Answer:
Thank you! And it would be my dad.
Explanation:
Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?
Answer:
8
Explanation:
In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.
Answer:
make the top answer brainly
Explanation:
Can someone plz help me answer my questions!!!!!!!!!!!
Answer:
what is your question
where is it at?
How do we calculate the BMI in python?
the formula is kg/m²
Answer:
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Explanation:
The python code for calculating BMI is as follows -
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Some conditions can also be added such as
if BMI <= 15:
print("You are underweight.")
elif BMI <= 30:
print("You are healthy.")
elif BMI <= 40:
print("You are over weight.")
Select all the correct answers.
John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?
A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization
Answer:
acd
Explanation:
i cant explain
Answer:
A
C
D
Explanation:
Plato
product of -6/13 and reciprocal of -7/16 is ____________
Answer:
-250/91
Explanation:
Use a calculator
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engineer utilize in an attempt to find the origin of the malware
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution
explain what the hexadecimal code in a MAC address represents
Answer:
An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.
Help! ASAP! 1 Question.........°○°
Answer: I think D)?
Explanation: Or B)
As you create the slides, miniature views of the individual slides are displayed in the Notes pane.
Answer:
False.
Explanation:
PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.
Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.
Basically, the views that are available on the Microsoft PowerPoint application includes;
1. Slide Sorter.
2. Notes Page.
3. Reading Pane.
4. Presenter view.
Slide transition is an inbuilt feature of a presentation software that automatically changes the slides at regular intervals.
As a user create slides, miniature views of the individual slides, referred to as thumbnails are displayed in the Slide Tab or Thumbnail pane.
On the other hand, the Notes pane is typically designed for typing remarks or notes that the presenter could share with the audience during a presentation.
Need answer ASAP!!!!
Hi,
I tried answering this. Lol. Look at the image.
In what way do graphs and charts help in decision-making? Select the most important point.
A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.
What are the 8 tips for
healthy living?
Answer:
Base your meals on starchy foods.
Eat lots of fruit and vegetables.
Eat more fish.
Cut down on saturated fat and sugar.
Try to eat less salt- no more than 6g a day.
Get active and try to be a healthy weight.
Drink plenty of water
Explanation:
edhesive assignment 2: room area?
Explanation:
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')
print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
What is program?The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked
The calendar program
The calendar program in Python, where comments are used to explain each line is as follows:
#This checks for leap year
def leap_year(y):
if y % 4 == 0:
return 1 else return 0
#This returns the number of days in the month
def number_of_days(m,y):
if m == 2:
return 28 + leap_year(y)
elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:
return 31
elif m == 4 or m == 6 or m == 9 or m == 11:
return 30
#This returns the number of days left in the month
def days(m,d):
dayList = [0,31,59,90,120,151,181,212,243,273,304,334]
return dayList[m-1] + d
#This returns the number of days left in the year
def days_left(d,m,y):
if days(m,d) <= 60:
return 365 - days(m,d) + leap_year(y) else:
return 365 - days(m,d)
#The main begins here
#This next three lines gets input for date
day=int(input("Day: "))
month=int(input("Month: "))
year=int(input("Year: "))
#This gets the choice from the user
menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))
#This prints the number of days in the month
if menu == 1:
print(number_of_days(month, year))
#This prints the number of days left in the year
elif menu == 2:
print(days_left(day,month,year))
Read more about Python functions at:
brainly.com/question/14284563
#SPJ7
The complete part of the question will be:
Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.
(25 POINTS)Which statement best reflects the importance of following safety guidelines?
Workplace injuries can result in losses to an organization’s profits.
OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.
Every year, thousands of people die as a result of workplace injuries.
Using equipment safely is faster and makes work more efficient.
Answer:
I think, Every year, thousands of people die as a result of workplace injuries.
Answer:
B
Explanation:
Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Reesa is employed as a __________.
Answer:
System Administrator
Explanation:
A System Administrator is the individual who specifically handles the administrative functions of the IT department in an organization. The personnel is also responsible to administer, maintain, configure and upkeep the security of the computers.
