Today
ABCDEFGH. What letter comes three to the right of the
letter that comes immediately to the left of the letter
that comes three to the right of the letter immediately
to the left of the letter B?

Answers

Answer 1

Answer:

Ourr letter is D. On three positions right, the letter is G. → Thus, our answer is G. So, G is the letter which is three to the right of the letter immediately to the left of the letter three to the left of the letter two to the right of letter F.

Explanation: hope it helps friend


Related Questions

Which formula is used to measure accuracy?

Answers

The accuracy formula provides accuracy as a difference of error rate from 100%. To find accuracy we first need to calculate the error rate. And the error rate is the percentage value of the difference of the observed and the actual value, divided by the actual value

(C) Describe about the different types of computer
peripherals and memory devices.

Answers

Computer peripheral device

Monitor.

Monitor. Keyboard.

Monitor. Keyboard. Mouse.

Monitor. Keyboard. Mouse. Trackball.

Monitor. Keyboard. Mouse. Trackball. Touchpad.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.

MEMORY DEVICES :

The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!

RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.

Thus, Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.

4. The is the metal box that contains the main components of the computer ​

Answers

Answer:

The computer case

Explanation:

"The computer case is the metal and plastic box that contains the main components of the computer, including the motherboard, central processing unit (CPU), and power supply. The front of the case usually has an On/Off button and one or more optical drives."

In the code segment below, assume that the ArrayList object numbers has been properly declared and initialized to contain [0, 2, 4, 5]. for (int k = numbers.size() - 1; k >= 0; k--) { if (numbers.get(k) > k) { System.out.print(k + " "); } } What, if anything, is printed as a result of executing the code segment?

Answers

Answer:

Result: C The output that will be printed will be:  3 2 1 If the program is executed, the loop runs in reverse. So it runs from 3 to 0. In the first iteration: at index 3 the corresponding number is 5, so since 5 is greater than present value of k.

examples of a computer organizing itself

Answers

I don’t think if there is one that can do that only softwares

Amazon Web Services (AWS) has several data centers which have multiple processors that perform computations.

a. True
b. False

Answers

There is several data centers associated with Amazon Web Services (AWS) and this contain multiple processors that perform computations.

What is a data center?

A data center serves as a building that house computer systems as well as associated components for data processing. These center helps in telecommunications and storage systems.

In Amazon Web Services, these data centers contains multiple processors which is been used in computations. The processor is usually sequence with their IDs.

Learn more about data center  at;

https://brainly.com/question/25605883

Excel 365 is primarily used to produce Word documents.

Answers

If this is a true and false question it would be False

Excel 365 is primarily used to produce Word documents is a false statement.

What is Microsoft Word and Excel meant for?

Microsoft Word is known to be a kind of word processing software that is often used for writing letters, memos, reports and others.

The Microsoft Excel is known to be a spreadsheet software that is meant to be used for calculations, creating charts and recording data about any  business processes.

Conclusively, Excel 365 is primarily used to produce calculations and not word document.

Learn more about Excel from

https://brainly.com/question/25879801

_____ is the use of large amounts of data, organized and presented to identify patterns and trends. Continuous Improvement Continuous Improvement Usability testing Usability testing Analytics Analytics System implementation

Answers

Analytics is the use of large amounts of data, organized and presented to identify patterns and trends.

What is Data?

This is defined as the raw form of information which has to undergo processing and analysis.

Analytics involves the use of data which aren't easily detected in ensuring that patterns and trends are identified through their interpretation.This therefore makes it the most appropriate choice.

Read more about Analytics here https://brainly.com/question/25819900

Answer:

Analytics

Explanation:

got it right on edge

what is the numeric value of 19%(2+3) as evulated by Java

Answers

Answer:

4

Explanation:

java does parenthesis first then mod so it will do 2+3 which is 5 then 19 mod 5 which is 4(5 goes in evenly 3 times for a total of 15. Mod is the remainder number meaning that 19-15 = 4).

4. What organization is responsible for publishing Request for Comments (RFC)?

Answers

Answer:

IETF

Explanation:

The Internet Engineering Task Force.

What module do you need to import in order to use a pseudo-random number in your game?

