Can someone please help me?m

Can Someone Please Help Me?m

Answers

Answer 1

Answer:

(_(

Explanation:


Related Questions

Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?

Answers

Answer:

the answer is B (AZ down arrow)

Explanation:

The array elements are always stored in__________memory locations. Write the word consecutive or random in the blank appropriately.

Answers

Answer:

contiguous.

Explanation:

An array can be defined as a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

The array elements are always stored in contiguous memory locations.

It should be be noted that the array elements are always stored in contiguous memory locations.

According to the question, we are to discuss the array elements and how they are been always stored  .

As a result if this we can see that array elements are always stored in contiguous memory locations so as to enable the retrieval of the information.

Therefore, array elements are always stored in contiguous memory locations.

Learn More about array elements at;

https://brainly.com/question/3735128

Suppose datagrams are limited to 1,500 bytes (including header) between source Host Aand destination Host B. Assuming a 20-byte IPheader, how many datagrams would be required to send an MP3 consisting of 5 million bytes? Explain how you computed your answer.

Answers

Answer:

3424 datagrams would be required

Explanation:

Mp3 file size = 5 million bytes

assuming the data is carried in TCP segments with each TCP segment have 20 bytes of header

Therefore each datagram can carry at least : ( 1500 - 40 ) = 1460 bytes

Therefore the number of datagrams required = [tex][\frac{5*10^6}{1460} ][/tex]    =  3424

The MP3 file to be transmitted does have a size of 5 million bytes or [tex]5 \times 10^6\ \ bytes[/tex]. Suppose that information is moved via TCP segments with a TCP header size of 20 bytes.

Each IP header is 20 bytes long, and the TCP header is also 20 bytes long. Therefore, we use 40 bytes out of a total of 1500 bytes for IP and TCP headers. Then, in each datagram, we can send [tex]1500-40 = 1460[/tex] bytes of MP3 files. So, overall number of data packets necessary:

         [tex]= \frac{\text{Total MP3 Size}}{\text{ MP3 Size}}[/tex]

calculating the each datagram that is capable of transporting:

                 [tex]\to \frac{5000000}{ 1460} \\\\ \to 3424.65753425 \\\\\to 3425 \ \ Datagrams.[/tex]

Except for the last one, all datagrams would be 1500 bytes in size. Your final datagram will be 1000 bytes long, i.e,

   [tex]\to 1460 \times 0.65753425 \\\\ \to 960 + 40 \ \text{(Bytes of Header)} \\\\ \to 1000 \ Bytes\\[/tex]

Learn more:

brainly.com/question/16666220

Protected members of a base class are like ________, but they may be accessed by derived classes. a. constructor functions.b. static members.c. private members.d. public members e. none of these.

Answers

Answer:

C). private members

Explanation:

These are options

a. constructor functions

b. static members

c. private members

d. public members

Protected members can be regarded as member that accessibility of them from outside the class is zero, they can only get accessibility from derived classes, though this is not applicable to private class. It should be noted that Protected members of a base class are like private but they may be accessed by derived classes.

why do we need the system requirements for Adobe photoshop?

Answers

I’m sorry and I do not know I just need credits thank have a nice day

Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how the logical address can be converted to physical address?

Answers

Answer:

Compile time

Load time

Execution time

Explanation:

The binding of instructions can be done in three steps, which are:

Compile time

Load time

Execution time

• Compile time In compile time, absolute code is usually generated when the compile time where the process resides in the memory is known

• Load time - in contrary to compile time, if it is not known at compile time where the process will reside in memory, then the compiler has to generate a relocatable code. In this scenario, the final binding is usually delayed until load time.

• Execution time - if the process is able to be moved during its execution from a particular memory segment to another segment, then binding is delayed until run time.

please tell fast plzzzzzz​

Answers

Answer:

heyyy

your answer is false

HOPE IT HELPS YOU OUT PLEASE MARK IT AS BRAINLIEST AND FOLLOW ME PROMISE YOU TO FOLLOW BACK ON BRAINLY.IN

Answer:

false..................

The binary constraint must cover indicates that ________.
A)a specific binary relationship must be included in a ternary relationship
B)a binary relationship includes a set of value combinations that must all occur in a ternary relationship
C)a table includes values that must occur in a binary relationship
D)a table includes values that must occur in a ternary relationship

Answers

Answer:

B

Explanation:

binary relationship includes a set of value combinations that must all occur in a ternary relationship

To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

a. DSL Degree
b. SSL Degree
c. SSL Certificate
d. DSL Certificate

Answers

Answer:

c. SSL Certificate

Explanation:

The full form of SSL is Secure Sockets Layer. It is the standard security technology which establishes the encrypted link between a client and the server—typically a web server (which is the website) and the browser, or the mail server along with a mail client (for e.g., Outlook).

