Answer:
I DO
Explanation:
2. According to the U.S. Department of Labor Statistics, which field of drafting has the highest median
salary:
a.Architectural
b.Mechanical
c.Electronics
d. Radiological
please answer this question
Answer:
what is the other language
is it Assamese clarify me in the comment section bro
Select the correct answer from each drop-down menu.
What is the purpose of a firewall installed on the web server?
A firewall blocks all- restricted, legal, or illegal-
access to a web server other than those services that are intended for-internal, public, or private-
use.
Answer:
Illegal and public
Explanation:
Description
How many minutes of video would fill an iPhone with 8 GB of
storage, where 3 GB is already used.
One minute of video takes 150 MB of storage.
One GB (gigabytes) is about 1000 MB (megabytes).
Hint: Do all of your calculations in megabytes (MB).
Is computing gcse easy or hard
Answer:
my friend that took it said that there was a lot of complex theory involved- i was initially supposed to take it, but my blocks didn't align so i had to take geography instead
honestly, i would say it was one of the best decisions I've made, since i see lots of computing students completely confused by what they're doing.
To be honest i have never taken a GCSE but give your self time to study like any other test and stress about it.
hope this helped
-scav
The Dark Web is _____. Select 2 options.
an international marketplace where criminals buy and sell products
an international marketplace for illegal trade only
a capitalistic marketplace for criminals and noncriminals
a network of cybercriminals organized from Europe and the US
a local marketplace to trade intellectual property
Answer:
a. an international marketplace where criminals buy and sell products.
c. a capitalistic marketplace for criminals and non-criminals.
Explanation:
In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.
In a nutshell, the world wide web (www) is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.
The dark web also referred to as darknet, can be defined as a subset of the world wide web that is intentionally encrypted from conventional web browser and search engines. Thus, it is a peer-to-peer network that requires the use of specialized configuration and web browser such as "Tor browser" in order to access its contents.
Generally, all the internet activities carried out on the dark web are anonymous and private, thereby making it suitable for either legal or illegal operations. Also, it's devoid of government influence or control and as such it's typically a capitalistic marketplace, where goods and services are privately owned and controlled by the people.
Hence, we can deduce that the dark web is simply;
I. An international marketplace where criminals buy and sell their products.
II. A capitalistic marketplace for criminals and non-criminals.
Answer:
an international marketplace where criminals buy and sell products
a capitalistic marketplace for criminals and noncriminals
Explanation:
Ed22
difference between private and confidential data?
Answer:Private means: Belonging to, or for the use of, a particular person or group of people.
Confidential means: Intended to be kept secret. So, a private conversation would only be confidential if what is discussed is intended to be kept secret (from others).
What is a ternary operator? Explain with the help of an example.
The ternary operator deals with three operands. It is also known as a conditional operator. In this operator, the value of the variable depends on the logical expression.
Example:
int a = 5:
int b = 3;
int max = (a > b)? a : b;
A ternary operator, also called a conditional operator, is a special kind of operator used in some programming languages as a shorter way of writing an if..else block. It is denoted by a question mark and then a colon (? : ). It takes 3 operands:
i. A boolean expression which would evaluate to a true or a false.
ii. A first value that will be assigned if the boolean expression gives a true.
iii. A second value that will be assigned if the boolean expression gives a false.
The general format is:
variable = boolean expression ? first_value : second_value;
For example:
A ternary expression can be written as;
String f = (3 > 5) ? "yes" : "no";
In the above expression;
The boolean expression is 3 > 5
The value to be assigned, to f, if the boolean expression is true is "yes"
The value to be assigned, to f, if the boolean expression is false is "no"
So in this case, since (3 > 5) evaluates to false, "no" will be assigned to f.
Therefore, the above expression will give the same result as;
String f = "no"
Another example:
=================
int a = 5:
int b = 3;
int max = (a > b)? a : b;
==================
In the above code snippet,
Since a > b i.e 5 > 3, the first value a (which is equal to 5) will be assigned to max.
Therefore, int max = 5.
The value of max is 5
PS:
These examples and explanations are given using Java. Similar scenario, maybe different syntax, will be obtainable in other programming languages.
Select the correct answer.
What type of media is/are only used for one-time backups?
A.
internal hard disk
B.
external hard disk
C.
DVD, optical media, and removable media
D.
remote shared folder
E.
tape
Answer:
E
Explanation:
Answer:
It's D I promise
Explanation:
i did it! D is right
Which tags are used to display the body/content of a webpage
Answer:
The <body> element contains all the contents of an HTML document, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
<p>
<img>
<h1>
<h2>
<div>
<table>
What is a variable in programming?
