complex machines are defined by...

Answers

Answer 1

Answer:

A complex machine is a machine made up of two or more simple machines that make your work easier to do. There are six simple machines from which all complex machines are made.

Examples:levers, wedges, pulleys, screws, wheel and axle and inclined planes.

Hope this helped you!

Explanation:

Answer 2

Answer:

complex machines are 2 or more machines combined together to make a new one and make your work easier to do. examples of this would be levers, inclined planes and even car jacks.

Explanation:


Related Questions

Write a function silence (typecode, length) that returns a new data array containing all zeros of the given type code and length.

python programming

Answers

Answer:

Following are the code to this question:

import array as a#import package array  

def silence(typecode, length):#defining method silence that accepts two parameters  

   Val= a.array(typecode, [0]*length)#defining Val variable that stores zeros of the given type code and length

   return Val# use return keyword for return Val variable value

typecode = input('Enter typecode value: ')#use input method for input

length = int(input('Enter length value: '))#defining length variable that input integer value

print(*(silence(typecode, length)))#use print method to call silence method

Output:

Enter typecode value: b

Enter length value: 10

0 0 0 0 0 0 0 0 0 0

Explanation:

description of the code:

In the above-given Python code, Firstly we import a package that is the array, after that a method "silence" is defined that accepts two variables in its parameter that is "typecode and length". Inside the method, the "Val" variable is declared, which is used to calculate and store all zeros of the typecode and length variable. Outside the method, "typecode and length variable" is used for input the value from the user end-use the print method to call the function "silence" with an asterisk.

What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?

A. The era in which the story happens
B. The place in which the story is set
C. The movie’s characters
D. All of the above

Answers

Answer:

The correct option is;

D. All of the above

Explanation:

The role of a production designer in film and television production involves portraying the generally perception and appearance of the narrative. The production designer is responsible for addressing the viewer perception of the location, the period in time of the narrative about the leading character, the depiction of the acts of the and experiences of the characters and the reason for their acts and experiences.

The production designer have an essential role in movie production and television programming and they work first hand with the motion picture cinematographer, director and producer.

Answer:

All of the above

Explanation:

edg2021

The production designer must have a solid understanding of many aspects of the film’s production. Location and time period of a film are especially important from a production design perspective, as is the amount of money available for production design. This means A and B are 100% correct, so all of the above is the only one.

What is qwerty and why is it on the keyboard?

Answers

Answer:

qwerty is the main way people sort out there keyboard as you can see on the left side of the keyboard there is W,A,S,D

Explanation:

AnswerQWERRTY

Explanation:

EEEEEE

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

All of the following are basic functionality provided by e-commerce merchant server software except: Question 22 options: A) productivity software. B) a product catalog. C) a shopping cart. D) credit card processing.

Answers

Answer:

The correct answer is option A "productivity software"

Explanation:

An e-commerce merchant server software is a software that enables sales exclusively over the Internet. It is a software that connects to a company server with the aim of allowing sales of the company's products to take place over the internet. Here, sales are capped with customers even paying for what they purchase online.

A product catalog in an e-commerce merchant server software shows lists of essential products that buyers can purchase online. These lists include product features, price, color, brand, size, and so many other examples.

A shopping cart is some sort of functionality in eCommerce software used to collect the items potential buyers select online with the aim to make it easier for the buyers to see all the items selected after shopping, make necessary adjustments if need be before payment.

Credit Card processing allows e-commerce merchant server software make buyers get card payment options to get their payment processed. In the authorization stage, the merchant must obtain approval for payment from the issuing bank. Some banks would require their client to activate this payment option with them at the bank before such clients are allowed to do e-commerce payments.  

The correct answer is productivity software because it is a software used for producing information that shows the productivity of a particular group, persons. In other words, productivity software can help produce things that simplify productivity they include worksheets, graphs, digital videos, and so many other examples.

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Answers

Answer:

Search engine

Explanation:

A search engine is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Search engine are softwares that helps users look for information on the internet in a systematic way. It makes information easily available for users.

Search engines allows the users to have access to different perspective about their inquiries. It provides users with information from web pages, images, videos, articles, research paper.

Examples of search engines includes: Google, Bing, ask.com, Yahoo etc.

Match the type of cyber attackers to the description.

1. State-sponsored attackers
2. Hacktivists
3. Terrorists
4. Script kiddies

a. Gather intelligence or commit sabotage on specific goals on behalf of their government.
b. Make political statements in order to create an awareness of issues that are important to them.
c. Make political statements, or create fear, by causing physical or psychological damage to victims

Answers

Answer:

The answer can be defined as follows:

In choice 1 the answer is the point "a".

In choice 2 the answer is the point "b".

In choice 3  the answer is the point "c".

