Answer:
B.computer animator
Explanation:
the keywords in the question are hardware and software,which rules out traditional animator. and it obviously wouldn't be A or D.
What are the duties of IT professionals before and
during the deployment of computers stage? Check
all of the boxes that apply.
A.set up basic productivity programs, such as
e-mail and word-processing software
B.collect each employee's e-mail username
and password
C. back up files
D. install any special software needed, such as
photo-editing or tax preparation programs
E.upgrade system components
Answer: A, B, and C.
Explanation: Just did it on ed
Answer:
A,C,D
Explanation:
i just did it
what is foxy's soul name
Answer:
is it FoxyFoxington
Explanation:
Answer:
isnt it gabriel
Explanation:
Edhesive 4.3 code practice question 1 PLZ SOMEONE
topic: Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you with 15 hugs! This year, she, unfortunately, cannot see you on your birthday, so instead, she wants to send you virtual hugs!
Create a program that prompts the user for how old they are turning and then using a loop, output a virtual hug for every year old they are.
The following prints a single “virtual hug.”
Answer:
x = int(input("How old are you turning? "))
c = 0
while (c != x):
c = c + 1
print("**HUG**")
Following are the python program to calculate the virtual hugs:
Python Program:age = int(input("How old are you? "))#defining the age variable that inputs age value in number
for x in range(0,age):#defining the loop that counts and prints the number of HUG value
print("**HUG**")#print message
Output:
please find the attached file.
Program Explanation:
Defining the 'age' variable that inputs age value by using the input and int method that takes only numeric value.After the input value, a for loop is defined this loop that counts the age value and prints the number of 'HUG' values, by using the print method.Learn more on python programs here:
brainly.com/question/17796174
What are some of the greatest technology achievements?
Answer:
Electricity
The Laser
Semiconductor Chips
Quantum Computing
The Elevator
The Human Genome Project
The Automobile
The Global Positioning System
which of the following is NOT an example of a compound
A, Gun Powder B, SALT C. Smoke from cars D. Oxygen
Answer:
D.
Explanation:
feels most right bro . pretty sure, not fully confident :)
What is the value of the variable result after these lines of code are executed?
>>> a = 3
>>> b= 2
>>> c=0
>>> result = a* b-c* b
The value of result is
PLEASE HELP
the value of result is 6
a * b = 6
c * b = 0
6 - 0 = 6
The value of the variable result after these lines of code are executed. The value of the result is 6.
What are the values in codes?A value is a representation of any item that may be manipulated by a program in computer science and software programming. The values of a type are represented by its members.
The "value of a variable" is determined by the environment's associated mapping. Values coding is a coding technique that explores the subjective aspect of human experience.
Value coding, in particular, is concerned with classifying the values, attitudes, and belief systems presented by participants. A value, like a letter or a number, is one of the fundamental objects that a program works with. Python allows you to print values.
Given that a = 3, b= 2, and c=0
a x b - c x b
3 x 2 - 0 x 2
6 - 0 = 6
Therefore, the value of the result is 6.
To learn more about variables, refer to the link:
https://brainly.com/question/18968869
#SPJ5
Is there any answer key to this??? ANSWER ASAP
Nobody posts questions like these
Answer:
nah ion think so
Explanation:
Platon says, when taking a photo you should:
(Photography class)
Answer:
look your subject in the eye use a plain background, use flash outdoors, move in close, move it from the middle, lock the focus, know your flash's range, watch the light.
Explanation:
int x = 25;
if ( x == 25 ) I
System.out.print("CECIL");
else
System.out.print("HARAMBE”);
Output:
Answer:
printer
Explanation:
Postreading strategies are used
1)before reading a text.
2)when reading for specific information.
3)when reading for general meaning.
4)after reading a text.
Answer:
4) after reading a text
Answer:
After
Explanation:
Ed2021
Which piece of personal information do websites often require users to enter?
Answer:
password
Explanation:
usually you will need this for verification, because if we did'nt have it we would get hacked.
To build an ethernet, you need cables and the money to pay for them. A particularly popular type of ethernet cable is called Cat5. Search the Internet for the best prices for an ethernet Cat5 cable. Study the results, and select five that might be useful. Create a table with headers for columns containing the online page address, product name, cable length, price, and a reason for including each one in the table.
Select cables that could be used in a network, not just around the home. Organize the table with your first choice at the top.
Give the table to your teacher.
Answer:
Hope this helps you can save this :)
Explanation:
Don needs to print his workbook. What tab should he click on to see the Print command?
File
Insert
thing
Page Layout
Home
NEXT QUESTION
ASK FOR HELP
Answer:
he should press file.
Explanation:
Wiektions
Locating the Select Data Source Dialog Box
Where would you locate the select Data Sowce dialog bor?
Design fab Select Data
Design tab, Chart Layouts
Format tablisert Shapes
Format tab, Fofthat Selection
Answer:
Design tab, Select Data
Explanation:
just answered , its correct
Answer:
A. Design tab, Select Data
Explanation:
edge 2020 gang gang
This is not considered to be an advantage of Linux.