In the context, in order to develop an SSL connection, an SSL Certificate is required by the Web server.

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ______________ programming.

Answers

Answer:

Visual.

Explanation:

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called visual programming.

A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and can be defined as a programming tool that avails programmers the ability to develop software programs (applications) using graphical elements and figures rather than texts alone.

Some examples of visual programming language are executable UML, Blockly, Kodu, Alice, Lego mindstorms, Gamemakers etc.

this is my pc it had glowing rams but we changed them​

Answers

Answer:

nice how many fps

Explanation:

wow very nice I love it I think it looks great

1. Which of the following does NOT have Artificial Intelligence?

Siri/Alexa
driverless cars
Wireless Speakers
Face Recognition​

Answers

None of the above I think it is Siri I am sorry if it is a wrong

Answer:

wireless speakers

Explanation:

siri is a spin-off from a project originally developed by the SRI International Artificial Intelligence Center. Its speech recognition engine was provided by Nuance Communications, and Siri uses advanced machine learning technologies to function. alexa is the same. driverless cars when talking about autonomous cars, it is almost impossible not to discuss artificial intelligence. AI is used to enable the cars to navigate through the traffic and handle complex situations. Also, with a combined AI software and other Iot sensors, such as cameras, it becomes easier to ensure proper and safe driving.face recognition and AI can be discussed as different mechanisms and I do so occasionally to make clear that they are intertwined it is important to note that most any contemporary, powerful face recognition has certainly been developed using some aspect of AI so as it is clearly wireless speakers.

education is better than money give point​

Answers

Answer:

yes education is better than money

Explanation:

money isn't everything

Which Tab contains the paragraph attributes?

A. Home
B. Insert
C. Review
D. View

PLs help
Award: 15pts

Answers

Answer:

Insert

Explanation:

PLEASE HELP ASAP! BRAINLIEST TO BEST ANSWER!
Use the drop-down menus to set a password to encrypt a presentation.


1. Save a backup copy of the original file.


2. Go into the (A. Home tab, B. Trust canter, C. Backstage view) in the File tab, and select ( A. Check for issues, B. Protect presentation, C. Presentation permissions)

3. Type in a password. Then, (A. Reenter, B. Strengthen) the password, and save the new file.

4. Keep the password in a safe place.

Answers

Answer:

1. Save a backup copy of the original file.

2. Go into the  ✔ Backstage view  in the File tab, and select  ✔ Protect Presentation .

3. Type in a password. Then,  ✔ reenter  the password, and save the new file.

4. Keep the password in a safe place.

Explanation:

The password to a presentation for encryption is added from the backstage view of the file tab with to protect prestation option.

Why to encrypt a presentation?

The encryption to a presentation is given as the setting of password to open it in order to protect the data, and enhance the security of it.

The encryption to the presentation is performed with the following steps:

A backup copy of the original question is saved.In the backstage view of the file tab, protect presentation option is selectedThe password is typed, and then reentered to save the new file.The password is kept at the safe location.

Learn more about presentation, here:

https://brainly.com/question/14621266

#SPJ2

What framework uses CSS to access and manipulate HTML elements?

____ uses CSS to access and manipulate HTML elements

Answers

Answer:

The correct answer is JQuery

Explanation:

JQuery uses CSS to access and manipulate HTML elements.

Answer:

the answer is:

JQuery

Program that take 3 number and display them in ascending order c++

Answers

Answer:

#include <iostream>     // std::cout

#include <algorithm>    // std::sort

#include <vector>       // std::vector

using namespace std;

int main()

{

   vector<int> myvector{ 8, 1, 3 };

   std::sort(myvector.begin(), myvector.end());

   for (int x : myvector)

       cout << x << " ";

}

Explanation:

Use STL libraries where you can to keep your code robust!

Why is it important to turn your work in on time? How does submitting your work on time demonstrate academic integrity? How do you plan to ensure your academic success by turning your work in on time?

Answers

Answer:

It is important to turn the work on time for two fundamental reasons: first, because it allows the student to organize their time more efficiently, without delays in his presentations; and second, because it shows the responsibility of the student in front of his obligations, which gives a positive concept in front of teachers and managers.

In addition, the delivery of work in a timely manner is a clear sample of academic integrity: it shows that the student has his academic career as his main priority, over other alternatives such as work or leisure. That is, it realizes that the student is applied and integral when considering his academic responsibilities.

In my case, I seek to ensure my academic success by submitting my work in advance, which gives me time to receive corrections from the teachers and to be able to modify my mistakes.

Why should you try to contact the technical support staff of a web hosting provider before you become one of its customers?

Answers

Answer: Contacting technical support can give you a general idea of the responsiveness of the web host provider to issues and problems. If the technical support staff is slow getting back to you at this point, don't be surprised if you get the same type of service when you have a problem and need immediate help. While not fail-safe, a quick response to a simple question at least gives the appearance of a well-organized, professional, and responsive technical support staff.