In the given situation, Reesa is provided with the job responsibility of installing and maintaining the internet system in the company. The job specifications that are entitled to Reesa is of the System Administrator.
(25 POINTS) Some applications work on all devices while others work on some devices. True or False?
Answer:
True.
Explanation:
It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.
Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?
Answer:
It would be print.
Explanation:
If you want to execute a function it should be print so it will show up in the output box.
Which step in Gabriel’s process is incorrect?
Gabriel picked the wrong tab. He needs to select the Insert tab, not the Formulas tab, to insert a watch window.
Gabriel picked the wrong tab. He needs to select the Data tab, not the Formulas tab, in the outline group, select Subtotal, and then select “watch window.”
Gabriel picked the wrong group in the Formulas tab. He needs to select Insert Function from the Function Library group and type, “watch window.”
Gabriel picked the wrong group in the Formulas tab. He needs to select the Watch Window in the Formula Auditing group.
Answer:
the answer is ;gabriel picked the wrong tab.he needs to select the insert tab ,not the formulas tab to select watch window
Which statement best describes a database?
Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.
I think it's a. A collection of related tables
Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.
Answer:
The program in Pascal is as follows:
Program Perimeter;
Uses Crt;
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
Begin
Clrscr;
Write('Area: ');
Readln(Area);
Write('Length : ');
Readln(Length);
Width := Area/Length;
Perim := 2 * (Length + Width);
Write('Perimeter: ' ,Perim:5:2,'.');
End.
Explanation:
This declares all variables as real
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
The program execution begins here
Begin
This clears the screen
Clrscr;
This prompts the user for Area
Write('Area: ');
This gets input for Area
Readln(Area);
This prompts the user for Length
Write('Length : ');
This gets input for Length
Readln(Length);
This calculates the width
Width := Area/Length;
This calculates the perimeter
Perim := 2 * (Length + Width);
This prints the calculated perimeter
Write('Perimeter: ' ,Perim:5:2,'.');
This ends the program
End.
An example of documentary evidence that might be presented at trial for a cyber crime is:
A. None of these choices.
B. data retrieved from slack space on a hard drive.
C. a cellular telephone.
D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.
An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.
What is the evidence?
Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.
According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.
Learn more about evidence, here:
https://brainly.com/question/14370298
#SPJ2
Debug the following program.
REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS
A=2
B=3
For I=1 to 10
Display A; B;
A=A+B
B=A+B
NEXT X
END
Answer:
The debugged program is as follows:
A=2
B=2
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
END
Explanation:
First, the value of B should be changed to 4 (because the second term of the sequence is 2
Next, change Display to Print because Q-basic uses the print keyword to display output
The sequence is not properly generated. So, I update that part of the program to:
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
Lastly, the loop is controlled by variable I (not X).
So change NEXT X to NEXT I
Pleaseeee hellppp!!!!!
Answer:
credit card info and delivery address
Explanation:
highlight the possible risks and problems that should be address during the implementation of information system process
Answer:
The answer is below
Explanation:
The possible risks and problems that should be addressed during the implementation of the information system process are:
1. power loss or data corruption
2. System design faults
3. Cultural barriers
4. Integration of Software Development device
5. Using the same processes in the company
6. Security breaches
7. Hardware and Software failure
8. Work environment
Drag the tiles to the correct boxes to complete the pairs.
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program does. Help
George by matching the software to their purposes.
Adobe InDesign
Microsoft Word
Adobe Photoshop
Quark QuarkXPress
creating and editing images
creating and editing page layouts
creating and editing text documents
Answer:
I just answered this today (5/11/2022) and these are the correct answers.
creating and editing images Adobe Photoshop
creating and editing page layouts Quark QuarkXPress
creating and editing text docs Microsoft Word
desktop publishing Adobe InDesign
Explanation:
Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming
Answer:
E. modular programming
Explanation:
Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.
The quick access toolbar is ____.
Question 1 options:
is not customizable
is located at the bottom of the screen
is the fastest way to access the most used features
Question 2 (1 point)
The ribbon is where you will find all of the options to make a spreadsheet.
