Answer:
Total resistance: 18 Ω
Total current: 0.5 A
VR1: 2.5 V
VR2: 1.5 V
VR3: 5 V
Explanation:
Two formulas/laws you have to know:
1) Resistors in series: Rtotal = R1 + R2 + ... (sum the individual resistors)
2) V=I·R a.k.a. I=V/R a.k.a. R=V/I (same formula in 3 shapes)
So, total resistance is sum off all three: 5+3+10 = 18Ω
Total current: I=V/R, V=9, R=18, so I = 9/18 = 0.5A
Voltage across resistor: V=I·R, I=0.5A (for all three), R=5 (for R1), so V = 0.5·5 = 2.5V. Same for the other three.
As a double check, the sum of the voltages must equal the battery voltage again, no volts ever get lost: 2.5+1.5+5 = 9V (check!!)
In the following nested loop structure, which loop does the program EXIT first?
Answer:
The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.
What type of internet connection do you think you'd get in Antarctica?
A.
cable
B.
DSL
C.
dial-up
D.
satellite
E.
ISDN
Which of these is a type of software that prevents, finds, and removes
dangerous software on computers and networks?
Internet browser
Antimalware or antivirus
Operating system
Multimedia software
Answer:
Antimalware
Explanation:
It is literally in the name of the software what it does.
Which act passed by the US government in 1998 criminalizes the production and distribution of technology that intends to evade anti-piracy laws?
A.
Stop Online Piracy Act (SOPA)
B.
Digital Millennium Copyright Act (DMCA)
C.
Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP or PIPA)
D.
World Intellectual Property Organization (WIPO) Copyright Treaty
Answer:
B
Explanation:
What are some of the ways that a computer or business can be infected with a computer virus?
Answer: A way a computer or business can be infected with a virus is via a USB. A person can come into the business with a copy of a C.V. which is destroyed in some way. You give the USB to the receptionist and ask to print you a new one. When they do, a virus hidden in the USB will begin to attack the computer. Another way to infect a computer with a virus is to upload it in a comment box. If a website has a comment/complaint section, a hacker can put in code to a virus. This virus will enact itself once the user opens the website. A fake anti-virus program will appear, and the virus will begin installing itself.
A USB can be used to spread a virus to a computer or organization. Someone could enter the company with a duplicate of a CV that has been damaged in some way. You hand the receptionist the USB and ask them to print you a new one.
What is a computer virus?A computer virus is a piece of malicious software that spreads by copying itself to a document, the boot sector of a computer, or another program. It modifies how a computer operates in the process. A virus starts to spread among computer systems after some type of human interaction.
When they do, a computer will start to be attacked by a virus that was hidden in the USB. Uploading a virus in a comment box is another technique to get it onto a computer.
Thus, A USB can be used to spread a virus to a computer or organization.
For more information about computer virus, click here:
https://brainly.com/question/14467762
#SPJ2
one way in which RSI can be prevented?
CUANDO QUEREMOS EJECUTAR ALGUN TIPO DE EMPRENDIMIENTO, DEBEMOPS DE PENSAR EN TRES TIPOS DE MEDIDAS BASICAS
what are th sensors of street lights
only light or there something else ?
Answer:they also provide satellites to vision where roads are
Explanation:
Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is worried about packets getting lost along the way and the effect that will have on the accuracy of the information. What is his best option for dealing with lost packets
Answer:
Rafi can use the Transmission Control Protocol for communication since TCP has ways to recover when packets are lost.
Explanation:
TCP is a data transport protocol that works on top of IP and includes mechanisms to handle lost packets, such as the retransmission of lost packets.
ANSWER:POST-TEST
direction encircle the letter of the correct answer..
1 .the written description accompanying the working drawing
2. a board made of plaster with covering of paper
3.a fire protection device that discharge water when the effect of a fire have been detected, such as when a predetermined temperature has been reached.
4.structural members in building construction that holds the ceiling board
5.the position or placement of lightning fixtures of the house.
with answer na din.