1)cost
2)customizability
3)security
4)user-friendliness
Answer:
1. cost, since you can download anything from the internet
Answer:
4 is the right answer its not user friendly
Explanation:
read about it
Random question: on a scale of 1-10 how much do you all hate Edgenuity?
-100 it is horruble, I would never join the class
Answer:
10 outta 10 man
Explanation:
It sucks az ngl
Too much work and i wanna play cod rn
Which hexadecimal-type address refers to a physical networking device such as a network interface card?
MAC address
packet address
IP address
datagram address
Answer:
Which hexadecimal-type address refers to a physical networking device called a MAC Address.
which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?
A. 5 volts
B. 3.3 volts
C. 12 volts
D. 100 volts
Answer:
D. 100 volts
Explanation:
Electrostatic discharge (ESD) can be defined as a swift or sudden discharge of static electricity between two (2) objects coming in contact. An electrostatic discharge occurs between the two objects because the objects are having a different amount of electrons and charge. Thus, when they come in contact it results in a huge buildup of electromagnetic field known as an electrostatic discharge (ESD).
Also, voltages from an electrostatic discharge (ESD) are capable of destroying the internal components of a computer. Generally, a 100 volts ESD would be the minimum to short circuit a computer's hardware components.
Additionally, an electrostatic discharge (ESD) can be prevented through the use of an antistatic wrist strap, antistatic bags etc.
There are different ranges of voltage. 100 volts is known to be the voltages from an ESD discharge that would be the minimum to short a computer's hardware components.
Electrostatic discharge (ESD) is know to be one of the sources of electricity that can lead to damage to computer equipment.
It is very important follow proper handling guidelines and also environmental issues, and use appropriate equipment so as to make power to be stable and hinder data loss and the damage of equipment.
Learn more ESD discharge from
https://brainly.com/question/4918499
Which law regulates online credit reporting in the United States?
regulates online credit reporting in the US.
Answer:
Fair Credit Reporting Act.
Explanation:
The Fair Credit Reporting Act (FCRA) is a federal law that regulates the collection of consumers' credit information and access to their credit reports.
Answer:
The Fair Credit Reporting Act (FCRA) is a federal law that regulates the collection of consumers' credit information and access to their credit reports. It was passed in 1970 to address the fairness, accuracy, and privacy of the personal information contained in the files of the credit reporting agencies.
What is technology?
Answer:
the sum of techniques, skills, methods, and processes used in the production of goods or services or in the accomplishment if objects, such as investigation
645656565656564548778465132131321231
Who designed the Analytical Engine in the 1930s?
Charles Babbage
Steve Wozniak
Alan Turing
Bill Gates
Answer:
Charles BabbageExplanation:
Charles Babbage designed the Analytical Engine in the 1930s.Thank you ☺️☺️
Answer:
Charles Babbage
Explanation:
Charles Babbage designed a general-purpose calculating machine, the Analytical Engine, which is considered to be the precursor of the modern-day computer. He was never able to finish it.
- Edge 2022
destiny is concerned that readers won't realize the importance of the facts I her investigative report.what can she do to make the heading more informative?
The correct answer is D. Use action verbs and refer to benefits
Explanation:
One of the most effective ways to emphasize information is to use action verbs; these are words that express actions rather than states. In the case of a report action verbs such as prove, show or research can be used to explain facts or results because these emphasize information and make readers understand the importance of information rather than words such as seem. Moreover, in a research report writers might want to refer to the benefits because this catches the readers' attention as they will be interested in knowing how the information in the report contributes to their life or the world.
Answer: Use action verbs and refer to benefits
Explanation: Ape x
who invented the smart phone?
Answer:
IBM created the first smart phone
IM can only be sent to conacts who are currently
what is the question???
Hello! I am currently serving as a recruiter for "Cloud Thought" to find those (18+) interested in creating/editing/teaching through online video explainers for grades K-8. If you are interested please reach out to me and I can give further information! Hope you have a great day.
Answer:
Cloud is a computer software which enables the users to store data. It enables different users to connect on one platform and work together.
Explanation:
Cloud thought software is a great platform for users who wants to work distantly. This connects remote servers and enables the users to share information and work together. This also facilitates users with data storage.
What does the term ethical mean?
Answer:
relating to moral principles or the branch of knowledge dealing with these.
Ex: ethical issues in nursing or
For someone who is honest and follows good moral standards, use the adjective ethical. Ethical comes from the Greek ethos "moral character" and describes a person or behavior as right in the moral sense - truthful, fair, and honest
Select the correct answer.
Which TWO objects are likely to have SSD chips in them?
1. office access card
2. bank debit card
3. food service token
4. discount coupon
5. business card
Answer:
office access cars
Explanation:
HOPE THIS WILL HELP U, MARK ME AS A BRAINLIST
Answer:
office access card
bank debit card
Explanation:
Conduct online research to determine specific conflict-resolution and management techniques and skills that would be beneficial to a 16 to 18-year-old student Use the results of your research to design an informational pamphlet that could be distributed in a public or private high school.
Answer:
25 if back in bed handle cinnamon called all call back
Explanation:
because it is I hope
Need help with these
19: True
~~~~~~~~
20: B
~~~~~~~~
Hope this helps! :)