C) The Cloud makes use of the client-server model.
(i) Explain the roles of the client and server in this relationship.

Answers

Answer 1
Please answer answer question answer
Answer 2

Answer:

But generally the shurikens are considered the best bang for you buck. Followed by the flame vent (if you want to hit apparitions with living weapon) or the Axe for general purpose. The dagger is considered the worst and in many cases actually manages to be WORSE than the piercing variant.

Explanation:


Related Questions

These are the records and traces an individual leaves behind as they use the internet
1 point

Digital Path

Digital map

Digital foot

Digital footprints

Answers

Answer:

Option D. Digital footprints

Explanation:

Digital footprint is all the stuff you leave behind as you use the Internet.

Digital footprints fs it’s the best

Which are malicious codes?
Select all that apply.
Spyware
Serum
Key loggers
Worms
JavaScript​

Answers

Answer:

Spyware

Key Loggers

Worms

Issue: I don't know what Serum is.

A. Fill in the blanks:
1.
is an effective way to display data in pictorial form.
2. Data series are the bars or slices that show the
3. Barchart displays data in the form of long
rods.
4.
is the vertical axis that is used to plot the values.
5.
is a key that is used to identify the colours, patterns, or symbol assigned to a data series.

Answers

Answer:

1. Charts.

2. Data series.

3. Rectangular.

4. Y-axis.

5. Legend.

Explanation:

1. Charts: is an effective way to display data in pictorial form. It includes the use of pie charts, bar charts, venn diagram, etc.

2. Data series: are the bars or slices that show the data values. It comprises of related data sets.

3. Barchart displays data in the form of long rectangular rods. Generally, bar charts are used for the comparison of informations obtained from a data collection by representing each value (information) with rectangular bars respectively. A bar chart has a x-axis and a y-axis used to represent the various categories of data collected.

4. Y-axis: is the vertical axis that is used to plot the values. The other axis for plotting values is known as X-axis.

5. Legend: is a key that is used to identify the colours, patterns, or symbol assigned to a data series.

What stops the current loop and resumes execution at the next statement?
the break statement

the final statement

the pass statement

the infinite-loop statement

Answers

Answer:

break statement:))

Explanation:

The statement that stops the current loop and resumes execution at the next statement is known as the break statement. Thus, the correct option for this question is A.

What is the break statement?

The break statement may be defined as a type statement that effectively terminates the execution of the nearest enclosing do, for, switch, or while statement in which it considerably appears.

While performing the break statement control passes to this statement and follows the termination of the break statement very efficiently. The purpose of the break statement is to break or terminate a loop function as early as possible.  

Therefore, the break statement is the statement that stops the current loop and resumes execution at the next statement. Thus, the correct option for this question is A.

To learn more about Break statements, refer to the link:

https://brainly.com/question/14548592

#SPJ2

B. Write your thoughts about the following in your notebook.
1. How will you safely use the computer when you are online?
2. How can one use the computer or mobile devices for business?
3. What would you do if you encounter unsafe and questionable content
or messages?​

Answers

1. stay with adult supervision

2. check on the web and create a site for it

3. quickly remove it and try not to read it

Explanation:

I really hope this helps

please mark as brainliest

1. What is the measure of muscle strength?

A. Number of repetitions in a set

B. Length of muscle stretch

C. Force against resistance

D. Time taken to complete a workout

Answers

Answer:

C. The force against resistance

Which function is correctly written?
=Average(C4)
=Average(C2:010)
=Average(D5-D20)

Answers

Answer:

=Average(C2:010)

Explanation:

You us the ; between the numbers, and u need two numbers for average. Sorry if wrong.

Answer:

2:010

Explanation:

Need help ASAP
Thanks+ BRAINLIST only for correct answer

What is the importance of protecting other’s personal information and privacy?

Answers

It is important to protect yours and others personal informations because some people might try to take advantage of them and use them for no good such as fraud, charging your card, taking your passwords, and so on

Hey,

So there are so many reasons to protect yours and others personal info online but  here are just a few.

1. Help stop credit card fraud. this is one of the biggest types of fraud in the internet.

2 stop identity theft.

3  prevent your social media accounts getting compromised .

Some fine advise.

change your login in info  more then not. it is more likely that someone will find your login info  online or thought a software then just guessing it.

-scav

Evaluate if the following function is a good candidate to be placed in a library. Why or why not?

Answers

Answer:

It cannot be a good candidate because the creator of the library is attempting to update the global variables player1Points and player2Points. The updated scores for each player won't be retained unless someone creates the global variables player1Points and player2Points in their program.