A. randomizer
B. guess
C. guesser
D. random

Answers

D: Random I don’t think the others are even valid python Libs

By using the radiant method from the random module and need to import in order to use a pseudo-random number in your game.

What is randint method?

The randint() method is a method or function in the random python module. It is used to get or return an integer number within a specified range.

To use the method, the module must be imported into the python file with the "import random" statement, then the method is referenced using dot notation and specifying the range of integer numbers. Syntax: random. randint first_number, last_number note that the last number in the range is inclusive in the selection.

Random numbers refers to a set of unbiased numbers formed within a defined set of interval. Random number generation using programming paradigm are done using the random module and not the math module.

Therefore, By using the radiant method from the random module and need to import in order to use a pseudo-random number in your game.

Learn more about radiant method on:

https://brainly.com/question/29102331

#SPJ2

A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like to know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)

Answers

The Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

What is a penetration test?

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

Operating systemWeb softwareHost deviceNetwork

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

The Network Mapper (Nmap) commands.

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

Read more on penetration test here: https://brainly.com/question/25813524

Anyone know why my pc won’t start up I upgraded my ram and everything seems fine

Answers

Answer:

RAM Slots

Explanation:

If you upgraded RAM then check if RAM is in correct slots according to the Motherboard Manual, i had the same issue when i replaced my RAM.

A web application's code prevents the output of any type of information when an error occurs during a request. The development team cited security reasons as to why they developed the application in this way. What sort of security issues did the team have concerns about in this case?

Answers

Answer:

Revealing database server configuration

Explanation:

The sort of security issues did the team have concerns about in this case is Revealing database server configuration.

What is revealing database server configuration?

A. Revealing database server configuration is known to be a kind of web application's code that hinders the output of any kind of information only if an error is taken place during a request.

Therefore, based on the scenario above, The sort of security issues did the team have concerns about in this case is Revealing database server configuration.

Learn more about  application's code from

https://brainly.com/question/23275071

#SPJ2

2 What is the different between mouse and trackbeel?​

Answers

Answer:

Trackball and Mouse is that trackball is a stationary pointing device with a ball on its top or side. While mouse is a pointing device that fits comfortably under the palm of your hand. With a mouse, users control the movement of the pointer.

Explanation:

I hope this helps!

Answer:

mouse moves by using a sensor to see how far the mouse has moved in real time and give the input to the computer. and a trackball uses sensors to see how far the ball has moved and give the input to the computer

Explanation:

Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-parameter constructor. Use TestFitnessTracker2 to test the new version of the class.

FitnessTracker2.java:
import java.time.*;
public class FitnessTracker2 {
String activity;
int minutes;
LocalDate date;
public FitnessTracker2() {
}
public FitnessTracker2(String activityParam, int minutesParam, LocalDate dateParam) {
}
public String getActivity() {
}
public int getMinutes() {
}
public LocalDate getDate() {
}
}

TestFitnessTracker2.java:
import java.time.*;
public class TestFitnessTracker2
{
public static void main(String[] args)
{
FitnessTracker2 exercise = new FitnessTracker2();

System.out.println(exercise.getActivity() + " " + exercise.getMinutes() +
" minutes on " + exercise.getDate());

// code to test constructor added for exercise 3b

LocalDate date = LocalDate.of(2020, 8, 20);
FitnessTracker2 exercise2 = new FitnessTracker2("bicycling", 35, date);

System.out.println(exercise2.getActivity() + " " + exercise2.getMinutes() +
" minutes on " + exercise2.getDate());
}
}

Answers

Answer:

Is this coding?

Explanation:

hello everyone can help me give all the answer​

Answers

Answer:

1. were

2. were

3 was

4 was

5 were

1 wasnt

2 werent

3werent

4 wasnt

5 werent

were you at work?

was it in the garden?

were they worried?

was lucy present?

were his friends late?

1 they were

2 it was

3 he wasn't

4 I was

5 they weren't

Explanation:

A(n) _____ is a network connection device that can build tables that identify addresses on each network. Group of answer choices switch adapter card dynamic router hub

Answers

A network connection device that is designed and developed to build tables that identify IP addresses on each network is called a: C. dynamic router.

What is a dynamic router?

