the process of transferring files from computer to internet is called....

Answers

Answer 1

Answer: key points    

explanation

Answer 2

Explanation:

UPLOADING is the transmission of a file from one computer system to another, usually larger computer system

HOPE IT'LL HELP U


Related Questions

the building of an online presence and authority is called
A. a status update
B. social media
C. social capital
D. Web feed

Answers

Answer:

I think A sorry if wrong

Explanation:

have a good day

Answer: C, social capital

Explanation: I just did the test

Dalton needs to prepare a close-out report for his project. Which part of the close-out report would describe how he would plan and manage projects in the future?

Answers

The part of the close-out report would describe how he would plan and manage projects in the future is summary of project management effectiveness.

What is summary?

A summary is known to be a short statement or the restatement of key fact , mostly in a form of  a conclusion to a work.

Note that in the above case, The part of the close-out report would describe how he would plan and manage projects in the future is summary of project management effectiveness.

See the options below

Select an answer:

project highlights

major changes and risks

summary of schedule and cost performance

summary of project management effectiveness

Learn more about report from

https://brainly.com/question/24256083

#SPJ1

What type of scripts can tap in to your mobile device’s GPS location, which can then be used in a game?
geo-location scripts
geo-level scripts
heightmap scripts
evasion vector scripts

Answers

Answer:

geo-location scripts

Explanation:

see above

: Compute the 9 partial derivatives for the network with two inputs, two neurons in
the hidden layer, and one neuron in the output

Answers

Using the python code we can say that it will be possible to calculate the neutrons and organize them as:

The code can be written as:

def get_total_derivative(self,l_id):

def sigmoid(x, div = 0):

if div == 1:

return np.exp(-x) / (1. + np.exp(-x))**2.

if div == 2:

return - np.exp(x) * (np.exp(x) - 1) / (1. + np.exp(x))**3.

return 1. / (1. + np.exp(-x))

def linear(x, div = 0):

if div == 1:

return np.full(x.shape,1)

if div > 2:

return np.zeros(x.shape)

return x

See more about python at brainly.com/question/18502436

#SPJ1

An example of people working for a social cause is when a:
A.family complains to a restaurant manager that the food and service were poor
B.group stands on the corner with signs urging people to spray or neuter their pets
C.government decides that a certain newspaper company must be shut down.
D.student writes in his journal about how much he enjoyed visiting a national park

Answers

Answer:

B. Group stands on the corner with signs urging people to spray or neuter their pets.

Explanation:

It is B because they are fighting for people to neuter their pets to probably to avoid having so many strays

which set of possible outputs can result from a Boolean function
A. Movement or sound
B. If or then
C. True or false
D. High or low

Answers

The set of possible outputs that can result from a Boolean function is known to be True or false.

What is the output of Boolean?

In Boolean Algebra terms, that which is known to be the output will only come out as TRUE only if all of its inputs are TRUE and false if it is not.

Therefore, The set of possible outputs that can result from a Boolean function is known to be True or false.

Learn more about Boolean function from

https://brainly.com/question/13265286

#SPJ1

fast i need now ill give anything
Why is compressed air energy storage considered to be very useful?
A. because it allows people to use the resource at the exact time they need it
B. because it uses outside electricity to change the speed of the flywheel
C. because it stores electricity as rotational energy
D. because the vacuum chamber reduces friction and minimizes energy loss

Answers

Answer:A

Explanation:

Because compressed air energy storage (CAES) is known to have strong potential to deliver high performance energy storage at large scales for relatively low costs compared with any other solution.

Answer: A. because it allows people to use the resource at the exact time they need it

Explanation:

How often your users’ geolocation and your geofences trigger depends on your:
age.
interface.
event models.
user base.

Answers

Answer:

user interface

Explanation:

Geofences are like virtual boundariesThey define your boundaries or limit while dealing with something virtually.They try to help in locating you or use your proximate location sometimes for privacy

What is returned by the code: range (20, 100, 20)

Answers

The code that is returned by the code: range (20, 100, 20)  is known as  (20, 50, 80).

What is this code about code?

The line of code is known to be one that often returns the ASCII code as the ASCII is known as American Standard Code for Information Interchange.

Note that the code is made up of   seven bit code and thus the code returned for range (20, 100, 30) is (20, 50, 80).

Learn more about code from

https://brainly.com/question/20796198

#SPJ1

Word frequencies (lists)

Answers

A list in programming is list of values for a given parameter enclosed in a square bracket and separated by commas.

Worde frequences ( lists )

A list can contain a mixture of string, integer and float values while a list can also be mutable when required to add or delete value(s) from the list.

