Answer:
Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!
Explanation:
What is food technology
Answer:
is the application of food science to the selection, preservation, processing, packaging, distribution, and use of safe food. Related fields include analytical chemistry, biotechnology, engineering, nutrition, quality control, and food safety management.
Explanation:
Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a color, and a Boolean value to indicate whether the triangle is filled.
Answer:
Scanner in = new Scanner(System.in);
System.out.print("Please enter 3 sides of a triangle, color and " +
"whether it is filled or not (true false): ");
double s1 = in.nextDouble();
double s2 = in.nextDouble();
double s3 = in.nextDouble();
String color = in.next();
boolean filled = in.nextBoolean();
Triangle t1 = null;
try {
t1 = new Triangle(s1, s2, s3, color, filled);
}
catch (IllegalTriangleException ite) {
System.out.println(ite.toString());
}
System.out.println(t1.toString());
System.out.printf("Triangle color: %s, Triangle filled: %s%n" +
"Area: %.2f%n" +
"Perimeter: %.2f%n%n",
t1.getColor(),
t1.isFilled(),
t1.getArea(),
t1.getPerimeter());
Explanation:
Scanner in = new Scanner(System.in);
System.out.print("Please enter 3 sides of a triangle, color and " +
"whether it is filled or not (true false): ");
double s1 = in.nextDouble();
double s2 = in.nextDouble();
double s3 = in.nextDouble();
String color = in.next();
boolean filled = in.nextBoolean();
Triangle t1 = null;
try {
t1 = new Triangle(s1, s2, s3, color, filled);
}
catch (IllegalTriangleException ite) {
System.out.println(ite.toString());
}
System.out.println(t1.toString());
System.out.printf("Triangle color: %s, Triangle filled: %s%n" +
"Area: %.2f%n" +
"Perimeter: %.2f%n%n",
t1.getColor(),
t1.isFilled(),
t1.getArea(),
t1.getPerimeter());
How laggy is you're game cause I even lag in offline games this is just a random question.
Answer: its bad
Explanation:
Answer:
Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.
what is a microscope
Answer:
an optical instrument used for viewing very small objects, such as mineral samples or animal or plant cells, typically magnified several hundred times
Answer:
A microscope is a laboratory instrument used to examine objects that are too small to be seen by the naked eyes.
Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59
Answer:
-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.
-- Enums are great for representing states and other common constants like colors.
-- Enums let us specifically value each constant we create.
Explanation:
Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.
Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.
Option 4 is applicable because enums are used to represent various states and also other constants.
Option 5 is also applicable they allow the developer to create each value constant.
Anyone wanna play league of legends, i play top and mid
Answer:
u get work
Explanation:
five technology tools and their uses
Answer:
Electronic boards
Videoconferencing ability
Search engines
Cloud services
Computing softwares
Explanation:
Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :
The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.
Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.
Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.
Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.
Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.
Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "non-negative" otherwise. Ex: If userVal is -9, output is:
-9 is negative. PLEASE USE C++
Answer:
PROGRAMMING APPROACH:
Define the necessary header file using namespace.Define the main() method.Declare variable inside the function().Print result.Explanation:
Required C++ Code:
#include<iostream>
#include<string>
using namespace std;
int main()
{
string condStr;
int userVal;
cin>>userVal;
condStr=(userVal<0)?("negative"):("non-negative");
cout<<userVal<< " is "<< condStr <<"."<<endl;
}
OUTPUT:
-2
-2 is negative.
Consider the following method:
public void doSomething(int n) {
if (n > 0) {
doSomething(n/2);
StdOut.print(n);
doSomething(n/2); }
}
How many recursive calls are made by doSomething(n)?
Answer:
two recursive calls are made
Explanation:
In this piece of code two recursive calls are made by doSomething(n). This is assuming that the input (n) is greater than 0. Otherwise the function will simply end because it will completely skip over the IF statement which holds the entirety of the functions code. A recursive call is represented as the name of the function/method itself within itself. Therefore, everytime the code states doSomething(n) or in this case doSomething(n/2) it is calling itself.
my iphone s6 is plugged in but isnttttt charging and the chager works on my ipad waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Answer:
Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.
the brain of the computer that does calculation moving and processing of information
Explanation:
The computer brain is a microprocessor called the central processing unit (CPU). The CPU is a chip containing millions of tiny transistors. It's the CPU's job to perform the calculations necessary to make the computer work -- the transistors in the CPU manipulate the data. You can think of a CPU as the decision maker.
4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.
Answer:
D
Explanation:
Communication are happen when 2 people are response each other
It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.
What is communication?The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.
It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.
Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.
Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.
Thus, the correct option is 4.
For more details regarding communication, visit:
https://brainly.com/question/22558440
#SPJ2
Your question seems incomplete, the probable complete question is:
All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.Which ONE of the following role players provides technical backup, trouble shooting and
computer literacy training?
1. Parents
2. Teachers
3. ICT Coordinator
4. Subject specialist
Answer:
C, ICT coordinator
Explanation:
ICT Coordinator provides technical backup, trouble shooting and computer literacy training.
