HELP GIVING 70 POINTS TO ANYONE This happened to my brainly I need help it won't let me do a survey and I can't get answers!

HELP GIVING 70 POINTS TO ANYONE This Happened To My Brainly I Need Help It Won't Let Me Do A Survey And

Answers

Answer 1

Answer:

i think you need to answer questions, to earn points to post a question

Explanation:

but if you wana look up a question you don't need points

Answer 2

Answer:

I THINK YOU SHOULD USE ANWSER IT IS ANOTHER QUSTION SITE AND IM SORRY FOR WHAT I SAID LAST TIME.

Explanation:


Related Questions

Database Management Systems are featured with:

Question 3 options:

The facility to easy editing, spelling check, auto pagination, lay out and printing reports


The ability to store large amount of data to facilitate easy update, sort and retrieval


The ability to calculate efficiently with the help of built-in functions and analyze


None of the above

Answers

Answer:

Answer: Database Management Systems are featured with:​ The ability to store a large amount of data to facilitate easy updates, short, and retrieval.

Explanation: I took the test

Write the syntax.

1. for loop

2. while loop

3. function definition

4. function call

5. do while loop​

Answers

Answer:

Explanation:

The following syntax's are written in Python and perform a very basic arithmatic operation within the loop of call as an example

1.    for x in range(3):

       print(x)

2.    count = 0

      while True:

          print(count)

          count += 1

          if count == 4:

              return False

3. def next_pow2():

       return 3**2

4. next_pow2()

5. i = 1

while True:

   print(i)

   i = i + 1

   if(i > 3):

       break

#Python doesn't have an explicit do-while loop but can be emulated exactly as a do-while loop using the format written in answer 5.

22. Which of the following device will you require to hear music on
your computer?
a. Video Card
b. Mouse
c. Sound Card
d. Joy Stick​

Answers

Answer: None

Explanation:

I don’t even knew these.

plz help asap

Question # 2
Multiple Select
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.

software bugs

negligence

lack of knowledge

inattention

malware

Answers

Answer:

I'd say negligence, lack of knowledge and inattention

You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?

a. The confidentiality of the data
b. The integrity of the data
c. The accessibility of the data
d. None of the above

Answers

Answer:

a

Explanation:

Your program analyzes complex data.
To share your results, you are going to write text to a file in your program.
The program is saved in a folder, which has a subfolder called "info."
In the info folder is a text file called "bikes.txt."
Which line of code will open bikes.txt?

Answers

Answer:

python:

f = open("\info\bikes.txt", "r")

print(f.read())

Explanation:

How can I get more views on my you tube channel "Braeden Eischen" without paying anything
P.S. this is for media-tech so don't report me

Answers

I’m just post video and there


when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged

Answers

Answer:

A . if you burn a stump because if u roll over the fire will have a 90% chance of going out

How colors are formed on the eyes?​

Answers

Explanation:

The human eye and brain together translate light into color. Light receptors within the eye transmit messages to the brain, which produces the familiar sensations of color. Newton observed that color is not inherent in objects. Rather, the surface of an object reflects some colors and absorbs all the others.

what is the importance of technology in today's generation? 150 word require.​

Answers

Answer:

The importence of technology is the way a simple computer help many humans in many different ways. Furthermore it is extravigate how the way computers work in so many high tech ways andbe able to master thing a simple human mind can´t even master. So to me the importance of computers are the way it populates this generation in todays genre.

Explanation:

I dont know if this is 150 words if not just add some stuff im in middle school btw:)

In Excel, how many columns can be filtered at a time?

Answers

Answer:

When you apply the Filter function, after filtering one column, the next columns will be only filtered based on the result of the previous filtered column. It means that only AND criteria can be applied to more than one column.

Explanation:

Hope it helps you!

Your program analyzes complex data.
You are going to read text from a file as part of your program.
The program is saved in a folder, which has a subfolder called "numbers."
In the info folder is a text file called "sales.txt."
Which line of code will open sales.txt?

Answers

python:

f = open("\info\bikes.txt", "r")

print(f.read())

As one is going to read text from a file as part of your program. The line of code that will open sales.txt is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

To open the "sales.txt" file located in the "info" folder, the following line of code can be used in Python:

with open("info/sales.txt", "r") as file:

   # code to read and analyze data from the file

Thus, this code uses the open() function to open the file in read mode ("r") and creates a file object named file.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ7

what is a client server network and its features?​

Answers

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

2. Android 1.1 was internally referred to as _________.



3. A large C program is divided into basic building blocks called as _________.



4. __________ are the in-built function in C programming system.



5. ______________ are special variables which can hold more than one value using the same

variable, using an index​

Answers

Answer:

2. petit four

3. function

4. library functions

5. array

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

Which of the following is a method of relationship management for an e-commerce Website?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Providing an automatic order tracking facility to customers
B

Requiring users to submit orders by telephone
C

Using validated HTML5 code
D

Performing Website maintenance

Answers

Answer:

if u find out can u lmk pls? j have a very similar question and I've been stuck for a min

edhesive, 8.6 code practice question 2

Answers

Answer:

what's the question though

Answer:

What are the questions? I cannot answer you without you adding them.