The debugged lines of code ( file ) which can be run with zyBooks Lab 7.8 is attached below

Learn more about lists in programming : https://brainly.com/question/26352522

#SPJ1

Controlling costs and managing a budget are important only at the beginning of a project. Figuring out the total cost of a project after work has started is good management. The project manager must be aware of all costs when allotting a specific amount of money to each task throughout the project.

Answers

Answer:

bank offinjiniwniqnwjwnnww. jwiejien3I2n2 jwiwjwn2 no2no2n2I2nwjn2i

Answer:

False False True

Explanation:

because yes

a) In order to execute a program, instructions must be transferred from memory along a bus to the CPU. If the bus has 8 data lines, at most one 8 bit byte can be transferred at a time. How many memory accesses would be needed in this case to transfer a 32 bit instruction from memory to the CPU? ​

Answers

Answer: 4 memory accesses

.........We should now focus on the 8 bit byte and how many can it transfer at a time. Notice how I bolded that word so we no know that we should fivide the 32 bit instruction divided by the 8 bit byte which would be 4 memory acesses

what is the broad overview of a class scheduling software​

Answers

Answer: basically you run the time management of a company

Explanation:

You can perform the collaborative scheduling

You can minimize the scheduling conflicts

Easy to track management insight

Increase efficiency

Keep your staff updated

Track of time and attendance

which are characteristics of digital video?

Answers

Answer:

Digital Camera-based System.

External ADC System.

Video Frame Grabber Card-based System.

Explanation:

A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-time adjustments to service delivery. Which technology would the business combine with its current cloud operations to make this possible

Answers

The technology would the business combination with its current cloud operations to make this possible are ERP and loT.

What is the ERP?

Enterprise resource planning (ERP) refers to a shape of a software program application that companies use to manipulate each day industrial organization sports activities in conjunction with accounting, procurement, task management, chance manage and compliance, and supply chain operations.

Given the organization has a cloud setup, we need a company solution (ERP system) which needs to be to be had to all stores and loT to build up facts from devices and deliver it over to the ERP system. This will help to connect records at some crucial databases in cloud from all the stores. There need to be record protection features as well to maintain the records intact, all profits features need to be incorporated and tested.

Read more about the ERP :

https://brainly.com/question/14635097

#SPJ1

Wollongong City council is interested in the growing tourism market and opens an office to launch services for people who travel on holidays and cannot look after their properties (houses or units) while they are away. This new office currently has 200 employees whose PCs are linked by a small LAN. Each PC shares files and also services (such as printing) with the others on the LAN. What type of network model is suitable to build a small LAN for this new office? How can you protect your LAN from Malware attacks?

Answers

Answer:

list five characteristics of cpu

Which data value is most likely an outlier in the dataset below?

89, 100, 95, 26, 79, 85, 98, 75

Answers

The answer is A, 26. Hope this helps!

PLEASE HELP!!
Read the following characteristic:
Programmers will write code and have objects interact and perform actions.
How would you classify it?

A disadvantage of object-oriented programming
A purpose of object-oriented programming
A result of procedural programming
An aspect of procedural programming

Answers

Based on the above, I will classify it as purpose of object-oriented programming.

What is this programming about?

The  object-oriented programming (OOP) is known to be where the programmer thinks in regards to the objects instead of the functions.

Note that Objects are said to be defined here via the use of a class and are known to be parts of the program that can does certain actions and interact with one another.

Therefore, Based on the above, I will classify it as purpose of object-oriented programming.

Learn more about Programmers from

https://brainly.com/question/23275071

#SPJ1

Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the computer network. A new methodology for finding patterns in data that signify infections was investigated in IEEE Transactions on Information Forensics and Security (May 2013). The method uses multiple filters to check strings of information. For this exercise, consider a data string of length 4 bytes (positions), where each byte is either a 0 or a 1 (e.g., 0010 ). Also, consider two possible strings, named and In a simple single filter system, the probability that and differ in any one of the bytes is .5. Derive a formula for the probability that the two strings differ on exactly of the 4 bytes. Do you recognize this probability distribution?

Answers

What is Network forensics ?

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

https://brainly.com/question/24756209

#SPJ1

why we use cluster computing and hadoop framework for big data sysetm​

Answers

Answer:

Explanation:

Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.

A collection of modules and packages that can be imported into a program is called

Answers

Answer:

library

Explanation:

class - used to create objects

documentation - provides information on the program's workings

function - this is part of a module

Java calculate average three numbers two decimal points

Answers

Answer:

Write a Java program to calculate the average of 3 numbers. Sum = num1 + num2 + num3. Then we calculated the average value as avg = sum / 3.