A dynamic router can be defined as a network connection device that is designed and developed to use adaptive routing in creating or building tables that identify IP addresses on each network.

An adaptive routing is also referred to as dynamic routing and it refers to a network protocol that allows optimal data routing by selecting paths using complex routing algorithms, according to real time routing table changes in a dynamic router.

Read more on dynamic router here: https://brainly.com/question/24812743

Write a program to store the elements (30,3,8,7,5) and display their location

Answers

Answer:

why did you delete my answeR?

30, 3, 8, 7, 5

how can one improve the quality of the search results when using internet services such as research methods

Answers

Answer:

Vary Your Search Engine. Use Specific Keywords.Simplify Your Search Terms. Use Quotation Marks. Remove Unhelpful Words. Refine Your Search Using Operators.Avoid Search Pitfalls.

Explanation:

What is an object? Give five examples of real world objects.

Answers

Answer:

things u can touch

Explanation:

paper

pen

eraser

table, metal

Determine the binary encoding for a system that uses two’s complement of the base-10
quantities negative six and six for a digital system where all binary numbers are represented by four bits, one where all numbers are represented by eight bits (one byte).

Answers

Answer:

4 bits:

6 = 0110

-6 = 1010

8 bits:

6 = 00000110

-6 = 11111010

Explanation:

2's complement is easier to implement, because it only has one representation of 0 and starts counting backwards from the highest number you can represent with the available bits.

e.g.,

7 = 0111

6 = 0110

5 = 0101

4 = 0100

3 = 0011

2 = 0010

1 = 0001

0 = 0000

-1 = 1111

-2 = 1110

-3 = 1101

-4 = 1100

-5 = 1011

-6 = 1010

For 4 bits:

-6 = 01106 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 000001106 = 1111 + 1010 = 11111010

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

The two’s complement of base-10.

In Computer programming, two's complement of base-10 is generally easier to implement because it has a single representation of 0 only.

Decimal      Two’s Complement      Decimal      Two’s Complement

    0                       0000                        0                        0000

    1                       1111 1111                       -1                      0000 0001

    2                      1111 1110                      -2                    0000 0010

    3                      1111 1101                      -3                    0000 0011

    4                      1111 1100                     -4                    0000 0100

    5                      1111 1011                      -5                    0000 0101

    6                      1111 1010                     -6                    0000 0110

    7                      1111 1001                     -7                    0000 0111

    8                      1111 1000                    -8                    0000 1000

For 4 bits:

-6 = 0110

6 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 00000110

6 = 1111 + 1010 = 11111010

Read more on binary encoding here: https://brainly.com/question/5381889

hello everyone I need some help with what a footer is on a web page

Answers

Answer:

A website's footer is an area located at the bottom of every page on a website, below the main body content

Explanation:

By including a footer, you make it easy for site visitors to keep exploring without forcing them to scroll back up.

how to write a code that determines if a number is odd or even?
the code should start with a variable declaration

Answers

Answer:

//code in c++

#include <iostream>

using  namespace std;

int main() {

   int a;

   cin>>a;

   if(a%2==0){

       cout<<"Even number";

   }

   else{

       cout<<"Odd number";

   }

return 0;

Explanation:

Described the importance of developing strategies to conduct educational research.

Answers

Step 1: Identifying a Problem.

2

Step 2: Reviewing the Literature.

3

Step 3: Specifying a Purpose and Research Questions. Writing purpose statements, research questions, and hypotheses provide critical direction to an educational research study. ...

4

Step 4: Designing a Study.

ecu

a. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating, and the date. The class includes methods to get each field. In addition, create a default constructor that automatically sets the activity to running, the minutes to 0, and the date to January 1 of the current year. Create an application that demonstrates each method works correctly.


b. Create an additional overloaded constructor for the FitnessTracker class you created in Exercise 3a. This constructor receives parameters for each of the data fields and assigns them appropriately. Add any needed statements to the TestFitnessTracker.java application to ensure that the overloaded constructor works correctly, save it, and then test it.