Clay wants to print T-shirts and sell them online. What printing press would be the best for him to use?

Answers

Answer:

I think is screen printing press.

Explanation:

Screen printing requires you to go through a multi-step, back-breaking process to print your t-shirt.

Corey set up his presentation for delivery to his team.

Answers

Answer:

If Corey wants to control the pacing of his presentation, he should adjust his playback settings. In the playback settings, he should select the default setting under "type;" this will allow him to change slides anytime. He should also click the check box under "options" that says "Change slides manually" so he can simply click on the slide whenever he is ready to move on to another slide.

Explanation:

If you don't like that answer, here's another one:

Corey knew he would need a lot of time to explain each point and that his team members would have lots of comments and questions. The best way that Corey should set up his slide show would be to make sure that he has an outline. Also, there should only be one thought per slide (never mix it). It has to be taken into account that he should have fewer words and more images/graphs.

Jacob has a text file open, and he is typing on the keyboard. What is the best description of how the
changes are being implemented?
O The original file is temporarily changed; the changes become permanent when he clicks "save."
O The new version is kept in a special virtual space; the file is only changed when he clicks "save."
O The information is stored on the clipboard.
O A copy is created with a new filename, which will overwrite the old one when he clicks "save."

Answers

Answer:

The new version is kept in a special virtual space; the file is only changed when he clicks “save.”

Explanation:

I took the test and got it correct.

The best description of how the changes are being implemented is the new version is kept in a special virtual space; the file is only changed when he clicks "save." The correct option is b.

What is a keyboard?

Using a keyboard, you can input letters, words, and numbers into your computer. When you type, you press each key on the keyboard separately.

On the right side of the keyboard, you can also find the number keys that run across the top of the keyboard. The principal use of a keyboard is as an input device.

A person can type a document, use keystroke shortcuts, access menus, play games, and complete a number of other tasks with a keyboard.

Therefore, the correct option is b, The new version is kept in a special virtual space; the file is only changed when he clicks "save."

To learn more about keyboards, refer to the below link:

https://brainly.com/question/24921064

#SPJ2

Provide an example where a company has demonetized a market or industry.

Answers

Companies are shut down if copyrighted

A. Write a class that declares a variable named inches that holds a length in inches,
and assign a value. Display the value in feet and inches; for example, 86 inches
becomes 7 feet and 2 inches. Be sure to use a named constant where appropriate.
Save the class as InchesToFeet.java.
B. Write an interactive version of the InchesToFeet class that accepts the inches
value from a user. Save the class as InchesToFeetInteractive.java.

Answers

Answer:

A.

public class Main{

public static void main(String[] args) {

 final int divisor = 12;

 int inches = 86 ,feet;

 feet =inches/divisor;

 inches = inches%divisor;

 System.out.print(feet+" feets "+inches+" inches");

}

}

B.

import java.util.*;

public class InchesToFeetInteractive{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 final int divisor = 12;

 int inches,feet;

 System.out.print("Measurement in Inches: ");

 inches = input.nextInt();

 feet =inches/divisor;

 inches = inches%divisor;

 System.out.print(feet+" feets "+inches+" inches");

}

}

Explanation:

Both classes use the same algorithm; however, the slight difference is that

(A) assumes a values of inch measure while (B) prompts user for input

That is show in the differences below

A)

int inches = 86 ,feet; ---> This initializes inches to 86;

B)

This prompts user for measurement in Inches

 System.out.print("Measurement in Inches: ");

This gets the measurement

 inches = input.nextInt();

The next lines are common in both classes

This declares and initializes a constant which is used in the conversion

 final int divisor = 12;

This calculates the number of feet in the user input

 feet =inches/divisor;

This gets the remainder inches, if any. It uses % to calculate the remainder

 inches = inches%divisor;

This prints the required output

 System.out.print(feet+" feets "+inches+" inches");

Why do people create web pages?

Answers

Answer:

To grab peoples attention

Explanation:

Answer:

People create web pages to share their passion for whatever they do. People create them to sell buisness products too.

Explanation:

I hoped this helped.

ANIMATION QUESTION

In the you tube animation "The Heavy Is Ded" the Heavy is supposedly "Ded" but throughout the video, he clearly isn't ded, can anyone explain how on earth this is possible, because this should be impossible since the Heavy is ded

Answers

Answer:

I think my old acc got deleted again..........

Explanation:

I love u here is a meme

Your classmate constructs a simple computer that adds numbers. There are 5 wires for inputting the first
number, and the wires are currently "on","on", "off, "on", "off", or 11010 in binary.
What decimal number does that represent?