ICT CoordinatorThis individual seems to be in charge of such gear as well as applications, as well as broadband connections.
This same coordinator also assists overall ICT policy development in schools, such as the formation of an ICT management committee, responsibility division, as well as communication with stakeholders.
Thus the response above i.e., "option 3" is correct.
Find out more information about ICT Coordinator here:
https://brainly.com/question/25168859
What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
email address
web address
UNC path
O All will be automatically converted,
d. All will be automatically converted.
Explanation:A hyperlink is a link created in one document and that leads to another document mostly by clicking on that link. In Microsoft Outlook, some text formats are automatically converted to hyperlinks which are shown by first underlining the text and then changing the text color to blue. Some of the text formats that are turned to hyperlinks are:
i. email addresses
ii. web addresses
iii. UNC path: This is a path specifying the location of a particular document or resource on a computer or server. It has the following format:
\\name--of--server\resource-path-name
An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.
An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.
What is electronic spreadsheet?You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.
Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.
You might also keep in mind that while exporting data into a spreadsheet, some data types might change.
You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Thus, the answer is electronic spreadsheet.
For more details regarding spreadsheet, visit:
https://brainly.com/question/8284022
#SPJ6
A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.
Answer:
Here the code is given as follows,
Explanation:
OUTPUT:
Message: AAAABBBCCDDDDDDDE
Number of symbols in the alphabet = 5
Characters in the alphabet = A,B,C,D,E
Number of bits per symbol = 3
Histogram showing the frequency of the symbols in the alphabet
A | ****
B | ***
C | **
D | *******
E | *
An entertainment application would most likely do which of the following?
A. allow users to watch popular movies and TV shows
B. connect users with social and business contacts
C. confirm users' travel plans
D. teach users a new language
Answer:
A is the answer to this question
Answer:
A. allow users to watch popular movies and TV shows
Explanation:
Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based
Answer:
The modified program is as follows:
user_input = input()
short_names = list(user_input.split(" "))
short_names.pop(0)
short_names[-1] = "Joe"
print(short_names)
Explanation:
This gets the user input
user_input = input()
This converts input to list
short_names = list(user_input.split(" "))
This removes the first item of the list
short_names.pop(0)
This updates the last item to "Joe"
short_names[-1] = "Joe"
This prints the updated list
print(short_names)
Discuss any five positive and five Negative impact
of ICT on society
Answer:
The technology of information communication has the capacity to transform society. It plays a key part and provides the infrastructure needed to achieve each of the United Nations Sustainable Development Goals. It also allows financial integration by m-commerce and lets people connect instantly to millions.
ICT has a particularly important impact on business. It allows people to exchange knowledge and advice immediately and establish a website or online shop at a low cost, thus reducing the obstacles to starting a business dramatically. As such, it is a major factor in change and the maturity of ICTs is strongly connected to economic growth.
Explanation:
Effects of ICT
As a human beings, we are always associated in our everyday life with many essential things. The use of ICT equipment in our lifestyle has simplified many time-consuming calculations and difficult tasks, and social contacts have been strengthened. ICT has affected life by enhancing the timely distribution of media information and improved home and workplace communications via social networking, e-mail, etc.
The quality of human life has been greatly improved by ICT. For example, it could take a few days for a letter to come to the recipient, but a single minute for an e-mail to reach. ICT offers a broader understanding and information for each facility 24 Hrs X 7 days. In the following, ICT affects different fields of daily living.
Positive Impacts of ICT:
As domestic and home businesses.As social connectivity.As E-learning/ As educationAs for shopping/tradingAs for banksAs a job/jobsNegative Impacts of ICT:
Face-to-face interaction reduced.Social Decoupling.Physical activity/health issues reduced.Cost.A) Why should assembly language be avoided for general application development?
B) Under what circumstances would you argue in favor of using assembly language for developing an assembly language program?
C) What are the advantages of using a compiled language over an interpreted one?
D) Under what circumstances would you choose to use an interpreted language?
Answer:
(A) Assembly language should be avoided for general application development for the following reasons:
i. It is difficult to write assembly language codes. It does not contain many tools and in-built functions to help with the development of these applications.
ii. Since general application development requires that the application be machine independent, writing such applications in assembly language (which is a low level, machine dependent language) might be a pain as it would require that the writer have sufficient knowledge of hardware and operating systems.
(B) The following are the circumstances where assembly language should be used:
i. Assembly languages are low level languages that are very close to machine languages that the machine or processor understands. Therefore, when writing codes for programs that should directly communicate with the processor, assembly language should be used.
ii. Since assembly language codes are machine dependent, when there is a need to write applications for target machines, they should be used.
iii. If there is a need to have very great control of certain features of your application and resources to be consumed such as amount of RAM, clock speed e.t.c, assembly languages are a great tool.