An example of what it should look like:

running 0 minutes on 2021-01-01

bicycling 35 minutes on 2020-08-20


What's done:

import java.time.*;

public class FitnessTracker {

String activity;

int minutes;

LocalDate date;

// constructor for 3a

public FitnessTracker() {

}

// constructor for 3b

public FitnessTracker(String a, int m, LocalDate d) {

}

public String getActivity() {

}

public int getMinutes() {

}

public LocalDate getDate() {

}

}

Answers

Answer:

It keeps saying servers fully loaded

Explanation:

what is computer/why it is called data processor

Answers

Answer:

Computer is known as data processor because it processes the data. First the data is inserted in the computer through input devices. After that, computer translate the data in its own language and then the computer takes action according to the instructions given to the computer

"A document stored on web server and is available on the web is called web page" TRUE OR FALSE​

Answers

Answer:

true .................

What are some ways that an extremely large group of processors could be maintained?

Answers

The extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.

What challenges does processors pose?

Despite the capability of modern processor, the heating system presented a major challenge for the system because it might shut down the system on the thermostat observed the processor is emitting alarming heat.

In conclusion, the extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.

Read more about computer processors

brainly.com/question/614196

explain 3 advantages and 3 disadvantages of computers ​

Answers

Answer:

advantage

1: finish tedious tasks faster (writing an essay)

2: the internet (you can learn anything)

3: reduces the use of paper

disadvantage

1: social media (being addictive toxic)

2: decreasing jobs

3: less time for people to interact in person

Explanation:

hiya!!!

advantages:

1. computers make information more accessible
2. they help pass time
3. they store documents and data

disadvantages:

1. information can get leaked
2. costly
3. uses up electricity
Other Questions
WILL SOMEONE ANSWER MY QUESTION IT DUE IN 30 MINUTES Using the RACE Strategy answer the following question: When Athens began using its power to control the Delian League, what was the effect on the other city-states?btw in im mid school 6th grade If you watch a flock of birds flying overhead, each very close to the next one, you may perceive them as all being part of the same group. If they were all spaced very much apart, however, you may see them as individual birds not flying together. This distinction takes advantage of which Gestalt principle? a. proximity b. closure c. contiguity d. figure-ground Help your professor to calculate the exam average and the number of students passing the course by writing a maria program. The program will take as input the number of exam papers and the exam points for each student. At the and show the class average and the number of students passing the course. Note that the passing grade is 60. A bank account earns 2% interest each year. Giselle uses the expression p +0.02pto find how much money will be in the account after one year if she deposits p dollars. Brainliest if correct 4) Type only the NUMBER answer to the question below (no units). Youranswer should have 4 significant figures.How many grams of N202 are present in 4.5 x 1024 molecules of N2O2 Writing Prompt(20pts) This page can include any original writing of your choice. Must be school-appropriate!! Must be 1 page long!! how many states were there when the 21st amendment was being passed? Refer to Explorations in Literature for a complete version of this narrative. Based on her descriptions in "The Light of Gandhi's Lamp" how did growing up in apartheid-era South Africa affect Hilary Kromberg Inglis? Question 10 options: It showed her that armed resistance to injustice is wrong. It compelled her to join the fight for justice and equality. It made her fearful of those who sought to overturn the country's power structure. It pushed her to seek to emigrate to a country that treated its citizens with dignity. Why would a leader in the Cold War era be motivated to continue to fight in Vietnam Plz help! Due tonight!Recycled CDs, Incorporated, offers a choice of 5 used CDs for $20, with each additional CD costing $6. Write a cost function for purchasing 5 or more CDs. What will the cost of buying 9 CDs be? Let x represent the number of CDs over 5. 3rd time posting this question first time was 2 hours ago, someone please help With the loss of Ohio land to incoming settlers, why couldnt Native communities sustain their old way of life? Write the program of while loop . how did the americans disagree over the role of federal and sate government before and during the civli war Why should homework be assigned to students and not be banned. Write this as an essay also I said it should be assigned and not banned. Can someone pls rate my Starbucks drawings (only if u like Starbucks.) And tell me which color do u like best for Starbucks there's a pink one a black one a red one a blue one a purple one and an orange one tell me which one u like better and Have a Nice Day :) or night which choice is not a form of antivirus scanning that compares known virus patterns to scanned files Which board game was invented to entertain quarantined children?. I need this question answered