Answer:
hardware
Explanation:
A voltmeter can be defined as an electrical device used for measure voltage level or the amount of voltage present in a circuit.
In this scenario, an electrician uses a device called a volt meter. The volt meter is an example of hardware.
A hardware refers to any device, machine or equipment that can be handled physically (touched) and seen with the naked eyes. Other hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
On the other hand, software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
Create a function called biggestNum that returns the largest number in an array of integers. The function is passed only one parameter, an array. In main, ask the user the input eight integers. Each integer should be added to an array called nums. Then, call the function and output the largest number in the array.
This is for Python
def biggestNum():
array = []
for i in range(8):
number = int(input('Enter number: '))
array.append(number)
return max(array)
print(biggestNum())
Anyone who know how to use canva .com please make a logo of the name : Deadly Sins
Answer:
Yes ma'am as in the anime?
Explanation:
Cuz there's a anime show called 7 deadly sins or just deadly sins?
Answer:
hello give the person above brainlist
Explanation:
a*=++a/6+b++ 3 if a=3,b=4
Answer:
[tex]a=22.5[/tex]
Explanation:
Given
[tex]a*=++a/6+b++3[/tex]
Required
The result when [tex]a=3[/tex] and [tex]b=4[/tex]
Analyzing the given instruction
a*=(++a)/(6)+(b++3)
Single out and solve the expressions in bracket
(++a) = a -- When the ++ operator appears before an operand, it is called pre increment. meaning that the operation will be done before the operand will be incremented.
So: in this case: ++a = a
[tex]b++3 = b + 3[/tex]
The operator, as used in that statement is the same as: b + 3.
So:
[tex]a*=(++a)/(6)+(b++3)[/tex]
[tex]a*=(a)/(6)+(b+3)[/tex]
[tex]a*=(3)/(6)+(4+3)[/tex]
[tex]a*=0.5+7[/tex]
[tex]a*=7.5[/tex]
The above expression is calculated as:
[tex]a=a*7.5[/tex]
So:
[tex]a=3*7.5[/tex]
[tex]a=22.5[/tex]
What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS
Answer:
C. A game like Marco Polo on the Internet
Explanation:
A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.
The game comprises of different missions in which players are expected to complete one after the other.
Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."
What is the output?
class car:
model = "
age = 0
myCar = car()
myCar.age= myCar.age + 10
print(myCar.age)
Output: ___
Answer:
10
Explanation:
# A class named car is created
# There are two variables in the class, model and age.
# model is a string holding value for the model of the car.
# age is an integer holding value for the age of the car.
class car:
model = '' # model is initialized as empty string
age = 0 # age is initialized as 0
myCar = car() # creating a car object named myCar
myCar.age= myCar.age + 10 # the value of the age is updated by adding 10. (Note that myCar was our object. If we want to access any properties of the object, we type the object name, . , and the property name. Initially, age was 0, we added 10 to it and it becomes 10)
print(myCar.age) #prints the age of the myCar object, 10
Hello anyone to speak?
Answer:
hey hope you have a good day or night :)
What classes should I take in high-school for majoring in computer science?
Answer:
Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.
Explanation:
Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations
HELP mE PLZ
Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.
Remove unwanted files.
Reboot the computer.
Back up her data.
Scan for viruses.
Delete the browsing history.
Answer:
scan for viruses
remove unwanted files
back up her data
Price of Tether coin right now?
Don't answer if u don't know.
Answer:
Honestly I believe its $1
Explanation:
It just stays on $1 don't know how tho
How does HTTP rely on other layers of the internet?
DNS -
TCP-
IP-
Physical Internet -
Please help !!!
Answer:
All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.
You can set up an AutoFilter to find specific formatting.
True or False
(Microsoft Excel)
Answer:
I think you can, so id say its true.
Explanation:
14 points, what is an IP v4 packet??
Answer:
Internet Protocol version 4 (IPv4)
Explanation:
is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.
Answer:
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.
Explanation:
In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.
Edge please don't copy paste, 20 points
Answer:
web servers hold all the info that the website has on it, most servers hold multiple websites
Explanation:
Answer:
web servers hold all the info that the website has on it, most servers hold multiple websites
Explanation:
Pie charts are best used for
Answer:B
Explanation:Showing parts of a whole.