Which of the following is not an input device?



Printers



Sensors



keyboards



Scanners

Answers

Answer:

Printers

Explanation:

Sensors detect something and send some kind of pulse in response.

Keyboards can be used to input characters into a device

Scanners can be used to input a digital version of some material document.

Only printers take a digital form from the computer and turn it into something physical

Program C++ I need help!

Answers

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?

Answers

Well the awnser that you are looking for is not here and I am verry sorry about that I just need points for my awnser

Which keys can you use to delete
a WordArt?
Answer the following question​

Answers

Answer:

Ctrl + Delete, thats it

Explanation:

i think, ?

You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Secure Sockets Layer (SSL)
B

Payment gateway
C

Transport Layer Security (TLS)
D

Electronic Funds Transfer (EFT)

Answers

Answer:

D. Electronic Funds Transfer (EFT)

Explanation:

e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.

In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).

Given a Student class, create a class with following characteristics: The class name should be ClassRoom. Private variable students array to maintain the list of Student objects. Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list. Method getAllStudents should return all the students in ClassRoom.
Input Jack Jones Marry where, First & Second line represent a student's name and roll number. And so on Output 1 Jack 2 -Jones 3-Marry Assume that, Maximum "students" count can be 10.
Below is the code for the driver class - DriverMain.java
import java.util.*;
//Your program will be evaluated by this DriverMain class and several test case
public class DriverMain {
public static void main(String[] args) {
String name;
int rollNo;
int n = 0;
Student[] students = new Student[10];
ClassRoom classRoom = new ClassRoom();
Scanner input = new Scanner(System.in);
while(true){
name = input.nextLine();
if(name.equals(""))
break;
rollNo = Integer.parseInt(input.nextLine());
classRoom.addStudent(name, rollNo);
n++;
}
students = classRoom.getAllStudents();
for (int i = 0; i < n; i++) {
if(students[i]!=null)
System.out.print(students[i].getRollNo() + " - " + students[i].getName());
if (i < n - 1)
System.out.println();
}
}
}
//Below is the code for the Solution.java
// NOTE - THIS IS WHERE YOU WRITE THE CODE
import java.util.*;
class Student {
private String name;
private int rollNo;
public String getName() {}
public void setName(String name) {}
public int getRollNo() {}
public void setRollNo(int rollNo) {}
};
class ClassRoom {
private int i;
private Student[] students;
public void addStudent(String name, int rollNo) {
// WRITE YOUR CODE HERE
}
public Student[] getAllStudents() {
// WRITE YOUR CODE HERE
}
};

Answers

Answer:

Answered below

Explanation:

//Implementation of the addStudent method

public void addStudent(String name, int rollNo){

Student newStudent = new Student();

newStudent.name = name;

newStudent.rollNo = rollNo;

student.add(newStudent);

}

//Implementation of the getAllStudents method

public Student[] getAllStudents(){

return students;

}

Write program to read 10 random numbers, then find how many of them accept division by 4,
5, and 6.
The program should print the output like this:
There are numbers accept division by 4
There are ------ numbers accept division by 5
There are ------ numbers accept division by 6
Help me guys with this question

Answers

Answer:

In Python:

import random

di4 = 0; di5 = 0; di6 = 0

for i in range(10):

   num = random.randint(1,100)

   if num%4 == 0:

       di4+=1

   if num%5 == 0:

       di5+=1

   if num%6 == 0:

       di6+=1

print("There are "+str(di4)+" numbers accept division by 4")

print("There are "+str(di5)+" numbers accept division by 5")

print("There are "+str(di6)+" numbers accept division by 6")

Explanation:

This imports the random module

import random

This initializes the count of division by 4, 5 or 6 to 0

di4 = 0; di5 = 0; di6 = 0

This iteration is repeated 10 times

for i in range(10):

This generates a random number

   num = random.randint(1,100)

Check if number is divisible by 4. If yes, increase div4 by 1

   if num%4 == 0:

       di4+=1

Check if number is divisible by 5. If yes, increase div5 by 1

   if num%5 == 0:

       di5+=1

Check if number is divisible by 6. If yes, increase div6 by 1

   if num%6 == 0:

       di6+=1

Print reports

print("There are "+str(di4)+" numbers accept division by 4")

print("There are "+str(di5)+" numbers accept division by 5")

print("There are "+str(di6)+" numbers accept division by 6")

in which of the following scenarios would you choose to embed versus import data?

Answers

Answer:

B.)You want to maintain connections with external files

Explanation:

These are the options for the question

A.)You do not want to save the original data sources.

B.)You want to maintain connections with external files

C.)You want to reduce file size

Embedding data can be regarded as insertion of objects( embedded object) such as spreadsheet into a word-processor so that it can be edditted.

Data Import can be regarded as ways that give room for uploading of data

from external sources , then combine it with data that is been collected via Analytics.

Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Visitor tracking
B

Push technology
C

Pull technology
D

Search Engine Optimization (SEO)

Answers

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

Besides your computer, where else can you find and use an operating system?

Answers

Answer:

Your phone.

Explanation:

Samsung is ran off of Android.

