07:39
30
Cancel
Identity verification
Verify
Question1: What was the name of your primary school?
Answer
Question2: What was the name of your best friend in
childhood?
Answer​

Answers

Answer 1

Explanation:

nose pero esta viendo que la tecnología es con electricidad y unos elementos eléctricos


Related Questions

3) Which of the following operators is used for performing exponentiation?​

Answers

Answer:

pls make more detailed

Explanation:

The operator that is used for performing exponentiation is ^. The correct option is A.

What are exponential?

One technique to determine the exponential value of the supplied base and exponent values in Python is to use the exponentiation operator. Between the base and exponent values, we utilize the (**) double asterisk/exponentiation operator.

It provides a string in exponential notation that represents the Number object. Using the syntax number.to Exponential (value) The '.' operator is used with a number to invoke the toExponential() method, as demonstrated in the syntax above.

The ^ symbol represents the exponent. This symbol is known as a carrot (). As an illustration, 4 raised to 2 can be expressed as 42 or 42.

Therefore, the correct option is A) ^.

To learn more about exponential, refer to the link:

https://brainly.com/question/28596571

#SPJ6

The question is incomplete. Your most probably complete question is given below:

A) ^

B) #

C) *

D) /

5 disadvantage of assembly
level language​

Answers

Disadvantages Of Assembly Language

Long programs written in such languages cannot be executed on small sized computers.It takes lot of time to code or write the program, as it is more complex in nature.Difficult to remember the syntax.Lack of portability of program between computers of different makes.No SDKs (System Development Kit).

WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL

Answers

Answer:

cause architects are weird

Explanation:

Explanation:

Cause apartments is apartments so therefore its called apartments

Select the qualification that is best demonstrated in each example.
Ginny carefully reviews the code in a program to make sure there are no errors.
Walker identifies why a program isn't working correctly and fixes it.
Donnell reviews code to help out a coworker who is in a hurry.
Hisako teaches herself a new programming technique.

Answers

Answer:

1. attention to detail

2.problem solving skills

3. teamwork

4. the ability to learn quickly

Explanation:

Answer:

2, 3, 2, 2

Explanation:

answer above was correct:)

will give brainlyist

Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.

Answers

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

Answer:

Customized advertising can be integrated based on specific users location.

Explanation:

Right for Plato/edmentum

Consider the declaration of the struct houseType given in this chapter. Suppose firstHouse and secondHouse are variables of houseType. Write C11 statement(s) to compare the style and price of firstHouse and secondHouse. Output true if the corresponding values are the same; false otherwise. (2, 3)

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as there is no link pointing to the houseType struct of chapter 1.

So, I've answered the question from scratch

See attachment for explanation where I used comments to explain each line.

The program is as follows:

#include <iostream>

using namespace std;  

struct houseType{

   int firstHouse, secondHouse;

};

int main() {

   houseType hT;      

   cout << "Enter the price of both house: ";

   cin>> hT.firstHouse;

   cin>> hT.secondHouse;

   if(hT.firstHouse == hT.secondHouse){ cout<<"true";    }

   else{ cout<<"false";    }  

   return 0;

}

Example of vector image format​

Answers

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

In what way, if any, is a model different from a simulation?


Models are types of simulations that transform data sets into scenarios.

Models and simulations are completely different in that they achieve different results.

Models and simulations are essentially identical—they are two terms that describe the same thing.

Models are types of simulations that create ideal workers and members of leadership.

