Answer: ribbon
Explanation:
Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.
Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.
and, or, not are examples of boolean logic
true a example boolean logic is (and, or, and not)
-scav
Need answer ASAP. Thanks
Answer:
1. XHTML
2. XML
3. HTML
4. CSS
Explanation:
PLSSSSS HELPP!! Tropical rainforests are home to many kinds of birds, including parrots, toucans and eagles. Each different species of birds rely on different organisms as food sources. How does this help the birds survive in the rainforest?
A.It allows different birds to reproduce more often.
B.It allows different birds to escape from predators.
C.It reduces competition between different bird species.
D.It allows different birds to build better nests.
Answer:
C I believe
Explanation:
List three features of the third generation of computers
Explanation:
Features:
1.They were small and efficient than previous generation.
2.They use integrated circuits as main electronic circuit.
3.The operating speed was increased unto nano seconds.
Hope it helps and have a good day.
Harold is working on a science project that includes a spreadsheet containing calculated results based on the data. An obviously incorrect result is being calculated and displayed. The data is correct, but the formula must be flawed. To get the correct information, Harold clicks on the cell containing the incorrect results and adjusts information contained in the:
A. the formula bar.
B. the shortcut toolbar.
C. the calculator pop-up.
D. the column header.
Answer: When entering a formula into a cell, you begin with an equal sign
Functions and formulas are calculations a spreadsheet program applies to data.
Functions are preset calculations within spreadsheet software.
Formulas are user-entered calculations that may contain cell references, numerical values, and preset calculations.
1. Samantha uses the RSA signature scheme with primes p = 541 and q = 1223 and public verification exponent e = 159853. (a) What is Samantha's public modulus? What is her private signing key? (b) Samantha signs the digital document D = 630579. What is the signature?
Answer:
Why is samantha asking us? She should find out herself smh
Explanation:
The Scratch blocks are organized into 9 color-coded categories. Select all that apply.
Question 14 options:
Motion
Control
Group
Stack
Operators
Events
Sound
Loop
Looks
More Blocks
Data
Sensing
five internal peripheral devices pls help
Answer:
TV card, CD-R drive, Floppy Disk, Sound Card, and CD-ROM drive are examples of internal peripheral devices!(Basically hard drives and something like that)
Explanation:
here you go
1 ssd
2 CD-ROM drive
3 wifi extender or antenna
4 CD-R drive
5 hhd
Hope this helped
-scav
Which of the following best describes the protocols used on the Internet?
The protocols of the Internet are designed by government agencies to ensure they remain free to use
The protocols of the Internet are secret to maintain the privacy and security of people using them
Each device connected to the Internet will use a protocol designed by the company that manufactured it
The protocols of the Internet are open and used by all devices connected to the network
The protocols of the Internet are open and used by all devices connected to the network
-scav
What behavior do elements in a stack follow?
Answer:
last in, first out, or LIFO behavior
Explanation:
B
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service
Answer:
C. user accounts
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.
Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.
In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.
Answer:
user accounts
Explanation:
if and if else check for a condition, these are known as
Answer:
i think its conditional statements
but im not sure though
Need answer ASAP
Complete the following sentences
____ objects are programmer defined objects with programmer developed properties and methods. Custom objects are ____
Objects.
Options for first box are:custom, built-in, user-defined
Option for the second box: user-defined, system-defined, undefined
Answer:
built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.
The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended. PROCEDURE allPositive(myList) { index ←← 1 len ←← LENGTH(myList) REPEAT len TIMES { IF(myList[index] > 0) { RETURN(true) } index ←← index + 1 } RETURN(false) } For which of the following contents of myList does the procedure NOT return the intended result?
Answer:
[-1, 0, 1]
Explanation:
Given
The above procedure
Required
Which list does not work as intended
The question has missing options (the options are available online).
From the question, we understand the procedure is to return true for lists that contain only positive numbers.
However, the list does not work for [-1, 0, 1]
The reason is that; the procedure starts checking from index 1.
i.e. index ←← 1
In [-1, 0, 1], the element at index 0 is negative (-1).
