Answer:
1.a
2.sorry cant read it that wekk
3.c
Explanation:
Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check
Answer:
Essayons
Explanation:
the answer is Language
1. Do our shared social experiences lead us to think
communication is a cure-all?
Answer:
Yes
Explanation:
Shared social illustrations have always shown that any problem of any kind can be sorted by communication.
Eg : Whenever societies face any problem - eg recession, the competent people related to that area of problem (representing different interests of various groups also) sit & discuss (ie communicate in detail) about it.
These communications have seen to be solution to all problems world has faced.
Yes, our shared social experiences lead us to think communication is a cure-all.
This is because, helps the individual in shaping their mental and emotional health for the rest of their life.
With shared social experiences , there would be communication among people and it serves as a cure-all.
Therefore, shared social experiences lead us to think communication is a cure-all.
Learn more about social experiences at:
https://brainly.com/question/24452126
Module 1 and 2 Coding Guided Notes Fill in your answers to each response as you read through the lesson pages in the coding course. Lesson 1.01: 1. Instructions for computers to solve a problem is known as _________. Computer ________ is how humans and machines talk to each other. 2. Learning to code or write a _________ allows for a solution to a problem.
Answer:
Code; code; program.
Explanation:
1. Instructions for computers to solve a problem is known as code. Computer code is how humans and machines talk to each other. Some examples of programming language used to write a code in instructing a computer for the execution of a task are python, Java, Javascript, ruby, c++, c# etc.
2. Learning to code or write a program allows for a solution to a problem.
Answer: 1st: code 2ed:code 3rd:program
Explanation: hope this help's :)
The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.
True/False
Answer:
Yes they are to programmer
Explanation:
Plz give me brainiest
Answer:
true
Explanation:
Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
A. Adhering to taxation rules.
B. Ensuring consumer protection.
C. Identifying limited market segments.
D. Managing consumer relationships.
Answer:
A. Adhering to taxation rules.
Explanation:
This is because, when there is no level playing field for different segments of the business in terms of U.S tax policy, there will surely be challenges in "Adhering to taxation rules."
Given that the statement might imply that there are different rules applicable to different sectors of business, this will make it difficult for the different firms or players involved to follow the taxation rules.
Hence, stating that many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants, indicated that the e-business challenge is "Adhering to taxation rules."
What is a trojan horse in computer science?
Answer:A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program
Explanation:
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.
Answer:
Brute force
Explanation:
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.
In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.
Answer:
D.
triple Data Encryption Standard (DES)
Explanation:
Sincerely : Baby weeb
Given that a computer required service, what is the probability that it was a laptop? Given that the computer required service, the probability that it was a laptop is nothing?
Complete Question:
A campus bookstore sells both types and in the last semester sold 56% laptops and 44% desktops. Reliability rates for the two types of machines are quite different, however. In the first year, 5% of desktops require service, while 15% of laptops have problems requiring service.
Given that a computer required service, what is the probability that it was a laptop?
Answer:
Probability = 0.084
Explanation:
Given
Laptops = 56%
Desktop = 44%
Service Required (Laptop) = 15%
Service Required (Desktop) = 5%
Required
Determine the probability that a selected computer is a laptop and it requires service.
The question tests our knowledge of probabilities using "and" condition.
What the question requires is that, we calculate the probability of selecting a LAPTOP that REQUIRES SERVICE
Note the capitalised words.
This will be calculated as follows:
Probability = P(Laptop) and P(Service Required (Laptop))
[Substitute values for P(Laptop) and P(Service Required (Laptop))]
Probability = 56% * 15%
[Convert to decimal]
Probability = 0.56 * 0.15
Probability = 0.084
Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note
Answer:
End note, I think plz tell me if im wrong thank you
The use of information technology to monitor and control a physical process is known as a. numeric control b. information numeric control c. process control d. computer-aided design
Answer:
c. process control
Explanation:
The use of information technology to monitor and control a physical process is known as process control.
Generally, process control is mainly used in manufacturing industries such as food and beverages industries, oil and gas refinery industries, power (electricity) generation industries, chemical processing industries, and wastewater management industries where the production of materials from raw materials are continuously without any interruption.
The main purpose of process control is to ensure that the manufacturing process is done with better quality, consistency, safety standards and efficiency.
Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max. Ex: When the input is 15 20 0 5, the output is:
In Python 3.8:
nums = list(map(int, input("Enter your numbers space separated: ").split()))
print(f"The largest number is {max(nums)} and the average of all the numbers entered is {sum(nums)/len(nums)}")
Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).this must be written in Coral Language
Answer:
integer userNum
integer x
integer i
put "Enter the user number: "
userNum = Get next input
put "Enter the x value: "
x = Get next input
for i = 0; i < 4; i = i + 1
put userNum/x to output
Explanation:
Coral Programming language is an ultra-simple programming language for learning programming. The first three rows of the code block declare the variables 'userNum', 'x', and 'i'. The "Get next input" and the "Put 'output_value' to output" are used by the program to get input from the user and output a value to the screen respectively.
Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is c)field.
As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.
So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.
Other options are not correct because:
The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.
Answer:
C) Field
Explanation:
I took the test
/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}
/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}
function
move();
turnRight();
move();
move();
turnLeft();
move();
}
i need help finding the issues
anything
Explanation:
I know what to say this time
Answer:
turn right
Explanation:
i think sorry if it is wrong
In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }
Answer:
The loop counts the count() function length of n-1 times with respect to n.
Explanation:
The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.
The n represents the number length of a range of numbers or iterables (like an array).
Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?
Answer:
could you please tell me which grde are you in?
Which of the following is an input device on a toaster?
O the heating element
the tray
O the start button
the electrical outlet
which of the following file formats cannot be imported using Get & Transform
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, the given options are:
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3
The correct option to this question is D- MP3.
Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.
As you know that the GET statement is used to get data from the file and do further processing and transformation.
Copy the formula from cell c5 to the range c6- c11
Answer:
Where is cell c5
Explanation:
The long-run average cost curve is typically _______________________. a) downward-sloping at first but then b) upward-sloping upward-sloping at first but then c) downward-sloping always d) downward-sloping always upward-sloping
Answer:
A. downward-sloping at first but then upward-sloping
Explanation:
The long-run average cost curve is typical "downward-sloping at first but then upward-sloping." This can be shown as the long-run average cost curve is graphically represented in a U shape.
The reason is that the long-run average cost of production initially falls as a result of increase returns to scale as output is increased, however, at some stage beyond this certain this, the long-run average cost of production rises because of decreasing returns of scale.
PLS HELP I WILL MARK BRAINLIEST
Answer:
C
Explanation:
Animal cells each have a centrosome and lysosomes, whereas plant cells do not. Plant cells have a cell wall, chloroplasts and other specialized plastids, and a large central vacuole, and animal cells do not.
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device brought from home. What is put in place to stop such activity.
1- Media Access Control Filtering
2- Channel Overlap
3-WiFi Protected Access 2
4- collision Domain
Answer:
3. WiFi Protected Access 2
Explanation:
Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.
Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.
Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2
Refer to the exhibit. What kind of NAT is configured on the ASA device?
Answer:
A network administrator has configured NAT on an ASA device
Explanation:
How DNS service are to be deployed on the network (15 -30 words)
When we code an algorithm, we need to provide the commands in the order we want the
computer to carry them out.
Answer:
true q it says it needs 20 characters so here you go
Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to an array; a2 is pointer to an array a1 is array of pointers; a2 is pointer to an array a1 is array of pointers; a2 is array of pointers
Answer:
The answer is "a1 and a2 is an array of pointers".
Explanation:
In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.
2. Use the correct membership operator to check if "banana" is not present in the fruits object
fruits = ["mango", "orange") if
"banana"
fruits:
print("Yes, apple is a fruit!")
Answer:
if not "banana" in fruits:
Explanation:
Given the code segment
Required
Fill in the missing blank
Literally, membership operators are used to check the membership of an item in lists, tuples, strings, etc.
The given code segment defines a list named fruits with two items.
To check if "banana" is not in fruit, we make use of the following statement:
if not "banana" in fruits:
Which means if banana is not in fruit
Having done that, the complete program would be:
fruits = ["mango", "orange"]
if not "banana" in fruits:
print("Yes, apple is a fruit!")
The project sponsor has asked Franz to hold a kickoff meeting for their project. What is the purpose of a
kickoff meeting?
Select an answer:
Introduce the team to the project, processes, and to one another.
Obtain approval for the team to start work on their assignments.
Provide an opportunity for the sponsor to talk about the project,
Obtain approval of the project plan.
Answer:
Introduce the team to the project
Explanation:
You never want to get ahead always start slown and easy for the team so none gets left behind also can i get brainliest
The purpose of the kickoff meeting is Introduce the team to the project, processes, and to one another.
The information regarding the kickoff meeting is as follows:
In this, the team members get to know each other.It helps team members to understand the objectives of the project.Also it permits the stakeholders for understanding the risk, assumptions, etc.Learn more: brainly.com/question/17429689
you should restrict access to your system both online and offline. Is it true or false
Answer:
false
Explanation:
to keep personal information secure
Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.c. use a star topology with one device, usually a switch.d. are the least common type of BN used in one building.e. switch the traffic based on layer 3 addresses.
Answer:
c
Explanation:
spongo