1) A symbol or set of characters in a programming statement whose value can
be changed
2) A symbol in a mathematical equation
3) The characters that make up a string
4) The output when code is printed
What are your thoughts about this re-designed Logo? Is it good? Or is poorly designed? Explain your answer below.
Answer:
It is good but the back is not good enough.
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
software bugs
malware
inattention
negligence
lack of knowledge
Answer: inattention, lack of knowledge, and negligence.
Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.
Answer: lack of knowledge , inattention, negligence
Explanation: Edge 2023
How can learning opportunities for AI be extended to all
Answer:
Learning opportunities for AI can be extended to all through the inclussion of courses and different teaching methods related to Artificial Intelligence, new technologies, computer science, programming and, in short, everything related to the digital world, in the educational plans at the national level. This is so because artificial intelligence and computer systems are the basis for the development of the new tools jobs of tomorrow. Thus, education in these subjects is essential so that citizens can enter the labor market once they acquire the necessary age, having the knowledge to do so in a proper way.
Write a program that repeatedly asks the user to type in an integer until they input a multiple of 7
Answer:
See the code in the explanation below
Explanation:
For this excersie we are going to be using C++, if you want me to produce the code in another language do let me know
// Online C++ compiler to run C++ program online
#include <iostream>
using namespace std;
int main()
{
int Number;
do
{
cout <<"Enter a multiple of seven: ";
cin >> Number;
if(Number%7 == 0 ){
cout<<"correct!!! the number is a multiple of seven";
}
} while(Number%7 != 0);
}
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon ladies rock the party Shake your body everybody
C'mon everybody
Let's move it all night
Gonna take you back to the old school
Can u feel the vibe
Just dance to the rhythm and let me
See ya wind your waistline
Jump back and the do the twist
And the electric slide yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon fellas rock the party Shake your body everybody
Lets get funky do the? sound
And say here we get on the floor and do it like this
Can anyone do the Double Bump?
Like back in the day
We thought we'd bring it to ya
Baha Men keep it groovin' yeah yeah
Well I can see everybody on the floor
Doing the running man
Do the mash potato
Or walk the Philly Dog if you can
Yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon y'all let's rock the party Shake your body everybody
Remember back in the day
When we used to dance the Boogaloo
Everybody used to rock the beat
Solid Gold kickin' up too
And everybody rock together with the DJ when he plays
Smooth music is kickin' clippin'
We rush back and we keep dippin'
C'mon baby let's rock let's rock
We gonna get up on the dance floor and do the Pee wee Herman
So shake it up
And do the bus stop
And do the Robot
And baby do the rock yeah
(Move it man)
Can you move it like this? LA! I can shake it right back
Atlanta!
Can you move it like this? New York! I can shake it right back
Whazzup!
Can you move it like this? Seattle! I can shake it right back
Dallas and Houston!
C'mon y'all let's rock the party Shake your body everybody
Answer:
okkkkkkkkkkkkk???
You just learned how search, wikis, commerce, and news have changed as a result of technology. Pick a search engine, wiki, online business, or news outlet, and write a response that: Describes how this innovation works Describes how this innovation inputs, transforms, and outputs data Lists one existing or potential benefit (to society, the economy, a group of people, culture) of this innovation Lists one existing or potential harm (to society, the economy, a group of people, culture) of this innovation Compares the existing technology to tools that were previously used to accomplish the same task
Answer:
Search Engines
Explanation:
Search Engines are incredibly innovative technology. They allow us to search for absolutely anything and gives us all the information that exists surrounding that topic in a matter of seconds. This has helped every single individual with access to a search engine regardless of the industry or reason of use. Even though this access to instant knowledge has endless benefits it can also cause harm. Since anyone's information can be displayed for anyone to see and easily found through a search engine. It ultimately falls down to what the user's intentions are with the data available, which can sometimes be malicious. Previously the only way to access information was through books at a library which could take days, weeks, or even months to find the information that you initially needed. Search engines completely changed this.
Select the correct answer.
What vulnerability does a server have if unnecessary services are not blocked?
A.
Malicious users can penetrate the server through open ports.
B.
Virus attacks can occur due to unnecessary services.
C.
Multiple bugs can occur in unnecessary services.
D.
There will be difficulty in creating server backups.
E.
There will be difficulty in restoring data.