Apple is ran off of IOS.

Both are operating systems.

A person, computer system are the based on the use of an operating system are mobile phones, desktop, and the laptops and the other things.

What is computer?

Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.

According to the  computer system, are the finding to and use an operating system are of the mobile phones, laptops, desktop, are the based on the operating in the system. There was the operating system in the computer are the Microsoft Windows. There are the operating system of the windows are the update to the new version are the updated.

As a result, the person, computer system are the based on the use of an operating system are mobile phones, desktop, and the laptops and the other things.

Learn more about on computer, here:

https://brainly.com/question/21080395

#SPJ2

What performance specification does 2 GHz refer to?

Answers

Answer:

GHz is the speed of the processor

Explanation:

GHz is the speed of the processor.

What is GHZ?

The frequency unit known as gigahertz (GHz) counts the number of cycles per second. The term Hertz (Hz) designates the quantity of periodic 1-second cycles per second.

One million Hz is equal to one megahertz (MHz). A gigahertz (GHz) is equivalent to 1,000 MHz or 1,000,000,000 Hz.

One billion hertz is equal to one gigahertz, sometimes known as GHz. It is frequently used to gauge electromagnetic (EM) frequencies, alternating current, and computer processing speed.

The unit of measurement for central processing unit (CPU) clock speed is the gigahertz. In general, faster computers are those with greater CPU clock rates. Pipeline depth, instruction sets, internal cache, network/bus speed, disk performance, and software architecture are examples of elements that have an impact on speed.

Therefore, GHz is the speed of the processor.

To learn more about GHz, refer to the link:

https://brainly.com/question/29739133

#SPJ5

Determine the value for the following recursive method when x = 19.

Answers

Answer:

[tex]f(19) = 2[/tex]

Explanation:

Given

[tex]f(x) = f(x - 5)+ 2[/tex] --- [tex]x > 9[/tex]

[tex]f(x) = -2[/tex] --- [tex]x \le 9[/tex]

Required

Find f(19)

f(19) implies that: x = 19

Since 19 > 9, we make use of:

[tex]f(x) = f(x - 5)+ 2[/tex]

[tex]f(19) = f(19 - 5) + 2[/tex]

[tex]f(19) = f(14) + 2[/tex] ----- (1)

Calculate f(14)

f(14) implies that: x = 14

Since 14 > 9, we make use of:

[tex]f(x) = f(x - 5)+ 2[/tex]

[tex]f(14) = f(14 - 5) + 2[/tex]

[tex]f(14) = f(9) + 2[/tex] ------ (2)

Calculate f(9)

f(9) implies that: x = 14

Since [tex]9 \le 9[/tex], we make use of:

[tex]f(x) = -2[/tex]

[tex]f(9) = -2[/tex]

So:

[tex]f(14) = f(9) + 2[/tex]

[tex]f(14) = -2 + 2[/tex]

[tex]f(14) = 0[/tex]

[tex]f(19) = f(14) + 2[/tex]

[tex]f(19) = 0 + 2[/tex]

[tex]f(19) = 2[/tex]

Is Conflict Healthy ?

Answers

yes

Explanation:

because it has more things

No not really I mean I don’t think so but other people might have other Pennies
Other Questions
Question 14 pls for my math class HEY CAN ANYONE PLS ANSWER DIS MATH PROBLEM! what are your thoughts on WWI? How many moles would be present in 300 liters of dinitrogen monoxide atSTP? Gran makes 18 pints of jam in 3 days.How pints can she make in 7 days at this rate? How do the respiratory system, circulatory system, and nervous system maintain homeostasis while you are playing outside on a sunny day? Explain how China's government changed over time from theShang to the Han Dynasties. An instructor at an army base wants to know if a new program that teaches gun safety is effective. Which procedure would be the best method of evaluation? HELP ONLY WITH PART A I ALREADY DID PART B INSTRUCTIONS ARE IN PICTURE .What is the work done in a 20-Newton object that is being moved in a 4-meter distance? showcalculation * "sa-yo-u-na-ra"sa-yo-na-ra :)Red-Survive said the prophet stars playingWATCH OUT!!!!!!(BANG!)EIJI!*sorry...im trying to cope from this and if im sad.. so do u :(((* *sorry again* The volume of a cylinder is 289 pie in. and the height of the cylinder is 1 in. What is the radius of the cylinder? The area of the rectangular garden shown is 19.5 square meters. How many meters of fencing are needed to go around the garden? Explain. A product's price will increase the most if:A. its supply and demand both fall at the same rate.B. its supply declines while its demand goes up.C. its demand remains the same but its supply goes up.D. its supply remainsthe same but its demand goes down. Help please thanks!!! The graph below provides details about the U.S. economy.What was a major impact of the trend shown in the graph? Plz help me!!!!!!!!!!! You must use favor de Plz help I have tell Friday to do my work 97/83 / 810768 = [?]Enter PLZ PLZ DONT STEAL POINTSFor this assignment, make a list of behaviors someone may be motivated to do to satisfy each of the following needs according to Maslow's theory.1. Physiological Needs2. Safety Needs3. Belongingness Needs4. Esteem and Achievement Needs