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is known as: А social collaboration. B media sharing. С a blog D a tweet.
What are inserted to show the total number of pages in Word?
Answer:
Include total number of pages in the page number
Go to Insert > Page Number.
Do one of the following: Select Current Position if you have a header or footer. Select a location if you have no header or footer yet.
Scroll until you see Page X of Y and select a format.
Select Close Header and Footer, or double-click anywhere outside the header or footer area.
what advice can you give to learners to achieve their goals
Answer:
Never give up, take your time, don't get distracted easily, lock your electronics in a box until you finish your work.
Reach for the stars! Always go the extra mile! Never give up!
In a sentence
If you wanted to become a police officer and you had to read boring books and you wanted to give up, but always think "I should always push myself past my limits, If I gave up then how would i know what I could have become?
Trademark
Owned by me
Give 5 advantages of using powerpoint?
How would I tell Tracy to move forward 100 pixels?
Answer:
Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Answer:Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuation. greeting should split their response into list elements, then use index values to greet them by name and respond that you enjoy that hobby as well, with the format: ‘Hello, ! I also enjoy !' Make sure your output matches this format! For example, greeting('Jose 17 hockey') # => 'Hello, Jose! I also enjoy hockey!' greeting('Cindy 14 robotics') # => 'Hello, Cindy! I also enjoy robotics!'
Answer:
The function in Python is as follows:
def greetings(details):
details = details.split(' ')
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
Explanation:
This defines the function
def greetings(details):
This splits the input string by space
details = details.split(' ')
This prints the required output
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
After splitting, the string at index 0 represents the name while the string at index 2 represents the hobby
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.
people make unintentional mistakes
people do not know about cybersecurity protocols
workplaces tend to have too strict cybersecurity protocols
cybersecurity specialists do not really help
people deliberately try to hack into the network
Answer:
people make unintentional mistakes
people do not know about cybersecurity protocols
people deliberately try to hack into the network
Explanation:
Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;
1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.
2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.
3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.
to gain a deeper understanding of a text, students should
Answer:
Should explain what they learned, be able to explain what is happening in great detail, and if its an informational text, then they should use what they learn and apply it in real life.
Explanation:
if I make an Xfinity account can I turn off parental controls that my sister put on with her Xfinity account?
It depends but I don't think it's likely. Parental control needs a pin so it can be turned off and unless you know the code, it might not work.
Jason would like to add visual representations to a table that will be used to easily show comparison data. Which option should he use?
conditional formatting
data bars
expression builder
field criteria
Answer:
a. conditional formatting
Explanation:
Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then gave her employer a citation. The day after Tina's employer received the citation, Tina was given new jobs which were menial and difficult. Which of Tina's rights under OSHA was violated in this situation?
A) Freedom from retaliation for exercising safety and health rights
B) Knowledge of hazardous workplace conditions
C) Obtaining training as provided in the OSHA standards
D) Access to hazard exposure and medical records
Answer:A freedom from retaliation for exercising safety and health rights
Explanation:
Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
A
$11.25
B
$112.50
c
$126.25
0 $136.25
Which of the following are logical reasons for using a pie chart to show how employees spend their time at ABC organization? Choose all that apply.
The logical reasons for using a pie chart to show how employees spend their time at ABC organization are;
the pie chart will help to show breakdown of hours worked by all employees at ABC organization.The pie chart works well to show changes in productivity over the course of a year.The pie chart works well to show trends in data.What is a pie chart ?A pie chart can be regarded as a circular statistical graphic, partitioned to slices to illustrate numerical proportion.
With the use of this pie charts, the ABC organization can be able to know breakdown of hours worked by all employees at ABC organization , hence option 1,2,4 are correct.
Learn more about pie chart at;
https://brainly.com/question/8407283
Answer:
A, C
Explanation:
its a and c your welcome
Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that someone has asked that question before. and then all you got to do that and you can keep your points. hope this helps! ;)
Answer:
Thx Man i actully didnt think of it before
(Hey do u wanna rp btw (roleplay
Explanation:
youre content and design should be influenced by the _______ of your users
a. age
b. goals
c. mood
d. attitude
i already know the answer 90%
im just making sure