1.C
2.D
3.B
4.A
5.D
SANA MAKATULONG★☆☆
TLE
Answer:
1. Specifications.
2. Gypsum board.
3. Sprinkler systems.
4. Ceiling joist.
5. Lighting fixtures.
Explanation:
In Engineering, it is a standard and common practice to use drawings and models in the design and development of buildings, tools or systems that are being used for proffering solutions to specific problems in different fields such as banks, medicine, telecommunications and industries.
Hence, an architect or design engineer make use of drawings such as pictorial drawings, sketches, or architectural (technical) drawing to communicate ideas about a plan (design) to others, record and retain informations (ideas) so that they're not forgotten and analyze how different components of a plan (design) work together.
Architectural drawing is mainly implemented with computer-aided design (CAD) software and it's typically used in plans and blueprints that illustrates how to construct a building or an object.
1. Specifications: it's a well-written description that accompanies a working drawing used for designs and constructions.
2. Gypsum board: also referred to as drywall due to its inherent ability to resist fire. It's a type of board that's typically made of plaster with some covering of paper and it's used for ceilings, walls, etc.
3. Sprinkler systems: it's an automatic fire protection device that is typically designed to discharge a volume of water as soon as the effect of a fire is detected. For instance, when a predetermined or set temperature has been reached such as 69°C
4. Ceiling joist: structural members that are aligned or arranged horizontally in building construction in order to hold the ceiling board together.
5. Lighting fixtures: it's typically the position or placement of lightning fixtures of the house.
ANSWER ASAP, PLEASE !! 40 POINTS!
In 1-2 sentences, explain how to save a spreadsheet.
Answer:
Click the Microsoft Office Button , and then click Save As, or press CTRL+S. Important: If you don't see the Microsoft Office Button , click Save As on the File menu.
Will Give Brainiest 75pts
Read the following excerpt from "Did You R e a l l y Just Post That Photo?" by Kristin Lewis: There is no way to know for sure if the photos you posted on F a c e b o o k (you know, the ones that got you grounded) are the reason you were denied [college admission]. But you'll always be h a u n t e d by the possibility that the college found them. The fact is, an increasing number of colleges are looking up applicants on social-media sites like F a c e b o o k and Y o u T u b e. If they don't like what they find out about you, you could miss out on a scholarship or even get rejected. Colleges aren't the only ones scouring the Internet for your name either. Potential employers are looking too. An i n a p p r o p r i a t e photo can cost you a job, whether it's the babysitting gig you're hoping to land next week or the internship you will apply for five years from now. Which of the following is a paraphrase of the bolded lines that could be used for note-taking purposes? Applicants use social media to research potential colleges and jobs. Potential employers are looking up applicants online to help make hiring decisions. Social media can negatively impact a user's college and job prospects. "The fact is, an increasing number of colleges are looking up applicants on social-media sites like F a c e b o o k and Y o u T u b e."
Answer:
it's not C. Social media can negatively impact a user's college and job prospects. I answered that and I got it wrong. I think it might be B, im like 80% sure, so sorry if I'm wrong
hope this helps!
The option that paraphrase the bolded lines is Potential employers are looking up applicants online to help make hiring decisions.
Is it right for a potential employer to use the Internet in this way?The use of social media for any kind of monitoring, investigation, and job decision making by the employer is one that is advisable to all.
Conclusively, It is moral to use information that will help one in terms of job performance and if the employer uses the internet in line with their policies and practices, then there is no issue with it.
Learn more about employers from
https://brainly.com/question/26355886
Which of these statements about the truck driving occupation in the U.S. are accurate?
Answer:
I'm unsure 38373672823
Answer:
I really hate to not give answers when answering for people but I'm not sure. It is definitely not A or D, I am tied between B and C. I'm so sorry I couldn't give the answer but hopefully you can narrow them down
Does anyone play genshin impact here?
Answer:
what server are u on
Explanation:
yes i do play itttttttttttttttttttttt
Which of the following represents over one million characters, including emojis?