The updateScore function is meant to update the point of player1 and player2 ; since the variables player1 and player2 are only defined in the function, then they do not have a global scope. Hence, the function isn't right to be placed in a library.

Variables defined outside a function are called global variables ; hence, they can be referenced anywhere within the program.

Since the function references a global variable, then any program which intends to use the function must have the variables player1 and player2 must be defined globally in the program.

Hence, it is not a good candidate to be placed in a library.

Learn more:https://brainly.com/question/20720413

Time shifting occurs when

a. Clocks move ahead one hour in the spring

b. Works are copied and kept for future generations

C. Individuals copy works to view at a later time

d. Copyrighted materials comes into the public domain

Please select the best answer from the choices provided

A
B
C
D

Answers

Answer: C

Time shifting is when you move from one period in time to another.

Time shifting occurs when Individuals copy works to view at a later time.

What is Time shifting?

Time shifting is known to be a term that connote a move or a shift of a signal in the aspect of time. This can be done by the use of addition or subtraction.

Conclusively, Time shifting do take place when people copy works to view at a later time as they are moving the work to future time.

Learn more about Time shifting from

https://brainly.com/question/14124969

write a python program to convert a number entered by the user
the input is 985
the output is Nine Eight Five

Answers

Answer:

# Function to convert decimal number

# to binary using recursion

def DecimalToBinary(num):

if num >= 1:

DecimalToBinary(num // 2)

print(num % 2, end = '')

# Driver Code

if __name__ == '__main__':

# decimal value

dec_val = 24

# Calling function

DecimalToBinary(dec_val)

Explanation:

Which of the following is used as a placeholder for future code and has no function being executed?

hold

return
pass

null

Answers

Answer:

Pass, does nothing, you can put it in a function to just skip over it without failing.

Explanation:

Hold pauses the operation, return returns a value, and null is a placeholder variable that has many uses.

Answer:

i think it is pass

Explanation:

if not srry and let me know

sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses i am a failure sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses

Answers

Answer:

SUNGLASSES!!!!! Also, side note, you're not a failure!

EISDHUOSHSD ITS WORLD WIDE HANDSOME

Need help with my hw.​

Answers

If I am correct, it should be D. Hopefully I was helpful.
It is d I got it today

An audio recording has five minutes of silence at the beginning. Which audio-editing technique will delete this unwanted silence?

topping and tailing

normalizing

equalizing

dithering

Answers

Answer:

topping and tailing

Explanation:

What is output? Select all that apply. c = 0 while (c < 5): c = c + 1 print(c) 6 5 2 4 3 0 1

Answers

Answer:

2 4 3 0 1

Explanation:

Assignment 4: Evens and Odds
Instructions

Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd. Continue doing this as many times as the user indicated. Once the loop ends, output how many even numbers were entered and how many odd numbers were entered.

Hint: For a number to be even, when the number is divided by 2, there should be no remainder - so you will want to use the modulus (%) operator.

Hint: You will need two count variables to keep track of odd and even numbers.

Sample Run 1
How many numbers do you need to check? 5
Enter number: 20
20 is an even number.
Enter number: 33
33 is an odd number.
Enter number: 4
4 is an even number.
Enter number: 77
77 is an odd number.
Enter number: 8
8 is an even number.
You entered 3 even number(s).
You entered 2 odd number(s).
Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Benchmarks
1. Create and initialize two count variables - one for odd and one for even.
2. Prompt the user to answer the question, “How many numbers do you need to check?"
3. Based on the previous input, create a for loop that will run that exact number of times.
1. Prompt the user to “Enter number: “
2.If that number is even, output “[number] is an even number.”
3.Update the even count variable.
4.Or else if the number is odd, output “[number] is an odd number.”
5.Update the odd count variable.
4.Output “You entered [number] even number(s).”
5.Output “You entered [number] odd number(s)."

Answers

Wow that is really long


dash+dash=100
Both dash and dashare prime numbers.
How many different solutions can you find​

Answers

Answer:

6

Explanation:

97+3 = 100

89+11 = 100

83+17 = 100

71+29 = 100

59+41 = 100

53+47 = 100

I counted them using excel, see pic.

Answer:

?

Explanation:

?

I need to change the subject before they get onto me. I am only revealing info today if you are a friend.

Let's change the subject to the Tillinghan Mystery (Totally not related to the Dad Mystery)

Who is Tillinghan, and what is his website?