Explanation:

In the given question the last choice is missing. so, we define only the first three matches and these explanations can be defined as follows:

In point 1, It is used on behalf of their authority for intelligence collection or disruption for specific purposes. It has one of three aims to manipulate and investigate the flaws of national infrastructure. it also collects information and uses capital from structures and people. In point 2, It is used to make political declarations, which raise awareness of matters which is important to them. In other words, we can say that it is a community of criminals uniting in pursuit of the social goal to carry out cyber attacks.  In point 3, It means a person who encourages and spreads errors. Someone has misguided confidence. It is used to make political claims or panic by damaging the victims physically or psychically.

the program is not going into the if loop but directly in the else one and is saying 'wrng answer' even if it is right. where is the problem? (i will give brainliest please HELPPPPPPPP) this is python btw

Answers

Answer:

convert the input to an integer:

 ans = int(input(str(num1)+"+"+str(num2)+"="))

Explanation:

Your code is comparing an integer to a string, which will always return false. If you cast your input to an integer using the int() function, your problem should be solved.

(BRAINLIEST QUESTION) When your friend Sarah turns on his computer, she hears four beeps. The computer won’t fully boot. Sarah has a Dell computer with a quad-core processor and has recently upgraded her RAM. Apply the troubleshooting methodology to help her understand and resolve this problem; I have them listed below: Identify the Problem Internet Research Establish a Theory of Probable Cause Test the Theory Establish a Plan of Action Implement the Solution or Escalate Verify Full System Functionality Document Findings

Answers

Answer:

4 beeps indicate a Memory Read / Write failure. Try re-seating the Memory module by removing and reinserting it in the slot. this could mean it could've just jiggled loose after a while or dust, there could be a hundred other problems but those are the two most common

which information purpose uses video from a security camera?

Answers

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

Exploits are gaps, holes, weaknesses, or flaws in corporate networks, IT security defenses, user training, policy enforcement, data storage, software, operating systems, apps, or mobile devices that expose an organization to intrusions or other attacks. Select one: True False

Answers

Answer:

The answer is "False".

Explanation:

In the given question, the answer is false because it stands for " vulnerability", that is an application hole, that is used to design the implementation of the errors.

It enables a hacker to damage the application's investors. The device owners, application users as well as other groups dependent on this software, which include stakeholders, that's why we don't use this application in the cybersecurity  

What peripheral port type was originally developed by Apple and is currently regarded as the optimal interface for digital video transfer

Answers

Answer:

IEEE 1394

Explanation: Common port used for video preipherals and other video transfer

which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist​

Answers

Answer:

1. The answers are B and D

2. The answer is A

3. The answer is A

4. The answers are C and D

authoreditor journalist

Are the answers to this question.

A career in communication involves the use of professionals in mass media to to pass messages across to an audience.

Professionals in media work with different companies, organizations and businesses to do the jobs of  influencing and educating people or the intended audience about happenings, products and services and practices.

read more at https://brainly.com/question/13391998?referrer=searchResults

A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage?

Answers

Answer:

Answered below

Explanation:

A secondary storage device, also called external storage or auxiliary storage device, is a non-volatile, internal or external storage device. They are storage devices that are used to store data permanently and can be used to store large amounts of data. Applications and programs in a computer, such as operating systems, drivers, files, applications etc are stored in the secondary storage device.

Examples of these devices include;

Hard disk drives, solid-state drives, CD-ROMS, DVD, Google drive, USB flash drive etc.

Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’s degree in visual communications B. bachelor’s degree in fine arts C. bachelor’s degree in filmmaking D. associate degree in web design

Answers

Answer:

C. bachelor’s degree in filmmaking

Explanation:

Because Andy wants to become a multimedia producer, the degree that would best help him achieve his goal is a bachelor's degree in filmmaking.

Multimedia has to do with both audio, video and graphics or animations because it encompasses multiple media files.

Filmmaking has to do with the various forms of making and producing films. Filmmaking has to do with multiple media (multimedia) and it would help him achieve his goal.

Answer: A. bachelor’s degree in visual communications

Explanation: Employers prefer people with a bachelor’s degree in multimedia, visual communications, journalism, graphic design, marketing, or a related field

"The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a centralized manner is a feature of what Windows Server 2012 R2 service?

Answers

Answer:

Active Directory

Explanation:

The 2012 R2 Windows Server  is the 6th version of  Windows Server server operating system which is made by Microsoft. It is a part of the Windows NT family of the operating systems.

Active Directory helps to store the default user profiles as well as the user login scripts.

It helps to assign the system policies, assign  permission to the users overt he network resources and also to deploy software in a centralized manner.

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

The computer models used to predict past climates include only natural causes; the predicted temperatures and the actual measured temperature data diverge starting about ______.

Answers

Answer:

The answer is "1960".