Answers

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

Answer:

Models are types of simulations that transform data sets into scenarios

Explanation:

Model - computer models take complex data sets and transform them into real-life simulations

Compared with space operations specialists, intelligence officers are which of the following?
A.) less likely to perform on-the-job training
B.)more likely to participate in technical training
C.)less likely to obtain a bachelor’s degree
D.)more likely to work with highly classified information

Answers

Answer:

more involved in aligning communications systems

Explanation:

I think this should be it

Answer could be:

more likely to work with highly classified information

or

something before Z

Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input begins with an integer indicating the number of integers that follow. You can assume that the list will have at least 2 integers and fewer than 20 integers. Ex: If the input is: 5 10 5 3 21 2

Answers

Answer:

Follows are the code to the given question:

#include <iostream>//header file  

using namespace std;

int main() //main method

{

int nums[20];//defining an array

int n,i,k;//defining integer variables

cout<<"Enter total number you want to insert: ";//print message

cin>>n;//input value of n  

cout << "Enter array numbers: " << endl;//print message

for (i = 0;i<n;i++) //defining for loop for input values from user-end

{

   cin >> nums[i];//input values

}

for (i = 0; i < n;i++) //defining for loop for count array values

{

   for (k =i+1;k<n;k++)//defining for loop for arrange value in ascending  order  

   {

       if (nums[i] > nums[k])//checking first and second value

       {

           int t = nums[i];//defining integer variable that hold first element value in t

           nums[i] = nums[k];//holding second element value in first element

           nums[k] = t;//assign value in t

       }

   }

}

cout<<"Two smallest number in list are:";//print message

 for (i = 0; i <2; ++i)//defining for loop that prints first two smallest value  

     cout<<nums[i]<<" ";//print value

   return 0;

}

Output:

Enter total number you want to insert: 6

Enter array numbers:  

5

10

5

3

21

2

Two smallest number in list are:2 3  

Explanation:

In this code, an integer array "nums" is defined, and in the next step multiple integer variable is defined, that uses the for loop input value from the user-end, and in the next step, another two for loop is declared, that uses if block to arrange value into the ascending order at which it stores two smallest value in first and second position in the array element, and in the next step, it uses another for loop to print its element value.

similarities of ROM and RAM?​

Answers

Explanation:

both are primary storage devices

Identify at least 6 errors from the following program code. Write all the errors and rewrite the correct program.(11 pts)

1. public E2
2. {
3. Public static void main(String )
4. {
5. System.Out.Println(“hello)
6. }

Answers

Answer:The code after rearrange the question segment:

public class Q// Class declaration of Q name.

{// Open the class body.

    public static void main(String[] a) // Main function declaration.

{ //Open the main-function body.

           System.out.println("Q"); // Print statement which print Q.

} //close the main-function body.

}//close the class body.

Output:

Q

Explanation:

Traffic flow analysis is classified as which?

Answers

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

a program execution is called ​

Answers

a program execution is called a process

Explanation

In the process, they process the data and also execute the data.

What happen in process?

First the data came from input, then go to the memory. The process take the data from the memory and process it and divide it, if there's arithmetic data thingy it will go to ALU and the rest to CU. After the data finish being proceed, the data will be sent to CU and executed there, then send back to the memory and go to the output to be shown.

#Sorry my grammar sucks

#Moderators please don't be mean, dont delete my answers just to get approval from your senior or just to get the biggest moderation daily rank.

design an algorithm to generate the first n terms of sequence 2,6,10,14​

Answers

Answer:

#Begin

a=2

k=0

temp=0

#Input

k=input()

temp=k

k=0

#Processing

while int(k)<int(temp):

print(a)

a=a+4

k=k+1

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

What is range?

The Python range function is a function native to the Python language that is used to generate a numerical sequence within a given range. It is normally used as an auxiliary to the for function. In Python, we can repeat an action a specified number of times using a for loop with the range function.

We can write the python  as:

a=2

k=0

temp=0

k=input()

temp=k

k=0

while int(k)<int(temp):

print(a)

a=a+4

k=k+1

See more about python at brainly.com/question/13437928

When cropping a picture to shape, you can only turn it into a square or circle.
Select one:
O True
O False

Answers

I believe the answer is false
the answer is false!! .

Which of the following are examples of IT
careers? Check all of the boxes that apply.
office administrator
computer hardware engineer
systems analyst
o real estate agent
database administrator
DONE

Answers

Answer:

Computer hardware engineer

Systems analyst

Database administrator

The following are examples of IT careers:

Computer hardware engineer

Systems analyst

Database administrator

Thus option (b), (c) and (e) are correct.

