Type the correct answer in the box. Spell all words correctly. Define the term loop rule. The loop rule tells us that if we sum the across all the components in a single closed path of an electrical network, the result is 0.

Answers

Answer 1

Answer:

91

Explanation:


Related Questions

what programming language supports relational databases?

Answers

A programming language that supports relational databases is SQL (Structured Query Language)

Structured Query Language (SQL), is the principal method for communicating with Relational Databases.

A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.

Tables are utilized for storing data about the items that will be displayed in the database. A column in a database contains a specific type of data, whereas a field records the actual value of an attribute. The table's rows indicate a collection of linked values for a single item or entity.

Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.

Learn more about Relational Databases here:

https://brainly.com/question/8457395?referrer=searchResults

When you begin designing a program, you work from a ____, a description of what your program should do.

Answers

Answer:

This is usually called a brief (you will also hear this in the design industry, as well as other places)

Project: On Assignment as a Web Developer
Assignment Directions:

Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a budget and only want to have a presence on the Internet. They do not need any fancy bells and whistles. They have sent you an email message with the basic parameters of the site.

The site should have at least three pages. They should include the landing page (commonly named index.htm), a contact page, and a "Meet the Company" page.
Each page should have an identical header containing the company name and motto: "We make widgets fun!"
Each page must include navigation back to the home page (without needing to use the Back button on the browser).
All font styles and alignment must be performed with inline CSS.
The company mascot is a dog, but there is no logo provided in this project. Any picture of a dog will do. Make sure it is prominently displayed on each page.
Each page should display in a web browser with a title.
All employees on the "Meet the Company" page can be random people's photos from the Internet. Please include Jack Sprat, President, Tom Thumb, Vice President, Sally Flag, Treasurer, and Monty Fuller, Secretary.
All text for these pages can be fake. See this website to create filler paragraphs.
Make up email addresses, but use the mail to: command as a hyperlink and display the person's name and not the actual address.
Each page should have a link to the other pages.
Link to at least three remote web pages. One of these should be formatted in an iframe.
The main page should have a sample product table including the following information:
Name Size Color Lead time Price Discount (for 10)
W-1 1X1 Blue 1 week $200.00 10%
R-2 2X2 Green 1 week $1,200.00 15%
D-2 2X3 Red 2 weeks $12,000.00 20%
Assignment Guidelines:

Projects will be assessed on following the requirements and style. Use color (creatively), at least two typefaces, headings, bold and italics, images, background colors, and so on to make your pages.

Submission Requirements:

Standard HTML

Question # 1

File Upload

Ensure that you fulfill all requirements, then upload your final web page project.

Answers

Answer:

It is not possible to upload files .html files here

I need help with this question

What is the “digital divide”?

A. the gap between people who are very skilled using the Internet and people who are less skilled.

B. the gap between the time before Smartphones debuted and the time they became widely used.

C. the gap between people who have readily available Internet access and people who do not.

D. the gap between the time before the Internet debuted and the time it became popular.

Answers

Answer:

C IS YOUR ANSWERexplanation is available

Explanation:

The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.

Answer:

option c is the answer....

When it comes to game mechanics, what is the most universal mechanic that is present in virtually every computer game that you can think of?

quests and goals
movement
catch-up
turns

Answers

I have no Clow but I wanted to answer because you cute

Explanation:

none

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place

Answers

Answer:

I think it's a for loop.

A for loop looks like:

for (starting statement; condition that is true; condition applied to iteration)

Explanation:

Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001

Answers

Answer:

(a) page = 3; offset = 13

(b) page = 41; offset = 111

(c) page = 210; offset = 161

(d) page = 634; offset = 784

(e) page = 1953; offset = 129

The page numbers and offsets for the following address are:

page number 3, with an offset of 13.page number 41, with an offset of 47.page number 210, with an offset of 641.page number 634, with an offset of 496.page number 1953, with an offset of 49.

To find the page numbers and offsets for the given address references, we need to perform some calculations based on the page size.