Question 2 options:
True
False
Question 3 (1 point)
The Display Options allow you to... (select all that apply)
Question 3 options:
close Excel altogether
change how much of the ribbon is displayed
minimize, maximize or restore the screen
Question 4 (1 point)
The "Tell Me" box allows _____
Question 4 options:
allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.
shows which cell is currently selected.
Displays the name of the current file.
Question 5 (1 point)
Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.
Question 5 options:
True
False
Question 6 (1 point)
All the cells make up a _________
Question 6 options:
notebook
workbook
worksheet
Question 7 (1 point)
Multiple worksheets make up the________, or the file.
Question 7 options:
cells
workbook
Question 8 (3 points)
Microsoft Excel can be downloaded for free, just like Word and PowerPoint, as a student at Digital Academy of Florida. Click here for instructions to download.
Question 8 options:
True
False
Answer:
question 1 is a fast way of accessing used features
Answer:
Explanation:
Question 2 (1 point)
The ribbon is where you will find all of the options to make a spreadsheet.
True
Question 3 (1 point)
The Display Options allow you to... (select all that apply)
minimize, maximize or restore the screen
Question 4 (1 point)
The "Tell Me" box allows _____
allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.
Question 5 (1 point)
Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.
True
Question 6 (1 point)
All the cells make up a _________
worksheet
Question 7 (1 point)
Multiple worksheets make up the________, or the file.
workbook
You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example
Answer: Amazon DynamoDB
Explanation:
The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.
Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.
Match the organelles to their functions.
Golgi apparatus
lysosome
smooth endoplasmic reticulum
nucleus
produces lipids and fats
arrowRight
produces lysosomes
arrowRight
digests foreign material
arrowRight
commands other organelles
arrowRight
Answer:
I. Smooth endoplasmic reticulum.
II. Golgi apparatus.
III. Lysosomes.
IV. Nucleus.
Explanation:
A cell can be defined as the fundamental or basic functional, structural and smallest unit of life for all living organisms. Some living organisms are unicellular while others are multicellular in nature.
A unicellular organism refers to a living organism that possess a single-cell while a multicellular organism has many (multiple) cells.
Generally, cells have the ability to independently replicate themselves. In a cell, the "workers" that perform various functions or tasks for the survival of the living organism are referred to as organelles.
Some examples of cell organelles with their respective functions in all living organisms such as trees, birds, and bacteria include;
1. Nucleus : it controls all the activities taking place in the cell and the synthesis of proteins. Thus, it's the organelle that commands other organelles.
2. Mitochondria : it provides all the energy required in the cell by transforming energy forms.
3. Lysosomes : they are responsible for absorbing materials and breaking the materials taken in by the cells. Thus, it digests foreign material.
4. Chromosomes : they give sets of instructions for the synthesis of products.
5. Ribosomes : they are involved in the build up of proteins.
6. Smooth Endoplasmic Reticulum : this is where the ribosomes perform their tasks. Thus, it produces lipids and fats.
7. Cytoskeleton : they help to maintain and support the shape of the cells.
8. Vesicles : they ensure proteins are properly transported to the right and exact location.
9. Golgi apparatus : it prepares the protein for export by chemically tagging them. Also, this organelle produces lysosomes.
10. Cell membrane : is the wall of the cell and typically controls what leaves and enters the cell.
Answer:
Golgi Apparatus matched to lysosomes
Lysosomes matched to digesting foreign material
smooth endoplasmic reticulum matched to produces lipids and fats
Nucleus matched to commands other organelles
Explanation:
The golgi apparatus produces the lysosomes
the lysosomes are in the cell to digest things to smaller and more usable for the cell
the smooth endoplasmic reticulum produces the lipids and fats
the nucleus is the biggest organelle in a cell and commands every other organelle. It also has the DNA of the cell.
I hope I was helpful!
Have a good day.
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Protect system access of users.
Do no harm to a company when leaving.
Be fair and honest with customers.
Answer:
"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"
A: Respect confidentiality of data
Explanation:
correct on Edg
Answer:
Respect confidentiality of data.
And
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Explanation: