It's a computer program that distributes web pages as they are requisitioned. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP).
Answer:
A web server is hardware that is dedicated to running the software. A web server can contain one or more websites, and does what clients want and can process incoming network requests.
please help, thank you
Answer:
radish spinach swiss chard
Explanation:
how do i get around a school related block
Answer:
try putting "uk-" or "us-" depending on where you are, you could also go through your settings and try to allow everything.
Answer:
Some schools have the option to block only on regular tabs, try going into settings and disabling the block to go on incognito tabs.
Another option would be to use a different web browser, something less known but good enough that it works and isnt blocked.
You can also find certain things on online where it tells you what websites to go to, then copy a link and paste it down into the search bar where the page will come up unblocked.
I hope this helped!
PS: If you go into certain websites, block third party cookies. ;)
If you had three extra siblings, what would be your birth order and what personalities would you like them to have?
Answer:
mixed personalities l
that will be cool
Answer:
I already have 4 step brothers, 2 real brothers, 1 step sister, and a half sister, so 3 more people would be a lot. If I got to pick their personalities and gender, I would want 1 more sister and 2 more brothers. I would watn a more alt brother, a more fem brother, and an indie sister. Kinda just an aesthetic type for them.
Debugging is finding and fixing problems in an algorithm or program. True
or False.
False
True
Debugging is finding and fixing problems in an algorithm or program is True statement.
Debugging is indeed the process of finding and fixing problems, errors, or bugs in an algorithm or computer program.
When a program does not produce the expected output or behaves unexpectedly, programmers use debugging techniques to identify and resolve the issues.
This involves analyzing the code, checking for syntax errors, logical errors, and unexpected behavior, and making the necessary corrections to ensure the program functions correctly.
Thus, the given statement is True.
Learn more about Debugging here:
https://brainly.com/question/9433559
#SPJ6
Which of the following is NOT true regarding fonts which should be used in memos?
O Typically serif fonts are used such as Times New Roman
O Typically sans-serif fonts are used such as Arial
O Headers should be 12-point font size
O Body text should be 10-point font size
Answer: Typically serif fonts are used such as Times New Roman.
Explanation: Have a gr8t day and pls mark me brainliest.
The data type of 17.3 should be ________________.
int
float
str
list
Please answer quick.
Answer:
float
Explanation:
Answer:
17.3 should be a float
Explanation:
Float type is a data that is contain a decimal number
Complete the following sentences.
You can use shapes to create various
v. Conventional
associations continue even though trends keep changing.
BIG TEST NEED TO PASS IM FAILING
Answer:
symbols and symbolic
Explanation:
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name. Should he do it?
Answer:
Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.
Explanation:
In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.
Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.
Basically, this type of cyber attack is simply known as baiting in social engineering.
Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.
Which of the following is a database object which allows you to ask the database about the information it contains?
A Report
B filter
C sort
D Form
Answer:
Report
Explanation:
Report shows the information being contained by a database.
Which graph or chart shows changes in the value of data?
a
Bar graph
b
Column chart
c
Line graph
d
Pie chart
Answer:
Bar graph and Pie chart
Answer:
C And D
Explanation:
edge2020 users
Match the image to its type.
Rgb messes up taking pics from a iPhone 11 to a computer sorry it looks bad
Warm Colors:
Red flowersOrangesCool Colors:
Blue skiesPurple butterfliesNeutral Colors:
Brown woodWhite birdsReds, oranges, and yellows are considered warm, and greens, teals, blues, and purples are considered cool. Colors such as white, black, brown, or gray are all neutral.
it was field day for the upper grades at Rock Creek School,
Each grade had to choose a team name and a color for their tee-shirts,
Use the clues below to figure out what each grade chose for their team name and tee-shirt color, each grade can chose one color and one team name.
- The third and fifth grades didn't choose an animal for their team name.
-The forth grade ended up with red tee-shirts with sharks on the.
-The fifth graders and tornadoes are not wearing teal.
-The bears are wearing green.
Answer:
its c
Explanation:
which part of the brain controls the movement of muscles
Answer:
PLEASE MARK AS BRAINLIEST
Explanation:
Cerebellum
Cerebellum. The cerebellum (back of brain) is located at the back of the head. Its function is to coordinate voluntary muscle movements and to maintain posture, balance, and equilibrium.
Major innovations made from the establishment of abucus to the 5th computer generation
Answer:
Cogs and Calculators
It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."
Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).
Explanation:
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
Answer:
These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.
Explanation:
Dual Stack Routers - This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses
Tunneling -Tunneling is used as a medium to help the different IP versions communicate with the transit network.
NAT Protocol Translation - This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.
The two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.
A datagram can be defined as a transfer unit that is associated with a packet-switched network. Internet Protocol version 6 (IPv6) is a protocol used for packet-switched inter-networking. The IPv6 is a protocol used for end-to-end datagram transmission through multiple Internet Protocol networks.In conclusion, the two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.