Answers

Answer:

uuuuummmm i have no idea what your doing but tillingan is a doctor and his website is to sell children over internet

Explanation:

im scared of myself ik

please can somebody help me! i’m really stuck on this question

Answers

Answer:

import turtle

t = turtle.Turtle()

t.speed(0)

for x in range(1,10):

 for i in range(4):

   t.forward(20*x)

   t.right(90)

A mind map presents project information in what type of format?
nt
O unordered
linear
serial
sequential

Answers

Answer:

Unordered

Explanation:

got in on edg

Answer:

B

Explanation:

Which of the following is the main cause of network failure?

A. cables that break
B. peripherals that get in the way
C. storms
D. human error

Answers

Answer:

Possibly A or C

Explanation:

Answer: human error is the right answer!!!!!

Explanation:

I took the quiz

How does a passive attack differ from an active attack?

Answers

Active and Passive Attacks are security attacks. In Active attack, an attacker tries to modify the content of the messages. Whereas in Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. ... In Passive Attack, information remain unchanged. Hope this helped :)

7.4 code practice question 2 edhesive

Answers

Answer:

def GPAcalc(g, w):

   if g == "a" or g == "A":

       return 4 + w

   elif g == "B" or g == "b":

       return 3 + w

   elif g == "C" or g == "c":

       return 2 + w

   elif g == "D" or g == "d":

       return 1 + w

   elif g == "F" or g == "f":

       return 0 + w

   else:

       return "Invalid"

grade = input("Enter your Letter Grade: ")

weight = int(input("Is it weighted? (1 = yes, 0 = no)"))

gpa = GPAcalc(grade, weight)

print("Your GPA score is: " + str(gpa))

Explanation:

I hope this helps!

The code practice question illustrates the use of conditional statements.

The execution of a conditional statement depends on its truth value

The program in Python, where comments are used to explain each line is as follows:

#Start by initializing the dictionary

dict = {"a": 4, "b": 3, "c": 2, "d": 1, "f": 0}

#This gets input for grade

grade = input().lower()

#This gets input for the weighted average

weighted = int(input())

#If the weighted average is 1, and the grade is in the dictionary

if weighted == 1 and grade in dictionary:

   #This prints the GPA score

   print("Your GPA score is: "+str(dict[grade] + 1))

#If the weighted average is 0, and the grade is in the dictionary

elif weighted == 0 and grade in dictionary:

   #This prints the GPA score

   print("Your GPA score is : "+str(dict[grade]))

#Otherwise

else:

   #The grade is invalid

   print("Invalid")

Read more about similar programs at:

brainly.com/question/19117781

Give me 4 examples of things to consider as a sound designer?
HURYYYYY IM TIMED

Answers

Answer:

Sound design components include sound effects or SFX sound design, mixing, Foley sound design, dialogue, and music.

Explanation:

The ___ function can be entered by clicking the cell where you want to add the funtion such as cell J6. Then click the arrow next to the autosum button and choose averange

Answers

Answer:

The name of the function that can be added to a cell below a column of numbers or to the right of a row of numbers to find the average by clicking on the AutoSum button on the HOME tab is;

Average

Explanation:

The average function is the function used to quickly find the arithmetic mean, 'μ', or average of a number group, x₁, x₂, x₃, ...xₙ, which is given by dividing the sum of the numbers by the count, 'n', of the numbers, as follows;

μ = ∑x/n

The AutoSum can be used to find the average in Microsoft Excel by clicking on the next cell to row of cells to the right or immediately below the column of cells, then clicking on the down arrow on the right of the AutoSum button on the HOME tab and selecting Average from among the options, the average of the numbers in the column or row of cells will be displayed in the selected cell.

Therefore, we have;

The Average function can be entered by clicking the cell where you want to add the function such as cell J6. Then click the arrow next to the AutoSum button and choose average

what steps should you take if your harassed online​

Answers

tell an adult and report the person harassing you
block them and if ur comfortable, tell ur parents

1. You are about to start a new photography program at your graduate school. While you already have a professional DSLR
camera, you want to purchase some additional tools and equipment so that you are prepared for any photography
situation. What are some helpful tools and/or equipment that you might purchase? Identify, describe, and explain
several items including how they are used and why.