(C) Some of the advantages of compiled language over an interpreted language are:
i. Compiled languages are way faster than interpreted languages because the compiled languages are converted directly into native machine codes that are easy for the processor to execute. Put in a better way, with compiled languages, codes are compiled altogether before execution and therefore reduces the overhead caused at run time. Interpreted languages on the other hand executes codes line after line thereby increasing the overhead at run time.
ii. Since codes are compiled first before execution in compiled languages, nice and powerful optimizations can be applied during the compilation stage.
(D) Interpreted languages could be chosen over compiled languages for the following reasons:
i. Interpreted languages are much more flexible and easier to implement than compiled languages as writing good compilers is not easy.
ii. Since interpreters don't need to convert first to intermediary codes as they execute these codes themselves, programs built with interpreters tend to be platform independent.
Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
coworker for immediate handling. What should she do?
O Configure a response for external senders.
O Configure a response for internal senders.
O Only send during a specific time range.
O Configure an Automatic Reply Rule.
Answer:
Configure an Automatic Reply Rule
Explanation:
The Rule feature in Outlook enables a user to respond immediately to a message, to move a message, or to flag a a message.
The Automatic Replies (Out-of-Office) feature can also be used to let colleagues inside the organization know when a user is out of office and the arrangements that they have made
Also, Using the Out-of-Office dialogue box, under the Files tab, Automatic Replies can be configured using the Rules button to add a rule that forwards all messages from the particular client to the email address of a coworker for them to take care of immediate, while sending an automatic reply to the sender about being out of office and that the mail has been forwarded to a coworker to handle
Therefore, Kylee can configure an Automatic Reply Rule
Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?
Answer:
As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.
Explanation:
Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.
Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0 Volume for 4.5, 2.1, 3.0 is: 9.45 Relevant geometry equations: Volume
Answer:
Explanation:
The following is written in Java. It takes in the three values as parameters and then uses the formula for calculating the volume of a pyramid. Finally, returning the volume to the user. A test case has been provided in the main function and the output can be seen in the attached picture below.
class Brainly {
public static void main(String[] args) {
double output = calc_pyramid_volume(4.5, 2.1, 3.0);
System.out.println(output);
}
public static double calc_pyramid_volume(double base_length, double base_width, double pyramid_height) {
double volume = (base_length * base_width * pyramid_height) / 3;
return volume;
}
}
you recieve a phone call from the sterlization monitoring company informing you that the last spore test you sent has failed. What should you check to determine the possible cause
Answer: The type sterilization that was used and how well it was performed
Explanation:
If there's a phone call from the sterilization monitoring company that the last spore test sent has failed, to determine the possible cause, I'll have to type sterilization that was used and how well it was performed.
The sterilization technique used will be analysed, and there'll also be a check for possible human errors. Once thus is done, the possible reason for the failure of the last spore that was sent can then be determined.
१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :
(क) सुशासन र विकास
Answer:
n
Explanation:
Answer:
kkkkkkkkikkkkkkkkkkkiikkiiii
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.
Answer: CPU
Explanation:
The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.
Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.
Therefore, the correct option is C.
Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.
Answer:
128 KB
Explanation:
Given data :
The block size = 512 bytes
Block pointer size = 2 bytes
In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.
Therefore, the maximum number of block pointer in 1 block :
[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]
[tex]$=\frac{512}{2}$[/tex]
= 256
Thus, a block can hold maximum 256 pointers.
It is given the level of indexing is one. So,
Maximum size of the file = maximum number of block pointers in 1 file x block size
= 256 x 512
[tex]$=2^8 \times 2^9$[/tex]
[tex]$=2^{8+9}$[/tex]
[tex]$=2^{17}$[/tex]
[tex]$=2^7 \times 2^{10}$[/tex]
[tex]$=128 \times 2^{10}$[/tex]
= 128 KB (∵ 1 KB = [tex]2^{10} \ B[/tex] )
Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.
How does a junction table handle a many-to-many relationship?
by converting the relationship to a one-to-one relationship
by moving the data from the source table into the destination table
by directly linking the primary keys of two tables in a single relationship
by breaking the relationship into two separate one-to-many relationships
Answer: 4
by breaking the relationship into two separate one-to-many relationships
Answer:
two" (and any subsequent words) was ignored because we limit queries to 32 words.
Explanation:
please mark as brainliest
Answer:
By breaking the relationship into two separate one-to-many relationships
Explanation:
I just did it / edge 2021
such as creating documents using word processing programs or when connecting to the internet.
A- computer indirect
B-supercomputers
C-computers direct
D-personal computer
Could someone explain the question and the answer cause it’s making no sense kind of, like does it mean is it a direct use of the computer or indirect use of the computer?
Answer: Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.
At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.
After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.
Problem:
audio
The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?
audio
the production of light from an organism’s body
audio
the study of creatures that live in the ocean
audio
to move around underwater water like a fish
audio
an organism with a whip-like part it uses to move around in the water
Explanation:
I NEED HELP I'LL GIVE BRAINLEST
Direction can be applied to animations but not transitions.
True
False
Answer: True
Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.
Answer:
I think it's true but I'm not 100% sure.