Explanation:

With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of
operations at his NGO. He wants to keep track of all the blankets he has in stock and be able to
determine how many he has left on distribution days. In the past, it has happened that Lungi thought
he had blankets to hand out but in fact had none left.
Lungi found out that you are an IT student who needs to find a client for their final year IT project. He
has volunteered to be your client.
Q.1.1 Plan the logic for Lungi’s application using pseudocode. The logic needs to satisfy
the following needs:
 The application will need to allow Lungi to enter the number of blankets he
wishes to distribute on a given day.
 The application should keep track of the number of blankets handed out to
ensure that Lungi does not hand out more blankets than he has.
 The application will need to warn Lungi when he has only one (1) blanket
left to hand out.
 Once all the blankets have been handed out, the following report should be
produced:
 The pseudocode should incorporate the use of modules.
 The pseudocode should implement the features of good program design.
 Use at least one loop structure appropriately.
 Use at least one selection structure appropriately.

Answers

Answer:

please can you make this question make sence so i can at least try to help by answering this question for you

Help me please!!!. And if you gonna copy from the internet make the sentence sound different so the teach doesn’t know I’m copying ty!

Answers

Answer:

10. Letter 'm'

11. It's about baseball. The catcher and the umpire

12. An anchor

Which of the following algorithms is deterministic, in the sense that for a given input, a constant output will necessarily be given?

Select the best answer



Select one:
A.
The K-Means algorithm with the Lloyd method

B.
The K-Means algorithm with the Forgy method

C.
The K-Means algorithm with the K-means++ method

D.
The K-NN algorithm with a weighted average

Answers

The following algorithms is deterministic, in the sense that for a given input, a constant output will necessarily be given are C.The K-Means algorithm with the K-means++ method.

What is the difference between What is the distinction among K method and K-method ++?

Both K-method and K-method++ are clustering strategies which comes beneath neath unsupervised learning. The fundamental distinction among the 2 algorithms lies in: the choice of the centroids round which the clustering takes place. okay methodthe ++ eliminates the disadvantage of K method that's it's miles depending on initialization of centroids.

This set of rules guarantees a wiser initialization of the centroids and improves the first rate of the clustering. Apart from initialization, the relaxation of the set of rules is similar to the same old K-method set of rules. That is K-method++ is the same old K-method set of rules coupled with a wiser initialization of the centroids.

Read more bout the  K-Means algorithm:

https://brainly.com/question/15016224

#SPJ1

Name the folder inside which the folder "first term' and second term' are located.​

Answers

Answer:

............................................

A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and efficiently perform research and conduct clinical trials.

How can a Cloud-first strategy help this client?


by providing a data and analytics platform that keeps the client's legacy systems intact


by providing a data-centric approach that offers more speed, agility, and security


by transforming and upskilling the client's workforce to build their own Cloud solution


by automating the entire scope of the client's business

Answers

A cloud-first strategy helps this client by providing a data-centric approach that offers more speed, agility, and security. Thus, the correct option is B.

What is a Cloud-first strategy?

A cloud-first strategy may be defined as an operational strategy that allows the users to reposition all or most of their infrastructure to cloud-computing platforms.

A cloud-first strategy helps this client in numerous ways. It provides a data-centric approach that offers more speed, agility, and security to its customers or clients in a facilitated manner.

Therefore, the correct option for this question is B.

To learn more about the Cloud-first strategy, refer to the link:

https://brainly.com/question/24719487

#SPJ1

If I bought a PC, what is the official way to get all of the drivers and runtimes?​

Answers

Answer: To get drivers to go to the website of the computer

Explanation:

Like if it is Dell or HP or ASUS  the drivers will be on the site if you have the serial number and make of your pc. The site will have phone numbers if you have problems and email help ...

Plus the site will have all the specs of your PC depending how new it is for the runtimes

A particular talent competition has five judges, each of whom awards a
score between 0 and 10 to each performer. Fractional scores, such as 8.3, are allowed. A
performer’s final score is determined by dropping the highest and the lowest score received, then
averaging the three remaining scores. Write a program that uses these rules to calculate and
display a contestant’s score. It should include the following functions:
• getJudgeData() should ask the user for a judge’s score, validate it, and then return it. This
function should be called by main once for each of the five judges.
• calcScore() should drop the highest and lowest score and then calculate and print the
average of the three scores that remain. This function should be called at least once by
main and should be passed the five scores. These averages should be rounded to the
tenths decimal place. Make sure you are rounding after your calculation (3.57 = 3.6 and
3.54 = 3.5)
Two additional functions, described below, should be called by calcScore, which uses the
returned information to determine which scores to drop.
• findLowest() should find the lowest of the five scores passed to it.
• findHighest() should find and return the highest of the five scores passed to it.
In JAVA programing

