Activity #2
1. Write the formula in getting the sum of these two numbers:
16 and 25; 16 is in cell B2 and 25 is in cell B3.
Answer:
2. Write the multiplication formula of these two numbers:
8 and 10; 8 is in cell C4 and 10 is in cell C5.
Answer:
3. Write the formula in dividing these numbers:
20 and 5 : 20 is in cell F2 and 5 is in cell F3.
Answer;
Answer:
1. sum(B2,B3) , OR =B3+B2
2. =C4*C5
3. =F2/F3
Explanation:
Use the = operator to do any basic math using numbers or the respective cells. each also have respective functions as shown first in problem 1.
Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplies the value by ten and outputs the result.
Ill choose flowchart. Look picture for the answer
ask me if you have any doubts about my answer.
similarities of ROM and RAM?
Explanation:
both are primary storage devices
3) Which of the following operators is used for performing exponentiation?
Answer:
pls make more detailed
Explanation:
The operator that is used for performing exponentiation is ^. The correct option is A.
What are exponential?One technique to determine the exponential value of the supplied base and exponent values in Python is to use the exponentiation operator. Between the base and exponent values, we utilize the (**) double asterisk/exponentiation operator.
It provides a string in exponential notation that represents the Number object. Using the syntax number.to Exponential (value) The '.' operator is used with a number to invoke the toExponential() method, as demonstrated in the syntax above.
The ^ symbol represents the exponent. This symbol is known as a carrot (). As an illustration, 4 raised to 2 can be expressed as 42 or 42.
Therefore, the correct option is A) ^.
To learn more about exponential, refer to the link:
https://brainly.com/question/28596571
#SPJ6
The question is incomplete. Your most probably complete question is given below:
A) ^
B) #
C) *
D) /
Animations
Animations are !
Blank which can be Applied to blank in a presentation?
what is the quotient of 8.16 ÷ 100
Answer:
0.0816
Explanation:
8.16 ÷ 100 = 0.0816 (Ans)
Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.
Answer:
A. The mixture contains compounds with similar polarities but different solubilities.
Explanation:
Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.
a program execution is called
a program execution is called a process
ExplanationIn the process, they process the data and also execute the data.
What happen in process?
First the data came from input, then go to the memory. The process take the data from the memory and process it and divide it, if there's arithmetic data thingy it will go to ALU and the rest to CU. After the data finish being proceed, the data will be sent to CU and executed there, then send back to the memory and go to the output to be shown.#Sorry my grammar sucks
#Moderators please don't be mean, dont delete my answers just to get approval from your senior or just to get the biggest moderation daily rank.
Traffic flow analysis is classified as which?
Answer:
c. An active attack
d. A passive attack
Explanation:
Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.
Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for:
a. The segments sent from A to S.
b. The segments sent from B to S.
c. The segments sent from S to A.
d. The segments sent from S to B.
e. If A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S?
f. How about if they are the same host?
Answer:
Explanation:
From the given information;
We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.
NOTE:
That the destination port numbers sent from A to S and B to S are the same in their segments.
That the destination port numbers sent from S to A and S to B are the same in their segments.
From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)
From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet).
From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.
From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.
Yes, it is possible. This is because the inclusion of IP in the segments is to recognize the host.
No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.
Pulling out specific differences
Answer:
Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient
Answer:
The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.
Explanation:
will give brainlyist
Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.
i think its the first sentence: Mobile devices have become the main source of communication for many people around the world
if im wrong im dum ;-;
Answer:
Customized advertising can be integrated based on specific users location.
Explanation:
Right for Plato/edmentum
Choose all of the items that accurately describe an operating system.
manages a computer’s hardware
implements essential features like file and folder management
is managed by the microprocessor (CPU)
provides the platform that application software runs on
is not necessary on a smartphone
Answer:
provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.
Explanation:
The operating system manages a computer’s hardware, provides the platform that application software runs on and implements essential features like file and folder management. The correct options are a, b, and d.
What is operating system?An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program.
The application programs interact with the operating system by requesting services via a predefined application program interface (API).
The operating system (OS) controls all of the computer's software and hardware. It manages files, memory, and processes, handles input and output, and controls peripheral devices such as disk drives and printers.
The operating system manages the hardware of a computer, provides the platform on which application software runs, and implements essential features such as file and folder management.
Thus, the correct options are a, b, and d.