A. ASCIU
B. Java
C. Turing
D. Unicode
Answer:
Unicode is responsible for emojis.
How can you adjust an audio or video clip to only play a small portion?
Open the Format tab, and click the Trim Audio button.
Drag the start and end point markers to the desired locations on a file.
Use the Bookmark feature to reduce the timing of a video or audio clip.
Tick the Loop until Stopped box for users to select a section for themselves
Answer:
b. Drag the start and end point markers to the desired locations on a file.
Explanation:
I got it correct
in 2 or 3 sentences, describe one advanced stradegy and how its useful
Answer:
A search strategy is useful because it helps you learn about things that are not available to you in person. One advanced search strategy is to form words carefully. I could copy 'describe one advance search strategy and how it is useful' and put it into a search engine and get many different results that aren't helpful. But if I shorten it to 'advance search strategies' I get helpful information.
Explanation:
Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story. Remember to choose two.
1 Last summer, we went to visit Grandma and Grandpa. 2 They live on a farm. 3On the way home, we saw a deer beside the road. 4We helped with some of the work. 5We got home just in time for school to start. 6I helped gather the eggs. 7My brother helped haul the hay. 8All too soon it was time to leave.
1
2
3
4
5
6
7
8
Answer:
3 5
Explanation:
Where ....................... the books that you borrowed? *
1 point
(A) is
(B) are
(C) was
(D) will be
Where ARE the books that you borrowed?
A computer consists of both software and hardware. a)Define the term software
Answer: We should first look at the definition of the term software which is, “the programs and other operating information used by a computer. Now looking at this we can break this definition down. Software, are instructions that tell a computer what to do. Software are the entire set of programs, procedures, and routines associated with the operation of the computer. So pretty much to sum it up software is the set of instructions that tell the computer what to do, when to do it, and how to do it.
Have a nice day!
Answer/Explanation:
We should first look at the definition of the term software which is, “the programs and other operating information used by a computer. Now looking at this we can break this definition down. Software, are instructions that tell a computer what to do. Software are the entire set of programs, procedures, and routines associated with the operation of the computer. So pretty much to sum it up software is the set of instructions that tell the computer what to do, when to do it, and how to do it.
Which feature of REPL.it would you use to transmit your program to a friend?
execute
share
run
post
Answer:
share
Explanation:
It's in the name of the option.
Answer:
Its share because Share is when you share to someone or your friend
execute is wrong
run doesnt make sense
post means that your posting a program to the world
Explanation:
Why would a designer choose to use a static layout? Check all of the boxes that apply.
It helps to avoid horizontal scrolling.
It adjusts the size and shape of content blocks.
It is easier to control layout choices.
It always fits the width of the screen.
Answer:
Explanation:a & c
Answer:
a c core
Explanation:
Collin wants to insert and center a title at the top of his spreadsheet. Collin should _____.
A. highlight the cells in row 1, select Center command, and type the title
B. type the title in cell A1 and click on the center icon
C. select cells in row 1, select the Merge and Center command, and type the title
D. click on cell A5 and type the title
Answer:
C. select cells in row 1,select the merge and center command, and type the title.
A town government is designing a new bus system. The planners are deciding where to put the different bus stops. They want to pick a set of bus stop locations that will minimize the distance anyone needs to walk in order to get to any bus stop in town. What term best defines this kind of problem?
A. A decision problem
B. An optimization problem
C. An undecidable problem
D. An efficiency problem
Define the following terms: Staff authority ,in your own words.
Answer:
To provision advise for other services to line managers.
Explanation:
Question:
Define Staff authority
Explanation:
Line managers receive counsel and other services from staff authority. Senior managers must exercise caution when it comes to restricting the number of employee employment. A company might end up with an excessive level of corporate overhead if this does not happen.
------------------------
hope it helps...
have a great day!!
Need the answer ASAP PLZ!!!! I’ll mark brainliest if it’s correct
Select the correct answer.