Explanation:

A computer model is a software program, which simulates what else will scenario. These services are often used in areas in chemistry, industry, and research, like physics, biology, and the environment.  

Climate observations enable you for the measurement of its average long-term conditions, giving insight into the environment or even a region. Comprehensive weather data have also been maintained for over 140 years in several parts of this country. It can identify trends and patterns across all these long-term records.

During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

Answers

Answer: processing

Explanation:

During the processing steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

At this stage, the data that has been gotten will have to be worked on by manipulating it, making necessary calculations in order to get a useful information out of it.

Answer: processing

Explanation: got it right on edgen

In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answer choices

Answers

Answer:

fully replicated

Explanation:

In a distributed database system, the data placement alternative with the highest reliability and availability is fully replicated. Hence, option B is correct.

What is a distributed database system?

A distributed database (DDB) is an organized group of databases that are geographically dispersed among locations in a computer network. A distributed database management system (DDBMS) is a piece of software that controls a distributed database while making the users unaware of the distribution characteristics.

A distributed database is essentially a database that is dispersed across numerous sites, i.e., on various computers or over a network of computers, and is not restricted to a single system. A distributed database system is spread across numerous locations with distinct physical components.

In data warehousing, where enormous volumes of data are processed and accessed by several users or database clients at once, DDBMS is frequently utilized. To manage data in this database system,

Thus, option B is correct.

For more information about distributed database system, click here:

https://brainly.com/question/29896580

#SPJ5

The options were missing-

A. centralized

B. fully replicated

C. strictly partitioned

D. hybrid

When registering a new domain name, either the registrar's servers or self-owned servers can be used as name servers. What function will the name servers provide for the domain?

Answers

Answer:

Authoritative

Dig Into DNS

Explanation:

In the above question that which function will the domain receive from the name server is an Authoritative functions because it is the server that issues command to the domain

The full meaning of Dig in this context is Domain Information Groper which is refer to the administration command line instrument which is use in the navigating and querying of the Domain Name System,and which is also used for verifying and troubleshooting any Domain Name System issues.

Vocab Bank
Copyright, license, fair use, creative commons, plagiarize, piracy, creative work, public domain
1. Amy decided to her paper for class by copying and pasting from Wikipedia and saying she wrote it.
2. Because Zoe used a small amount of a movie in a remix video she made that pokes fun at the main
character, she could say it's
3. Robbie found a photo in the that's no longer copyrighted, so he could use it however he wants
4. Angela has a Flickr page with all of her photos, and in order to define for others how she wants her photos
to be used, she created a copyright that is listed on her page.
5. Alex had an idea for a poem in his head for the longest time, but once he finally wrote it down it instantly
had a
6. Eric uses a program where he "rips" movies and burns" them to DVDs, which he then sells to friends.
What Eric is doing is called
7. When Dwayne used a kind of copyright to make it easy for others to copy and share his video, he was
using
8. Books, movies, music, websites, games, and pieces of art are all examples of

Answers

Explanation:

what are the words.........

Which of the following is NOT a semantic reason for using header tags
A. They establish a hierarchy of information
B. They serve as headlines to new sections or subsections of content
C. They convey a search engines that they contain important information
D. They make text larger and bold

Answers

Answer:

The correct option is;

C. They make text larger and bold

Explanation:

The semantic reasons for using header tags which are the benefits users derive from including header tags in content published on the web includes;

1) They give structure to the writing included in the document

2) Header tabs allow text to be broken into sections with different content in focus

3) Header tags are used to add key words to a page

4) To boost search engine optimization SEO

5) To improve visibility.

Match each of the following software categories to its primary use:

I. entertainment
II. enterprise resource planning
III. database
IV. video-editing
V. word processing

a. manage back end business functions
b. write and edit documents
c. play games
d. edit movies
e. keep track of clients

Answers

The answer is yes and ya know I gotta ask for a better idea to make it look so good omg was the year it wasn’t so bad bruh was a little fun but it wasn’t so hard omg was the first day I had a dream that you were gonna kiss me

Your company has just opened an office in another state and you need the computers to communicate between the offices. What type of network should you create?

Answers

Answer:

WAN network

Explanation:

A WAN network is an abbreviation for wide area network. This telecommunication network is mainly used for networking computers. They are not tied to just one location. They can also be called network of networks. It connects several LANs. The lans stand for local area and networks and they are computer networks and devices that are connected to each other within a geographical area.

What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.out.println("three");

Answers

I'm not familiar with Java, but I'm familiar with C#.

Ok, back to the point. Those lines will print in your console: "One", "Two" and "Three"

Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

Yes

Explanation:

because everyones privacy should be respected

Which of the following is something that an information technology (IT) professional would do? A. build and repair computers B. create and improve software C. collect and utilize data D. manage grades and enrollments

Answers

I believe it’s letter C because that’s the only one that makes more sense

Why can repitition be used in emphasis.