Since the procedure starts checking from index 1, the procedure will not check the element at index 0 (i.e. -1).
Hence, it will return true, instead of false
In this exercise we have to use the knowledge of computational language in python, so we have that code is:
It can be found in the attached image.
So, to make it easier, the code in python can be found below:
NumList = []
Number = int(input("Please enter the Total Number of List Elements: "))
for i in range(1, Number + 1):
value = int(input("Please enter the Value of %d Element : " %i))
NumList.append(value)
print("\nPositive Numbers in this List are : ")
for j in range(Number):
if(NumList[j] >= 0):
print(NumList[j], end = ' ')
See more about python at brainly.com/question/2266606
How do i fix this to make it run ???
class Main {
public static void main(String[] args) {
// Length and sides.
Cube shape1 = new Cube(5, 6);
HalfSquare shape3 = new HalfSquare(4, 20, 4, 5);
// Cluster of print statements to deliver stats about the shape.
// Shape 1
System.out.println(shape1.toString());
System.out.println("");
System.out.println(shape1.toStringCube());
System.out.println("");
// Shape 2
System.out.println("");
System.out.println(shape3.toString());
System.out.println("");
System.out.println(shape3.toStringHalfSquare());
}
}
// Main Class
class Shapes {
private int sidesNum;
// Constructors, Mutators, and Accessors
public Shapes(int SN){
setSidesNum(SN);
}
public void setSidesNum(int value){
this.sidesNum = value;
return;
}
public int sideNumber(){
return this.sidesNum;
}
// shapes, shapes, and more shapes
public String toString() {
return " This shape has: " + sideNumber() + " sides.";
}
}
class Cube extends Shapes{
private int volume;
// Constructors, Mutators, and Accessors
public Cube(int Vol, int SN){
super(SN);
setVolume(Vol);
}
public void setVolume(int value){
this.volume = value;
return;
}
public int getVolume(){
return this.volume;
}
public String toStringCube() {
return " " + "Volume of a cube = " + Math.pow(getVolume(), 3 ) + " squared. Surface area = " + Math.pow(getVolume(), 2) * sideNumber() + " units2.";
}
}
class HalfSquare extends Shapes{
private int length;
private int width;
private int height;
// Constructors, Mutators, and Accessors
public HalfSquare(int lngh, int hght, int wdt, int SN){
super(SN);
setLength(lngh);
setHeight(hght);
setWidth(wdt);
}
public void setLength(int value5){
this.length = value5;
return;
}
public void setWidth(int value6){
this.width = value6;
return;
}
public void setHeight(int value7){
this.height = value7;
return;
}
public int getLength(){
return this.length;
}
public int getWidth(){
return this.width;
}
public int getHeight(){
return this.height;
}
public String toStringhalfSquare() {
double hypot = (Math.sqrt((getLength() * getLength()) + (getHeight() * getHeight())));
return "The volume of a prism = " + (getLength() * getWidth() * getHeight()) * .5 + " squared. The hypotenuse = " + hypot + ", The surface area =" + ((getLength() * getHeight()) + (hypot * getWidth()) + getHeight() * getWidth() ) + " units2";
}
}
Explanation:
Ask a professional
When entering numbers that start with a zero, apply the _____ number format.
A. Text
B. Context
C. Zero
D. Zero decimal
Answer:
The Answer is gonna be D. Zero decimal
N an AWS design template, the "depends on" property of a resource is represented by an _________ color dot. Red Orchid Blue Black
Answer:
Black
Explanation:
Explicit dependencies in Amazon Web Services are used to determine the order in which resources are added or deleted on AWS Cloud Formation. If a user wishes to create explicit dependency, a line from the "dependson" dot located at the route is moved to the gateway-VPC attachment.
The "dependson" dot helps to specify which resource is created before another. It is signified by a black dot (*). It can be used to override parallelisms and also to determine when a wait condition becomes activated.
PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because
A.The introduced species compete for resources more effectively than native species
B.These introduced species will require more land to be protected
C.Introduced species often become endangered when they are placed in a new habitat
D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat
Answer: A.The introduced species compete for resources more effectively than native species.
Explanation:
An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.
When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.
Therefore, the correct option is A.
Julie scrolls through her social media feed and it seems like everyone's life
is so exciting when hers is so ... boring! She starts to feel bad about herself.
What should Julie be paying attention to right now?
A- Oversharing
B- Red flag feeling
C- Miscalculation
Answer:
b
Explanation:
and julie needs to geta life
Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective? come better prepared and offer relevant information let other students participate more and share the workload share more of her opinions and answer questions keep her thoughts to herself and let others do all the talking
Answer:
B
Explanation
Let other students participate more and share the workload.
Have a good day everyone!
Answer:
let other students participate more and share the workload
Explanation:
Item 3
Which of the following describes new technology development?
A harmless process
A somewhat assured process
A partially risky process
A very risky process
Answer:
A somewhat assured process
B. A somewhat assured process is describes new technology development
What are the five phases in technology development process?Five phases guide the new product development process for small businesses: idea generation, screening, concept development, product development and, finally, commercialization.
What is technology development process?Technology Development Process, is a directed process at developing new knowledge, skills and artefacts that in turn facilitates platform development
To learn more about new technology development, refer
https://brainly.com/question/27090068
#SPJ2
Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks.
What does Nicole need to do to make the study group more effective?
come better prepared and offer relevant information
let other students participate more and share the workload
share more of her opinions and answer questions
keep her thoughts to herself and let others do all the talking
Answer:
let other students participate more and share the workload
Explanation:
Answer:
The person above me is right, give them brainliest please
Explanation:
Got it right on Edge, have a good day~
por que se dice que las TIC´S son las integracion de las TI y las TC?
La respuesta correcta para esta pregunta abierta es la siguiente.
A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.
Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.
Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.
what is the output of this line of code
print("hello" + "goodbye")
A - "hello" + "goodbye"
B- hello + goodbye
C - hello goodbye
D - hellogoodbye
Answer:
D - hellogoodbye
Explanation:
since your merging two string together you will simply just get one string in total
Answer:
D
Explanation:
PLTW activity 2.1.5 PLEASE HELP I NEED STEP 5
FAKE ANSWER WILL NOT BE GIVEN POINTS
Answer:
Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes and development of both hardware and software. It has scientific, engineering, mathematical, technological and social aspects.
Hope it helps uHelp!!!
I don't know how to do this problem....
Like
NOTHING
This is all I have right now
```
def findCharacteristic(choice, edges):
edges = edges.replace(" ","")
vertices = edges
max = 0
for char in vertices:
if int(char) >max:
max = int(char)
print (max)
x = [[0]*max]*max
print(x)
if __name__ == '__m
```
Answer:
ummmm try the inequality protragathron theorum
Explanation:
ok
Edhesive 11.4 code practice
Answer:
<!DOCTYPE html>
<html>
<body>
<h2>Billboard Hot 100 Songs 1980</h2>
<p>1. Blondie - “Call Me“</p>
<h2>Billboard Hot R&B/Hip-Hop Songs 1980</h2>
<p>1. Michael Jackson - “Rock with You“</p>
<h2>Billboard Hot Country Songs 1980</h2>
<p>1. Kenny Rogers - “Coward of the County”</p>
</body>
</html>
Mainly for edhesive users
100% on edhesive code practice 11.4
What is the relationship between optical drives and WORMs?
Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck
Need answer ASAP I’ll mark brainliest if correct
How can you create a class without any methods, yet call a method from that class?
The class can___ methods from another class
list and explain seven functions of operating system software
Answer: Security – ...
Control over system performance – ...
Job accounting – ...
Error detecting aids – ...
Coordination between other software and users – ...
Memory Management – ...
Processor Management – ...
Device Management –
HOPE THIS HELPS