is also valid)
3*4 = 12 values
These 12 values will be arrange as below:
1, 2, 3, 4
5, 6, 7, 8
9, 10, 11, 12
C++ Program:
#include <iostream>
using namespace std;
int main()
{
// initialize the number of rows and columns
int row = 3;
int col = 4;
// initialize variable sum to store the sum of temperature values
int sum = 0;
// initialize 2d array with given temperature values
float temp[row][col] = { {24.0, 17.5, 33.0, 36.5}, {36.0, 22.5, 12.5, 44.0}, {33.0, 41.5, 23.5, 15.5} };
// we need two for loops to keep track of rows and columns
for(int i = 0; i < row; ++i)
{
for(int j = 0; j < col; ++j)
{
// to display individual temperature values
cout<< "temp[" << i << "][" << j << "] = " << temp[i][j] <<endl;
// to sum the elements of the 2d array
sum+=temp[i][j];
}
}
// to display the sum of temperature values
cout<<"The sum of the temperatures is: "<<sum<<endl;
return 0;
}
Output:
temp[0][0] = 24
temp[0][1] = 17.5
temp[0][2] = 33
temp[0][3] = 36.5
temp[1][0] = 36
temp[1][1] = 22.5
temp[1][2] = 12.5
temp[1][3] = 44
temp[2][0] = 33
temp[2][1] = 41.5
temp[2][2] = 23.5
temp[2][3] = 15.5
The sum of the temperatures is: 336
Note:
The index start at 0 not 1 that is why you see rows from 0 to 2 and columns from 0 to 3.
This is a python program.
I managed to get this program to say hello to a user after they input their first and last name, however, I cannot manage to get the program to tell the user how many letters are in the user's name.
Answer:
word = input("Type your name: ")
print(len(word))
Explanation:
The len function will count all the chars in the string.
What is output by the code below?
int[] nums = new int[10];
for (int i=0; i < nums.length; i++)
{
nums[i] = i*2;
}
System.out.println(nums[5]);
a.16
b. 10
c. 14
d. 18
e. 12
Answer: I think it is a
Explanation:Sorry if it it is worng