Answers

Answer:

I should bring extra batteries, a UV filter, Cleaning kit, a camera case, external hard drive, the 'Nifty Fifty' lens, and a tripod. Most photographers use a UV lens filter to protect their cameras, especially if they have an expensive lens. UV lens filters prevent dust and dirt from coming into contact with the lens. ... If rain or water droplets get on your lens filter, it's easier to wipe these off your filter than your lens. The best lens cleaning kits will keep your lenses clean to avoid photos of your fingerprints. A good lens cleaning kit is a photographer's best friend. It might not be as fun or flashy as the latest camera gear, but it's just as important as your DSLR when it comes to capturing great images.  Photos are often backed up to different devices and a remote cloud. External hard drives are perfect for local backup. Requirements: The requirements for external hard drives used for backup are large volume and affordability. Speed and size are not critical here.  Tripods are used for both still and motion photography to prevent camera movement. They are necessary when slow-speed exposures are being made, or when lenses of extreme focal length are used, as any camera movement while the shutter is open will produce a blurred image.

Explanation: I just did this and this was my answer. Im getting an A in this class (pls mark me brainlyist)

To buy some helpful tools and/or equipment that you might purchase are the greater batteries, a UV clear out, a Cleaning package, a digital digicam case, an outside difficult drive, the 'Nifty Fifty' lens, and a tripod.

What is the other equipment that helps in camera protection?

The excellent lens cleansing kits will hold your lenses easy to keep away from pics of your fingerprints. An excellent lens cleansing package is a photographer's excellent friend. It won't be as amusing or flashy because of the brand new digital digicam gear, however, it is simply as essential as your DSLR in terms of shooting superb images.

Most photographers use a UV lens clear to defend their cameras, in particular in the event that they have a steeply-priced lens. UV lens filters save you dirt and dust from getting into touch with the lens. If rain or water droplets get to your lens clear out, it is less complicated to wipe those off your clear out than your lens.

Read more about the lens:

https://brainly.com/question/9757866

#SPJ2

CAN SOMEONE PLEASE EXPLAIN HOW TO FIND BINARY CODE TO ME LIKE IS IT EASY LIKE I NEED THE WHOLE BREAKDOWN PLS

Answers

Answer:

In binary code, each decimal number (0–9) is represented by a set of four binary digits, or bits. The four fundamental arithmetic operations (addition, subtraction, multiplication, and division) can all be reduced to combinations of fundamental Boolean algebraic operations on binary numbers.

Explanation:

Binary Numbers Explained – Beginners Guide ... Before we learn about the binary number system we will look in more detail ... and they are easier to learn using a system that you are more familiar with. Firstly our decimal system uses 10 as a base and the numbers range from 0 to 9 ... See Wiki for details.

Identify the causes of installation problems. (Choose all that apply)

Answers

Answer:

the last one

Explanation:

please mark brainliest

Answer: The answers are: A,B,D

edg.

Other Questions
Which would be the BEST font for the menu of a medieval-themed restaurant?Group of answer choicesRockwellComic SansApple ChanceryTimes New Roman Describe the y-intercept and end behavior of the following graph: The Union Pacific and the Central Pacific hired many immigrantsfrom what two countries? 1515 of 16George needs flour to make bread and cookies. He used 3 cups of flour for the bread. He need 1 cups of flour for each batch of cookiesGeorge has a total of 12 cups of flour.Select the someone help me please. Greek Dark Ages a period of time in which Greek culture declined from 1100 B.C.E through 800 B.C.E A. 1100 B.C.E through 800 B.C.EB. 1200 B.C.E through 800 B.C.EHELP RIGHT ANSWERS ONLY! Solving For x. [tex]2x + 5 = 1[/tex]Step By Step Explanation, Please. What is the smallest, most basic level of organization in an animal orplant? Both quotations use imagery that conveys a sense of? Round off 35.65 to three significant figures.help Find an equivalent ratio in simplest terms:44 : 33 why did george washington create the cabinet? What is the purpose of the story about the falcon being killed by the owl?A. To show that falcons just aren't as awesome as people make them out to beB. To show that the murder that took place has knocked nature itself out of order (fair is foul .. andwhatnot)C. To show that in any battle of birds, you can never underestimate the heart of an owlD. There is no purpose - 70 year old men tend to just ramble on and on and on and on ... The VIRGINIA PLAN wanted each state to have TWO representatives in Congress. true false prologue de la bote merveilles Solve. 7/3x+1/3x=4+5/3x The value of x is The area of a circle is represented by the equation A=r2, where r is the radius. The area is 64 m2.What is the length of the diameter? Your friend is telling you about not getting into the university that they wanted to go to.DiscriminativeComprehensiveO InformationalCriticalO Therapeutic/Empathetic Gavin owns a food truck that sells tacos and burritos. He only has enough ingredients to make 94 tacos or burritos.Write an inequality that could represent the possible values for the number of tacos sold, t, and the number of burritos sold, b, that would satisfy the constraint. please help me.discuss the importance of Marco Polos journeys and the exchange of technology and culture.