Answers

Answer:

Repetition is an important literary device because it allows a writer or speaker to place emphasis on things they choose as significant. It tells the reader or audience that the words being used are central enough to be repeated, and lets them know when to pay special attention to the language.

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently? the Styles task pane the Replace task pane the Format Painter feature the Copy and Paste feature

Answers

Answer:

C. format painter

Explanation:

Answer would be C, I guessed it and got it correct.

Other Questions
a submarine is 50 meter below sea levl. it goes up 15 meters, then goes down 40 meters. what is the submarine' new position relative to sea level ? 1. ( -105 meters) 2. ( -75meters) 3.( -35 meters) 4. ( 25 meters) What is The ratio of atoms in HCI is ' - Use the following information to determine the break-even point in units (rounded to the nearest whole unit): Unit sales 58,000 Units Unit selling price $14.90 Unit variable cost $8.30 Fixed costs $194,000 lee el siguiente artculo con atencin el artculo se encuentra en el anexo 4 de Educacin para la ciudadana en la parte inferior de la ficha con base el artculo explica Cules han sido las acciones tomadas por el gobierno para mitigar el desempleo find sum of series: 1+2+3+...+n 1. Robyn enjoys news _______ about health because she's a doctor. She also reads articles about health. Which phrase best describes the U.S. Constitution?A. a treatise on governmentB. a plan of governmentC. a preambleD. a code FUNCION AFN O LINEAL. Una empresa de gas cobra el servicio del siguiente modo: un cargo fijo de $140, mas un importe por el consumo mensual a razon de $25 el m3. A) cuanto debera abonar la familia a la que se le registro un consumo de 140 m3 en el mes de mayo? (Los meses no es de importar :3) B) cual es la formula que define esta funcion para un numero "x" de m3 consumidos? C) representar graficamente la situacion planteada D) que representa en este caso la ordenada al origen? Si alguien me ayuda, de verdad se lo agradezco Hello i'm in middle school and im asking Explain why each definition is important to Physical Education (PE) in your own words. Warm-Up Cool Down Respect Facilities Orientation Safety Diverse Etiquette Abilities Responsibilities The income statements for Federer Sports Apparel for 2019 and 2018 are presented below Required Prepare a horizontal analysis for 2019 using 2018 as the base year. (Decreases should be indicated with a minus sign. Round your percentage answers to 1 decimal place.) FEDERER SPORTS APPAR Income Statement For the Years Ended December 31 Increase Decrease Year 2019 2018 Amount % Net sales 18,800,000 15,500,000 goods 13,200,000 7,000,000 Gross prof 5,600,000 8,500,000 1,600,000 1,200,000 1,000,000 1,000,000 0 Loss (litigation 1,500,000 300,000 Cost of sold Operating expenses Depreciation expense Inventory 200,000 A 12-V DC automobile head lamp is to be used on a fishing boat with a 24-V power system. The head lamp is rated at 50 W. A resistor is to be connected in series with the lamp to permit it to operate on 24 V. What should be the resistance and power rating of the resistor? the lowest temperature ever recorded on Earth is -94.7 this was recorded in August 2010 in Antarctica. Before this date, the previous record was at -89.2 What is the difference between these two extreme temperatures? CAN SOMEONE PLEASE HELP ME In two to three sentences, explain the relationship between the physical characteristics and human characteristics of a place. Under GASB standards, financial information useful for assessing operational accountability is primarily reported in which financial statements? Government-wide Financial Statements Fund Financial Statements a. No Yes b. Yes No c. Yes Yes d. No No The language of price controls Suppose that, in a competitive market without government regulations, the equilibrium price of milk is $2.50 per gallon. Complete the following table by indicating whether each of the statements is an example of a price ceiling or a price floor and whether it is binding or nonbinding. Statement The government has instituted a legal minimum price of $3.00 per gallon for milk. The government prohibits grocery stores from selling milk for more than $2.30 per gallion There are many teenagers who would like to work at grocery stores, but they are not hired due to minimum-wage laws. Price Control Binding or Not Grade It Now Save & Continue Continue without saving. How long does it take an automobile traveling 66.7 km/h to become even with a car that is traveling in another lane at 52.7 km/h if the cars' front bumpers are initially 119 m apart? Andrew has a cell phone plan that provides 300 free minutes each month for a flat rate of $19. for any minutes over 200, andrew is charged $0.39 per minute. which of the following piece-wise functions represents charges based on andrews cell phone plan? Which of the following is not true of a corporation? a. It may buy, own, and sell property. b. It may sue and be sued. c. The acts of its owners bind the corporation. d. It may enter into binding legal contracts in its own name.