Answers

Using the C++ code we can say that it will be possible to calculate the points as follows:

Writing this code we will have:

#include <iostream>

using namespace std;

void getJudgeData(double *);

void calcScore(double[], int);

double findLowest(double[], int);

double findHighest(double[], int);

int main()

{

double scores[5];

int i;

int s=5;

double avgScore;

cout << "\n Enter each Judge's score.\n\n\n";

for(i=0;i<5;i++)

{

cout << "\n Enter Judge #"<< i+1 <<" score: ";

getJudgeData(&scores[i]);

}

See more about C code at brainly.com/question/17544466

#SPJ1

how does abstraction make programming languages easier to use
A. It eliminates the need for codes to be automated
B. It uses calculations that all computers understand
C. It uses words instead of binary code
D. It uses letters instead of numbers

Answers

Abstraction make programming languages easier to use as  It eliminates the need for codes to be automated.

How does abstraction make programming languages easier to implement?

Data abstraction is known to be a tool that helps a person to change a complex data structure into simple ones which can be used easily.

Note that Abstraction make programming languages easier to use as  It eliminates the need for codes to be automated.

Learn more about abstraction from

https://brainly.com/question/7994244

#SPJ1

Other Questions
Does anyone know how to do this Im really confused Using the expansion of (1-(x/2))^8 and a suitable value of x, evaluate 0.996^8 to 5 d p Cool air tends to... A. Be less dense and flow over warm air. B. Be lifted up by more dense warm air. C. Be more dense and flow under warm air. D. Mix easily with warm air masses. PromptWhat do you think the future will be like? How will people dress? What will transportation be like? What things will be thesame as now? What things will be different? In your opinion, will life be better or worse?Your response must contain at least 5 detailed and complete sentences in Spanish.You will be graded on (a) appropriate use of grammar and vocabulary, (b) completeness and detail of the response, and (c)overall quality of the response. can someone help me pls PLEASE HELP ASAP WILL MARK BRAINLY Determine the scale of a map if the distance between 2 towns is 20km and the map distance is 5cm In three to five sentences, describe how the arms race during the Cold War increased tensions.(25 points)Keep it simple as im only a 5th grader HELPPPPPP!!! SCIENCEEE An example of a quantity restriction isA.price supports in agriculture.B.an import quota. C.the minimum wage.D.rent controls. No man can fully grasp how far and how fast we have come, but condense, if you will, thThis question has two parts. Answer Part A, and then answer Part B. ,begin emphasis,Part A,end emphasis, Which point of view about space travel does President Kennedy ,begin emphasis,most,end emphasis, clearly express in the speech?e 50,000 years of man's recorded history in a time span of but a half-century. Stated in these terms, we know very little about the first 40 years, except at the end of them advanced man had learned to use the skins of animals to cover them. Then about 10 years ago, under this standard, man emerged from his caves to construct other kinds of shelter. Only five years ago man learned to write and use a cart with wheels. . . . The printing press came this year, and then less than two months ago, during this whole 50-year span of human history, the steam engine provided a new source of power. paragraph 2,Newton explored the meaning of gravity. Last month electric lights and telephones and automobiles and airplanes became available. Only last week did we develop penicillin and television and nuclear power, and now if America's new spacecraft succeeds in reaching Venus, we will have literally reached the stars before midnight tonight. Can you identify the characteristics of plants that typically grow in early and late stages of secondary succession in an abandoned farm field what is true about this linear inequality y>3/4-2 how are ideological labels a benefit for voters and harmful at the same time? When someone who is about to leave for work checks the stove 10 times to make sure it is turned off, that person is exhibiting a(n): 4.Which of the following excerpts from the text provides the best evidence to supportthe argument that the Woken's behavior began to change once they were in theirartificial bodies? Which equation is showed in the graph above Mention one application of AI from the real world?What are the benefits of using this application?What is type of learning used in this application (Supervised or Unsupervised Learning? What was the positive aspect of the railroads in the late 1800s?A. The railroads connected people and products all over the United StatesB. The railroads did not travel to the westC. The railroads charged a very high price to ship productsD. The railroads were controlled by a monopoly Why was gilman advised "never to touch pen, brush, or pencil again"? her doctor believed that shed been poisoned by ink, paint, and lead. her doctor believed that intellectual effort was making her ill. her doctor was afraid that she would write something negative about him. her doctor was afraid that she was not strong enough to hold the tools.