Assuming a 1-KB page size (1 KB = 1024 bytes), use the following formulas:

1. Page number = Address reference / Page size

2. Offset = Address reference % Page size

a. 3085:

Page number = 3085 / 1024 = 3

Offset = 3085 % 1024 = 13

Address 3085 is on page number 3, with an offset of 13.

b. 42095:

Page number = 42095 / 1024 = 41

Offset = 42095 % 1024 = 47

Address 42095 is on page number 41, with an offset of 47.

c. 215201:

Page number = 215201 / 1024 = 210

Offset = 215201 % 1024 = 641

Address 215201 is on page number 210, with an offset of 641.

d. 650000:

Page number = 650000 / 1024 = 634

Offset = 650000 % 1024 = 496

Address 650000 is on page number 634, with an offset of 496.

e. 2000001:

Page number = 2000001 / 1024 = 1953

Offset = 2000001 % 1024 = 49

Address 2000001 is on page number 1953, with an offset of 49.

Learn more about offset here:

https://brainly.com/question/32088531

#SPJ3

A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
B. Management communication system
C. Decision support system
D. Management information system

Answers

Answer:

Decision support system is the answer

Explanation:

Do you think should give credit to people who invented viral dances?

Answers

Answer:

michal jackson i think who credit to people invented viral dances.

Answer:

Yes

Explanation:

Well, they added some taste to life.

I am malala how one girl stood up for education and changed the world pdf.

Answers

Answer:

what?

Explanation:

Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.

Answers

Jim is the main antagonist while Edward is the main protagonist of the movie.

In any and every instance when the Federal Government provides recovery support, all six Recovery Support Functions will be activated. A. TRUE

Answers

Answer:

what?

Explanation:

what are the questions lol

What is the complete path and filename of the file where ports and their associated protocols are defined

Answers

The /etc/services is often found in Linux/Unix.

The complete path and filename of the file where ports and their associated protocols are defined by /etc/services.

Linux Services files is known to save a lot of well-known ports. UNIX operating systems is known to save a services file at /etc/services.

It does save information about a lot of services that client applications can use on the computer.

Looking into the file, you will find the service name, port number, and protocol it uses, and other applicable aliases.

the work of the configuration file /etc/services is to help programs to be able to do a getportbyname() sockets call in their code so as to know what port they can use.

Learn more about Computer services from

https://brainly.com/question/3837126

Set the Append Only property to _____ to allow users to add data to a Long Text field but not to change or remove existing data.

Answers

A computer data storage is made of many features. Set the Append Only property to YES to allow users to add data to a Long Text field but not to change or remove existing data.

Append-only is known to be a characteristic or component of computer data storage. It is where new data can be appended to the storage, but where existing data is said to be immutable.

A field's data type is very essential property as it shows what kind of data the field can store.

Learn more from

https://brainly.com/question/24795103

_____ is a privacy issue relating to the responsibility of those who collect data must ensure that the data is correct.

Answers

Answer:

Virtual private network

1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.

2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions

Answers

Answer:

1)

string value;

cout << "type I am smart";

cin >> value; // get user input from the keyboard

2)

int num1 = 67;

int num2 = 45;

int num3 = 12;

int num4 = 89;

int num5 = 46;

int num6 = 89;

int num7 = 46;

int num8 = 88;

int num9 = 43;

int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;

//to load it as a function

int main ()

{

for ( n=0 ; n<5 ; n++ )

{

result += numbers[n];

}

cout << result;

return 0;

}

The C++ programs are illustrations of arrays and strings

The program 1

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This declares the string

   string myStr;

   //This gets the input

   cin>>myStr;

   //This prints the first and the last index elements

   cout<<myStr[0]<<" "<<myStr[myStr.length()-1];

   return 0;

}

The program 2

The program written in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

   //This initializes the array

   int myArr [] = {67, 45, 12, 89, 46, 88, 43};

   //This prints the array elements

   for(int i = 0; i<7;i++){

       cout<<myArr[i]<<" ";

   }

   return 0;

}

Read more about arrays and strings at:

https://brainly.com/question/15683939

#SPJ2

Chapter 20 reading and vocab review

Explain the subtractive and additive approaches to editing.