What is a computer?

A computer is a programmable device that stores, retrieves, and processes data.

The term "computer" was originally given to humans (human computers) who performed numerical calculations using mechanical calculators, such as the abacus and slide rule.

The term was later given to mechanical devices as they began replacing human computers. Today's computers are electronic devices that accept data (input), process that data, produce output, and store (storage) the results (IPOS).

The following are examples of IT careers: Computer hardware engineer; Systems analyst; Database administrator. Therefore, option (b), (c) and (e) are correct.

Learn more about computer here:

https://brainly.com/question/21474169

#SPJ5

Libraries order items, check out items to patrons, process returned items, and organize items on shelves. What data management solution should a library use to track this information?
a spreadsheet
a database
a flat file
a filing cabinet

Answers

A database because it will allow to track all these in real time

Answer:

a database

Explanation:

hope this help tell me if im wrong

how can you say that a painting is real? ​

Answers

Answer:Know the Artist. Prior to buying an artist's work, become familiar with their oeuvre. ...

Use a Magnifying Glass. Looking at the surface of a painting with a magnifying glass is one of the best ways to spot a print. ...

Turn the Painting Over.

Explanation:brainliest

See from the way they paint. You can see from the picture that its way different. Each artist has different way to paint. see the colour also

Animations
Animations are !
Blank which can be Applied to blank in a presentation?

Answers

Animation is a graphic element that depicts movement. Animations are visual effects applied to individual items on a slide

Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplies the value by ten and outputs the result.

Answers

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

A computer connected to the internet that ask for data is a

Answers

Answer:

Client

Explanation:

When your computer is connected to the internet it is always asking and sending data. Your computer is the client which recieves the data from the sever.

True/False. Debugging and sequencing are the same process; just different
terms.

Answers

False
debugging is the process of detecting flaws and removing them from code
sequencing is the order that commands are executed by computer

Employment was expected to grow by 13 percent from 2010 to 2020 in which of the following fields?

A.) video game design
B.)graphic design
C.)animation
D.)computer engineering

Answers

Answer: B

Explanation:

O
O ^__^
o (oo)\_______
(__)\ )\/\
||----w |
|| ||

Answers

Answer:?

Explanation: What is the question

Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)

Answers

I don’t understand your question could you explain it better ?

Where do you go to connect to a VPN server in Windows 7?

Answers

Answer:

1) Start→Control Panel→View Network Status.

2) Click the Connect to a Network link.

3) Locate the VPN you want to connect to and click its name and then click the Connect button.

The button only appears after you click the name of the network.

To disconnect from a network, click the network name in this dialog box and then click the Disconnect button. Click Disconnect when prompted and then click Close.

4) Enter your network security key.

Most VPNs require a security key. It’s the same one you used to establish the connection.

Select the Hide Characters check box if you want to keep the Key hidden.

5) Click OK and then click the Connect button.

Windows 7 will use the key to establish a connection to the VPN network.

If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient

Answers

Answer:

The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.

Explanation:

what is the quotient of 8.16 ÷ 100​

Answers

Answer:

0.0816

Explanation:

8.16 ÷ 100 = 0.0816 (Ans)

Cloud computing security risks

Answers

Answer:

Risks:

Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud

Attackers could find an exploit and steal company data without ever physically touching the company's computer.

That's what I can think of.