Suzanne, a project manager, wants to change the style and font of the text in the document. What documentation standards should Suzanne
follow?
OA
interchange standards
ОВ.
identification standards
OC.
update standards
OD
process standards
OE.
presentation standards
Answer:
update standards
i think this is correct
don't be afraid to correct me if im wrong
Explanation:
mrk me brainliest
Marina requested a copy of her credit report in May 2019 and wants to request a second one in November 2019. What is true?
O She can; it is always free
She can, but she may have to pay for it
O She will not obtain it, a free copy can be requested every two years.
O She will not obtain it, the bureau sends it automatically once a year
Answer:
B. She can, but she may have to pay for it.
Explanation:
A credit report is a report that contains the credit history of an individual. A credit report is issued by Credit bureaus who have financial information of a person.
Credit bureaus issue one credit report for free every year. But if a person desires to issue a credit report more than once a year then he/she will have to pay a fee for it.
In the given scenario, Marina who has requested a copy of the credit report in May 2019, will have to pay a fee for a copy of the second credit report.
Therefore, option B is correct.
Which activity might be a job or task of an IT worker who manages networks?
A. Setting up a LAN for the office
B. Checking employee eligibility for promotions
C. Developing software to help retirement planning
D. Checking driver's licenses for tampering
The activity that might be a job or task of an IT worker who manages networks is Setting up a LAN for the office. The correct option is A.
What is LAN?A LAN (Local Area Network) is a type of computer network that connects devices in a small geographical area, such as an office building, school, or home.
IT network administrators are in charge of designing, installing, and maintaining computer networks that allow organisations to communicate and share information.
They are usually in charge of configuring routers and switches, configuring firewalls and security protocols, troubleshooting network issues, and ensuring that the network runs smoothly and efficiently.
Setting up a LAN (local area network) for an office is one of the most important tasks that an IT network manager may take on.
Thus, the correct option is A.
For more details regarding LAN, visit:
https://brainly.com/question/13247301
#SPJ7
-------- C++ ------
Assume you need to test a function named inOrder. The function inOrder receives three intarguments and returns true if and only if the arguments are in non-decreasing order: that is, the second argument is not less than the first and the third is not less than the second. Write the definition of driver function testInOrder whose job it is to determine whether inOrder is correct. So testInOrder returns true if inOrder is correct and returns false otherwise.
For the purposes of this exercise, assume inOrder is an expensive function call, so call it as few times as possible!
-------------------------------------------
Assume you need to test a function named max. The function max receives two int arguments and returns the larger. Write the definition of driver function testmax whose job it is to determine whether max is correct. So testmax returns true if max is correct and returns false otherwise.
------------------------------------------
Write a program that will predict the size of a population of organisms. The program should ask the user for the starting number of organisms, their average daily population increase (as a percentage, expressed as a fraction in decimal form: for example 0.052 would mean a 5.2% increase each day), and the number of days they will multiply. A loop should display the size of the population for each day.
Input Validation.Do not accept a number less than 2 for the starting size of the population. If the user fails to satisfy this print a line with this message "The starting number of organisms must be at least 2.", display the prompt again and try to read the value. Similarly, do not accept a negative number for average daily population increase, using the message "The average daily population increase must be a positive value." and retrying. Finally, do not accept a number less than 1 for the number of days they will multiply and use the message "The number of days must be at least 1."