Answers

Answer:

Essentially additive editing and stringing “the good stuff” together, whereas subtractive is more about stringing all your raw footage together and “removing the bad stuff”

Additive editing feels confident and concerned with the pursuit of a specific, existing vision. And it’s faster. Subtractive editing feels like a deeper listening to what the footage is saying, and holding on to many potential permutations.

Explanation:

Addictive editing -  creating a program from raw footage by starting by starting with nothing and adding selected components

Subtraction editing  - creating a program by removing redundant or poor quality material from the original footage

Which term refers to actions that you would perform on a computer to revive it if it functions in an unexpected manner?

Answers

Answer:

I think that it is just rebooting

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

A ______ error occurs when the program's grammar and punctuation is correct, but something happens to halt the program before it is finished.

1. Runtime
2. Syntax
3. Logical

Answers

Answer:

Logical error

Explanation:

Answer:

Runtime

Explanation:

The program stops execution before the end of the instructions has been reached. It is not due to poor grammar/punctuation which would be a syntax error. A logical error would be due to an error in the programmer's logic but would not cause the program to terminate abnormally. This is also not the case.

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

Power Supply

Description :

Answers

A device that supplies power to electronic equipment which; is sometimes called A, B, or C according to its purpose of heating vacuum tube cathodes, producing electron current flow in plate circuits, or applying a direct voltage in grid circuits.

Explanation:

Not exexactly sure on what your asking

If you want to share information with individuals who are internal to your organization, which type of network would you want to use

Answers

it is globe because I want a successful the all people

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

Select the correct answer.
Which option would you use to insert two line breaks in your document?
A.<2br>
B.

C.


D.

Answers

Answer:

yes, I agree.

Explanation: ,

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

Answers

[tex]\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}[/tex]

[tex]\huge\underline\mathtt\colorbox{cyan}{in attachment}[/tex]

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall

Answers

Answer:

Firewall

Explanation:

The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.

Other Questions
Based on the article "This Is Why Juries Shouldn't Decide Court Cases" by Erin Fuchs, should the jury system be eliminated from the American Criminal Justice System? Thoroughly explain your answer, and provide evidence from "The Jury Problem" paragraph. An object's mass is less onthe Moon than it is on Earth. The government form that provides notice to the alien of the pending immigration removal charges filed against him/her is called: What kind of cord is this no links please What features distinguish annelids from roundworms? Describe the rights, obligations, and duties that you will have when you become a citizen. (one paragraph) How is 90 north latitude different from 90 south latitude? What was one result of the treaty of paris, 1783? 8. 4c. Which two features characterized Greece's geography? (Select two answers)ADesertBMountainsCRainforestDTundra ESeas what is 6/10 plus 4/10 I left my notes at home and I need help please, and thankyou resolve this equation If a lobbyist is trying to convince a legislator to support a particular bill, one of the most valuable resources in doing so is which of the following? a. A group of policy experts willing to draft legislation for the legislator b. A large budget c. A recent history of supporting that particular legislator d. A small but very vocal membership e. A large, politically active membership What did some fear the Constitution would lead to?An American ParliamentAn American Bill of RightsAn American king Divide 2/3 by 1/5. Simplify your answer and write it as a mixed number. A melody that returns altered in a different section of a romantic composition is called thematic ______. Desalination is expensive because it requires_A. oxenB. marketingc. electricityD. mindshare can someone pls give me an example of an area of a trapezium Which event happens in a solar cell when the photoelectric effect occurs?A. Electromagnetic waves strike the transparent glass on the top ofthe cell, removing electrons from it.B. The wave model of light is supported, but the particle model isnot.C. A current forms when electromagnetic waves strike asemiconductor, removing some of its electrons.theD. Electrons flow from the positively charged semiconductor tonegatively charged one. Vanadium crystallizes in a body-centered cubic lattice, and the length of the edge of a unit cell is 305 pm. What is the density of V