Learn more in:
https://brainly.com/question/14851068
Two light bulbs are connected in a series circuit. You add a third bulb in a series. All three bulbs are identical. Which of the following will happen?
Answer:
The bulbs would becom dim
Explanation:
The 3rd bulb adds too much resistance that the other bulbs go dim
Question #5
Multiple Choice
Suppose this is your user-defined data type.
class player:
life = 3
magic = False
name = "
Which statement creates an instance of your data type?
O myPlayer = player()
O myPlayer.player()
O myPlayer = new player()
O myPlayer = player
Answer: myPlayer = player()
Explanation: correct edge answer 2020
Answer: myPlayer = player()
Explanation: got it right on edgen
How does entertainment relate to coding?
Answer:
not sure if this is the type of answer you're looking for but: Entertainment can relate to coding because in TV shows and movies, there is lots of editing. Especially with cartoons. Inorder to make these, we have to use coding. This can even relate to real life plays and preformenses depending on how much technology you use to preform them.
Which job role requires you to create user guides for computer products and services?
A
creates users guides for computer products and services.
Reset
Next
Which job role requires you to create user guides for computer products and services
Answer: Technical writer
Explanation:
A technical writer is an individual who is responsible for the creation of technical documents such as user manuals, reference guides, instruction manuals, journal articles, etc.
Technical writers can work in software firms as they would be responsible for creating user guides for computer products and services.
Answer:
The answer for the blank box is : technical writer
Explanation:
Hopefully this is right!
have a great day/eve!
If you would like to compare information on two different Web pages, you should _____.
scroll through the pages
the home page
use tabs
organize bookmarks
Answer:
Use Tabs
Explanation:
I had this lesson on odyessy ware and this was right the other guy is wrong
Answer:
Use Tabs is also correct on Edge nuity
Explanation:
i have Keyboarding and Apps
PLEASE ASAP!!
Today, most film editors manually cut and splice the actual film footage once it arrives.
O True
O False
Answer:
True
Explanation:
edg2021
The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task
What improved image quality in televisions?
A: FM technology
B: AM technology
C: color CRTs
D: black-and-white CRTs
E: coaxial cables
Answer:
coaxial cables are the answer
Four students measured the mass of a piece of metal whose accurate mass is 34.75g. Their results are 34.2g, 33.75g, 35.0g, and 34.69g. Explain whether the results are precise or accurate
Answer:
The given data are more precise than they are accurate
Explanation:
From the given measurements, we have;
The accurate mass = 34.75 g
The deviations from the accurate measurement is as follows;
34.2 g - 34.75 g = -0.55 g
33.75 g - 34.75 g = -1 g
35.0 g - 34.75 g = 0.25 g
34.69 g - 34.75 g = -0.06 g
For precision measurement, we find the average deviations as follows;
The sum of the deviations = -0.55 g - 1 g + 0.25 g - 0.06 g = -1.36 g
The average deviation = -1.36 g/4 = -0.34 g
For accuracy measurement, we find the average of the absolute deviations as follows;
The sum of the absolute deviations = 0.55 g + 1 g + 0.25 g + 0.06 g = 1.86 grams
The average absolute deviation = 1.86 g/4 = 0.465 g
Therefore, the magnitude of the average deviation is less than the magnitude of the absolute deviations, therefore, the given data are more precise than they are accurate
Wearables, video playback and tracking devices can help athletes because
Answer: rap accusations
Explanation:
Which best describes what databases do?
They guarantee users find needed data.
They create categories for data.
They identify important data.
They enable users to search for data.
Answer:
I think the first one
Explanation:
not sure you can also do some research bout it
The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or Voice over IP, for example.
Answer:
:L
Explanation:
Answer:
symmetric cryptography
Explanation:
What is a resistor?
O A switch
O A light bulb
O A battery
Answer:
A Battery would be the correct awncer
A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1
Answer:.
Explanation:
An identifier that allows multiple elements in an HTML document to be
styled in the same way
Answer:
CSS , (Possibly Divs)
Explanation:
I have picked CSS, and possibly Div's as my main explanation and answer here is why.
CSS - Cascading Style Sheets, this allows you to edit multiple elements in a HTML document, such as the color or any CSS attribute.
If you would like to learn more about CSS, and the multiple options that CSS provides such as Internal Styles, External Styles, lastly In-line styles. I highly recommend the resource "W3Schools".
DIV's - Divs are basically like a container, where you can input styles into this container that can effect those elements such as if I want the background-color, of the div it would effect all the elements inside that div. However, I said this could be a possibility since it isn't CSS where it is styled however you can group these elements to one div. You can also edit the CSS of the Div to effect it.
anybody wanna be friends?
yes Avacado?????????????????????