Answers

Answer:

26

Explanation:

Which of the following features can be found on the LMS home page?
(Select all that apply.)
A. Log in to the LMS
B. Review the FTI calendar
C. Acces the FAQs
D. Watch videos
E. Follow FTI social media

Answers

A b c d e so yes it need 20 words for this lol

Select the correct text in the passage.

Which statement in the paragraph indicates that a data storage problem exists with an enterprise system?

[Once implemented, enterprise systems have a lifespan of 10 to 20 years. After that, organizations can upgrade them or scale them up.] Although this seems like a long time, [data within organizations accumulates exponentially and may be too difficult to manage and store on a single software system.] [Data overflow and a subsequent slowdown in one department will have a ripple effect on other functions of an organization. ]This affects the performance of the entire system.

Answers

its C, sorry if im wrong but im pretty sure.

Explanation:

Answer:data within organizations accumulates exponentially and may be too difficult to manage and store on a single software system.

Explanation:

Which of these is NOT a benefit of being connected 24/7?
A. You can find information using search engines.
B. You can use weather apps to help plan outdoor activities.
C. You can feel like you have to respond to a message right away, even if you don’t want to.
D. You can use music apps to create, share, and listen to playlists.

Answers

Answer:

c

Explanation:

answering messages is a more of a choice than a benifit.

Other Questions
According to Wes, he had a teacher who bluntly told him, It didnt matter to her if I showed up because the class ran smoother when I wasnt there. Do you agree or disagree with the teachers position? What would you have done if you were in her shoes? Multiple ChoiceHow did the Scottsboro Trial reflect the time period in which it unfolded?The boys exemplified the plight of hobos" during the Great Depression.The boys exemplified Black Migration from South to North during WW2.The female accusers exemplified postwar gender roles.The jury was representative of civil rights reform in the 1960s. Stop!!! please help me if you know the answer!! ;-; I'm bout to not pass history-The Great Awakening was a period in which people began to question traditional authority in both politics and religion. For this assignment, answer the following questions. Each question should be answered in at least two complete sentences. Be sure to use proper spelling, grammar, and punctuation in your work.1. Thomas Hobbes, John Locke, Charles de Montesquieu, and Jean-Jacques Rousseau were all philosophers who wrote about ideas that would later be used in the government of the United States. Which idea or concept do you feel is the most important and why?2. Jonathan Edwards and George Whitefield were the two most prominent preachers during the Great Awakening. Who do you feel was more impactful and why?3. Not everyone was in favor of the changes that occurred during the Great Awakening. Why would a minister or person be against religious changes in the colonies?4. The Great Awakening prepared people for the revolution during the 1770s. How were people prepared, and why did this happen in the colonies? A supermarket sells orange juice in three sizes. The 32 fl oz container costs $1.99,the 64 fl oz container costs $3.69, and the 96 fl oz container costs $5.85. Which size orange juice has the lowest price per fluid ounce? Explain! Where were the British colonies located What is Ellis island about 18 more than twice a number is 8 Kareem is a software salesman. His base salary is $2200, and he makes an additional $60 for every copy of Math is Fun he sells.Let P represent his total pay (in dollars), and let N represent the number of copies of Math is Fun he sells. Write an equation relating P to N. Then use thisequation to find his total pay if he sells 26 copies of Math is Fun. Order is for 12mg/kg a day divided in doses every 8 hours. Child weighs 22lbs. Medication available in 200mg/5 ml. How many mL should be administered per dose Write an inequality to represent the graph. -5 3 2- x -5 4 3 2 0 2 5 6 8 -2 -3 -5 (3,5) -6- (0,7) -8 -9 -10answers:y 2/3 x -7y 2/3 x -7y 3/2 x -7y 3/2 x -7 The float committee made a scale model of their float before they started construction. The float committee used the scale 1 inch: 3 feet to create their model. The actual float will be 18 feet long. What is the length of the scale model float in inches? Enter your answer in the box. How do I water and minerals get into a plant?? Simplify23 + 4.8Plz help The Sumerians were able to build _________ of ___________ dams and, ______ to provide their ______ with regular supply of______. A zoo has 15 toucans and 60 parrots. What is the ratio of the number of toucans to the number of parrots at the zoo?A. 1: 4 B. 1: 5 C. 4: 1 D. 4: 5 WHAT IS A PLANTATION (based on slavery information) Is art an imitation or an interception of nature? I want to hear some opinions about this. Imitation-A something intended to simulate or copy of something Interception-The action of explaining the meaning of something PLEASE HELP NOW!!!!!Which expression is equivalent to 3^2 3^-5 A 6.9 kg object is suspended by a string from the ceiling of an elevator. The acceleration of gravity is 9.8 m/s 2 . Determine the tension in the string if it is accelerating upward at a rate of 2.9 m/s 2 . Answer in units of N. I need help on this help me pls