Answer:
A.
Explanation:
My best guess is this answer. Tell me if I got it wrong, but it sounds right to me.
Answer: A. Malicious users can penetrate the server through open ports.
Explanation:
printer is softcopy output device
Answer:
ys printer is soft copy
Explanation:
output device
For the situation below, determine whether the premium will likely increase, decrease, or remain the same.
Kamiah passes a driver’s education course.
Answer:
decrease
Explanation:
a language translator is a ???
Answer:
Explanation:
speech program
Answer:
hi
Explanation:
language translator is a program which is used to translate instructions that are written in the source code to object code i.e. from high-level language or assembly language into machine language.
hope it helps
have a nice day
What is a product line
Answer:
A group of products that are similar in many ways, but usually spec'd out uniquely to target different applications or customers.
Which statement best describes the problem statement below?
Vision: We want to decrease errors in our billings to clients.
Issue: Clients complain that they receive multiple bills for the same month. We have one software that keeps track of services made to clients, another software that keeps track of the charges of those services, and another software that bills the clients.
Method: Print out services and charges, and enter these values into a billing software.
This problem statement is a clear, well-defined problem statement.
This problem statement does not clearly define the issues.
This problem statement will help stakeholders participate in addressing the problem.
This problem statement does not provide a useful statement of method.
Answer:
B
Explanation:
This problem statement does not clearly define the issues.
Answer:
B
Explanation:
Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a marketing effort) that requires customer consent. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. It refers to a small computer program that extends the feature set or capabilities of another application. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems.
Answer:
it refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget
Explanation:
A plugin can be regarded as piece of software which serve as an add-on to a web browser, it provides the browser with additional functionality. It's functionality give room to a web browser so that the web can display additional content that was not designed to display originally. It should be noted that plug-in refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget
T.L.E
LEARNING ACTIVITY: TRUE OR FALSE
Direction: Tell whether the following sentences are acceptable secting
position while using the computer. Write frue if yes or false if not.
1. Using the preferred keying posture, depending on the style of
keying used
2. The head and neck are in a forward facing and midine
position
3. Having knees at a height higher with the hips
4. Sitting with the body close to the desk
5. Having feet flat on the floor or footrest
Having the head and neck forward facing is true
what is a way of telling the computer how to display certain content pls answer quick
HELP PLS 10 MINUTES LEFT!! In this unit you have learned about ways to be faster at word processing. In 3 to 4 sentences, describe one or two skills
you have learned that will make you faster at word processing.
Answer:
The answer is below
Explanation:
There are many skills I have learned which have made me faster at word processing, some of which are:
1. Copying, Cutting, and Pasting: in word processing, one can easily copy or cut words, sentences, paragraphs within a word document and pasted them somewhere else, either inside the same word document or another word documents entirely. This made the work faster as I wouldn't need to re-type all over again. To do this, I can use either the in design key combinations like Ctrl+C for copying, Ctrl+X for Cutting, Ctrl+P for pasting.
2. Spelling and Grammar Check: while the word processing app (Microsoft word) has a way of notifying users of errors concerning grammar and spelling, instead of rewriting or looking for the correct spelling or grammar, I can quickly use the inbuilt function in the Microsoft word to check and make the correction. To do this, I can right-click the mouse on the error, and select the appropriate spelling or grammar
Write the output of the following program:
CLS
a=20
FOR x = 1 to a
IF x MOD 2 < > 0 THEN
S S+x
END IF
NEXT X
PRINT S
END
Answer:
Expression A
Explanation:
In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...
1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100
The average numbers of shares a piece of content receives is known as its:
Answer:
Amplification.
Explanation:
Social media publishing can be defined as a service that avails end users the ability to create or upload web contents in either textual, audio or video format in order to make them appealing to a target audience.
Thus, these web contents are generally accessed by end users from time to time through the use of various network-based devices. As users access these contents, they're presented with the option of sharing a particular content with several other people a number of times without any form of limitation.
Hence, the average numbers of shares a piece of content receives is known as its amplification. The higher the average numbers of shares a particular content receives, the higher the number of traffic it generates for its publisher.
How many values can a binary digit store?
A
A binary digit can store two values at a time.
B
A binary digit can store ten values at a time.
C
A binary digit can store one of two values (0 or 1).
D
A binary digit can store one of ten values (0-9).
Answer:
A.) A binary digit can store two values at one time
Explanation:
A single bit can only represent two different values. That's may not be very much, but that is still enough to represent any two-valued state.