Answer:
The function testInOrder is as follows:
bool testInOrder(){
bool chk= false;
int n1, n2, n3;
cin>>n1;cin>> n2; cin>> n3;
if(n2>=n1 && n3 >= n2){chk = true;}
bool result = inOrder(n1,n2,n3);
if(result == chk){ return true;}
else{return false;}
}
The function testmax is as follows:
bool testmax(){
bool chk = false;
int n1, n2;
cin>>n1; cin>>n2;
int mx = n1;
if(n2>=n1){ mx = n2; }
int returnMax = max(n1,n2);
if(returnMax == mx){ chk = true; }
return chk;
}
The prediction program is as follows:
#include <iostream>
using namespace std;
int main(){
int startSize,numDays;
float aveInc;
cout<<"Start Size: ";
cin>>startSize;
while(startSize<2){
cout<<"The starting number of organisms must be at least 2.";
cin>>startSize; }
cout<<"Average Daily Increase: ";
cin>>aveInc;
while(aveInc<1){
cout<<"The average daily population increase must be a positive value.";
cin>>aveInc; }
cout<<"Number of days: ";
cin>>numDays;
while(numDays<1){
cout<<"The number of days must be at least 1.";
cin>>numDays; }
for(int i = 0;i<numDays;i++){ startSize*=(1 + aveInc); }
cout<<"Predicted Size: "<<startSize;
}
Explanation:
testInOrder
This defines the function
bool testInOrder(){
bool chk= false;
This declares all three variales
int n1, n2, n3;
This gets input for the three variables
cin>>n1; cin>>n2; cin>>n3;
This correctly check if the numbers are in order, the result is saved in chk
if(n2>=n1 && n3 >= n2){chk = true;}
This gets the result from inOrder(), the result is saved in result
bool result = inOrder(n1,n2,n3);
If result and chk are the same, then inOrder() is correct
if(result == chk){ return true;}
If otherwise, then inOrder() is false
else{return false;}
testmax
This defines the function
bool testmax(){
This initializes the returned value to false
bool chk = false;
This declares the two inputs as integer
int n1, n2;
This gets input for the two numbers
cin>>n1; cin>>n2;
This initializes the max of both to n1
int mx = n1;
This correctly calculates the max of n1 and n2
if(n2>=n1){ mx = n2; }
This gets the returned value from the max() function
int returnMax = max(n1,n2);
If returnMax and max are the same, then max() is correct
if(returnMax == mx){ chk = true; }
return chk;
}
Prediction program
This declares all necessary variables
int startSize,numDays; float aveInc;
This gets input for start size
cout<<"Start Size: "; cin>>startSize;
The loop is repeated until the user enters valid input (>=2) for startSize
while(startSize<2){
cout<<"The starting number of organisms must be at least 2.";
cin>>startSize; }
This gets input for average increase
cout<<"Average Daily Increase: "; cin>>aveInc;
The loop is repeated until the user enters valid input (>=1) for aveInc
while(aveInc<1){
cout<<"The average daily population increase must be a positive value.";
cin>>aveInc; }
This gets input for the number of days
cout<<"Number of days: "; cin>>numDays;
The loop is repeated until the user enters valid input (>=1) for numDays
while(numDays<1){
cout<<"The number of days must be at least 1.";
cin>>numDays; }
The following loop calculates the predicted size at the end of numDays days
for(int i = 0;i<numDays;i++){ startSize*=(1 + aveInc); }
This prints the predicted size
cout<<"Predicted Size: "<<startSize;
Which of the following would be the
reason a science technician would be
taking photographs in the lab?
A. to place employees on a blog or web page
B. to keep track of updates needed for the facilities
C. to use as part of the funding for the project
D. to document the process of chemical reactions
Answer:
D. to document the process of chemical reactions.
Explanation:
A chain of custody can be defined as a paper trail containing the chronological order of items of evidence and how they have been handled, controlled, transferred, analyzed, and disposed during the investigation of a case.
This ultimately implies that, a chain of custody contains all the details or informations regarding the investigators (people) who handled, controlled, transferred, analyzed, and disposed an evidence in the course of carrying out investigations on a particular case. The most important and significant part of an investigation is the evidence because it helps to unravel the truth and facts relating to a case. Therefore, it is very important and essential to document and maintain a chain of custody so as to preserve the evidence.
A chemical reaction can be defined as a reaction in which two or more atoms of a chemical element react to form a chemical compound.
Hence, the possible reason a science technician would be taking photographs in the lab is to document the process of chemical reactions by generating pictorial evidences.