For more details regarding operating system, visit:
https://brainly.com/question/6689423
#SPJ2
Cloud computing security risks
Answer:
Risks:
Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud
Attackers could find an exploit and steal company data without ever physically touching the company's computer.
That's what I can think of.
Explanation:
True/False. Debugging and sequencing are the same process; just different
terms.
Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)
5 disadvantage of assembly
level language
Disadvantages Of Assembly Language
Long programs written in such languages cannot be executed on small sized computers.It takes lot of time to code or write the program, as it is more complex in nature.Difficult to remember the syntax.Lack of portability of program between computers of different makes.No SDKs (System Development Kit).Employment was expected to grow by 13 percent from 2010 to 2020 in which of the following fields?
A.) video game design
B.)graphic design
C.)animation
D.)computer engineering
Answer: B
Explanation:
Identify at least 6 errors from the following program code. Write all the errors and rewrite the correct program.(11 pts)
1. public E2
2. {
3. Public static void main(String )
4. {
5. System.Out.Println(“hello)
6. }
Answer:The code after rearrange the question segment:
public class Q// Class declaration of Q name.
{// Open the class body.
public static void main(String[] a) // Main function declaration.
{ //Open the main-function body.
System.out.println("Q"); // Print statement which print Q.
} //close the main-function body.
}//close the class body.
Output:
Q
Explanation:
Where do you go to connect to a VPN server in Windows 7?
Answer:
1) Start→Control Panel→View Network Status.
2) Click the Connect to a Network link.
3) Locate the VPN you want to connect to and click its name and then click the Connect button.
The button only appears after you click the name of the network.
To disconnect from a network, click the network name in this dialog box and then click the Disconnect button. Click Disconnect when prompted and then click Close.
4) Enter your network security key.
Most VPNs require a security key. It’s the same one you used to establish the connection.
Select the Hide Characters check box if you want to keep the Key hidden.
5) Click OK and then click the Connect button.
Windows 7 will use the key to establish a connection to the VPN network.
WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL
Answer:
cause architects are weird
Explanation:
Explanation:
Cause apartments is apartments so therefore its called apartments
07:39
30
Cancel
Identity verification
Verify
Question1: What was the name of your primary school?
Answer
Question2: What was the name of your best friend in
childhood?
Answer
Explanation:
nose pero esta viendo que la tecnología es con electricidad y unos elementos eléctricos
When cropping a picture to shape, you can only turn it into a square or circle.
Select one:
O True
O False
Compared with space operations specialists, intelligence officers are which of the following?
A.) less likely to perform on-the-job training
B.)more likely to participate in technical training
C.)less likely to obtain a bachelor’s degree
D.)more likely to work with highly classified information
Answer:
more involved in aligning communications systems
Explanation:
I think this should be it
Answer could be:
more likely to work with highly classified informationor
something before Z
Example of vector image format
Answer:
JPEGs, GIFs and PNGs are common raster image types. ...
Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.
Consider the declaration of the struct houseType given in this chapter. Suppose firstHouse and secondHouse are variables of houseType. Write C11 statement(s) to compare the style and price of firstHouse and secondHouse. Output true if the corresponding values are the same; false otherwise. (2, 3)
Answer:
See Explanation
Explanation:
The question is incomplete as there is no link pointing to the houseType struct of chapter 1.
So, I've answered the question from scratch
See attachment for explanation where I used comments to explain each line.
The program is as follows:
#include <iostream>
using namespace std;
struct houseType{
int firstHouse, secondHouse;
};
int main() {
houseType hT;
cout << "Enter the price of both house: ";
cin>> hT.firstHouse;
cin>> hT.secondHouse;
if(hT.firstHouse == hT.secondHouse){ cout<<"true"; }
else{ cout<<"false"; }
return 0;
}
how can you say that a painting is real?
Answer:Know the Artist. Prior to buying an artist's work, become familiar with their oeuvre. ...
Use a Magnifying Glass. Looking at the surface of a painting with a magnifying glass is one of the best ways to spot a print. ...
Turn the Painting Over.
Explanation:brainliest
See from the way they paint. You can see from the picture that its way different. Each artist has different way to paint. see the colour also
What are the steps to add text in Kinzoa Movie Maker?
Answer:
There should be a tab titled "add text." Click on that and add your text.
Explanation:
A computer connected to the internet that ask for data is a
Answer:
Client
Explanation:
When your computer is connected to the internet it is always asking and sending data. Your computer is the client which recieves the data from the sever.