Explanation:

Other Questions
1. Find the GCF for 14ab- 42a What kinds of diseases can vaccinations prevent?genetic diseases onlybacterial diseases onlyviral diseases onlyany infectious disease The passage is from the United Nations charter. Based on the passage, which were the primary goals of the newly formed United Nations? Check all that apply. We the peoples of the United Nations determined to save succeeding generations from the scourge of war. to real faith in fundamental human rights ... to establish conditions under which justice and respect.. can be maintained, and to promote social progress and benter standards of life in larger freedom. improving living standards promoting social standards -Charter of the United Nations supporting religious freedom advocating democracy protecting human rights preventing future wars Can someone please tell me how to expand and simplify 4(x+1)^2?[ i know now to expand brackets like (x+2)^2, but the 4 confuses me] Select the correct answer.A car is moving at a constant speed along a straight line. Which statement is true about the forces acting on the car?.The net force acting on the car from all directions is zero.oB.The net force acting on the car is greater than the car's weight.O c.The net force acting on the car is in the direction of the car's motion.OD.The net force acting on the car is in the opposite direction of the car's motion. Cody liked the freedom that came with his first summer job. He worked at Mitchell's Farm, where people could come and pick their own corn, berries, and tomatoes out in the fields. Then they'd bring their produce to the checkout stand, where Cody would weigh it and charge the appropriate price. Mr. and Mrs. Mitchell were usually busy somewhere else, so Cody was trusted to manage the stand by himself.For the most part, Cody enforced the Mitchells' rules. When someone asked for a discount or a sample, Cody said no. But he did sometimes bend the rules for friends, much to their delight."Go ahead, taste a few berries before I weigh 'em," he'd say when it was someone he knew. It was against the rules to eat something before you bought it, but everyone wanted to.One day, a man came to the stand with a bushel of corn he had picked. Cody weighed the ears of corn and told the man how much it cost. The man looked confused."But I was here yesterday, and you told someone that for every five ears you buy, you get one free," he said.Cody remembered. He had indeed offered that deal to the Thomases, who happened to be his neighbors. Now he regretted it. He saw Mrs. Mitchell baling hay close by. How was Cody going to explain that he had given a deal to those he knew while he made everyone else pay full price?The man saw that Cody was looking at Mrs. Mitchell. "Is that the owner? May I speak to her?" he asked.Cody thought about offering the man the same discount, but there were people in line behind him, and they were carrying corn, too. Cory hung his head and walked over to see Mrs. Mitchell.Whats the theme?1. people should mind there own business2. You should appreciate the people you work for3.Rules should be fairly applied 1. What is the ratio of cow to ducks? (2 marks)Plz help me Describe a situation where propaganda might be dangerous? How can propaganda be used for good The area of a rectangular rug is 15 feet squared. If the width of the rug is 3 feet, what is the length of the rug. Find a polynomial function whose graph passes through (7,11), (10,-11), and (0,3) State the solutions for the quadratic equation graphed below. Hi! Please let me know if you would like to trade a 5$ microsoft giftcard in exchange for a 10$ sephora one. I am 4.78 short and I would be willing to trade my 10$ sephora gift card for one. What is the purpose of a spectroscope? *A. to spread light into different wavelengthsB. to study a star's compositionC. to study a star's temperatureD. all of the abovePLEASE HELP!! The sensory receptors in the nose and tongue are stimulated by......chemicalstemperaturelightsound wavesAnswer and I will give you brainiliest I need help please. how do you do this question? 2030A .2 B.4 C.6 D.8 for a walk-a-thon a sponsor committed to give to give you a flat fee of $5 plus $2 for every Mile you walk write an expression for the total amount you collected from the sponsor at the end of The Walking on expression Liz is watching a film at the cinema.The film started at 1430The film is 105 minutes long.When the film ends, Liz takes 20 minutes to get to the bus stop.A bus leaves the bus stop at 1645Does Liz get to the bus stop in time to get this bus?You must show all your working. Help me plzzz T^T and It's a multiple choiceHomework: Compound Probability Without ReplacementA cooler contains ten bottles of sports drink: four lemon-lime flavored, three orange flavored, and three fruit-punch flavored. You randomly grab a bottle for your coach, a bottle for your friend, and a bottle for yourself. Your coach and your friend get orange. You get a fruit-punch.1/5, 1/4, 1/40, 25/546 18. Which activity is not a response of human white blood cells to pathogens?1. producing antibodies2. identifying invaders to be destroyed3. removing carbon dioxide4. engulfing and destroying bacteria