Answer:
I think it's print(5**3)
HELP PLEASE!!!!
3. Memory and Storage
The GCSE Computer Science course requires that you
understand how decimal numbers are converted into
binary, and vice versa.
Can you convert the numbers 12, 24, 48 and 96 into binary form?
Answer:
1100 ; 11000 ; 110000 ; 1100000
Explanation:
Converting the following decimals to binary :
2__12
2__6 r 0
2__3 r 0
2__1 r 1
___0 r 1
12 = 1100 base 2
2.)
2__24
2__12 r 0
2__6 r 0
2__3 r 0
2__1 r 1
___0 r 1
24 = 11000 base 2
2__48
2__24 r 0
2__12 r 0
2__6 r 0
2__3 r 0
2__1 r 1
___0 r 1
48 = 110000 base 2
2__96
2__48 r 0
2__24 r 0
2__12 r 0
2__6 r 0
2__3 r 0
2__1 r 1
___0 r 1
96 = 1100000 base 2
pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?
Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False
Answer:
true
Explanation:
we can connect to any device which has a network connection
It is a way of creating a name, symbol, color, and design to establish and differentiate a product from its prospect competitors
Answer:
Branding
Explanation:
The term that is being defined by the question is known as Branding. This is what companies do to products in order to allow customers to distinguish the product from the competitors similar products. Doing so allows a company to attract and maintain customers since a customer will see become aware of the branded product and buy it. If the purchasing experience goes well they will begin to associate the good experience with the brand and therefore with the company as well.
Why do we use if statements?
To tell Tracy to stop our code if there’s an error
To have Tracy make decisions based on conditional statements
To tell Tracy to do something if we run our code
To have Tracy complete one function at a time
Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.
Answer:
1. Hyperlink
2. IP address
3. Fault tolerance
4. Server
5. To do list
Explanation:
Text within a document that is linked to other information available to the reader is called HYPERLINK.
A unique location for a computer on the network is its IP ADDRESS.
The FAULT TOLERANCE is the ability of a network to cover after any type of failure.
The computer that responds to requests from the client computer is known as the SERVER.
A TO-DO LIST is an ordered list of tasks waiting to be performed.
Answer:
hypertext
IP address
fault tolerance
server
queue
Explanation:
just did it on edg
What is a font? A)
a typeface on a label
B) a typeface on a poster
C) a typeface on a computer or d) a typeface on a sign
Answer:
A is most likely the answer
Explanation:
Timmy walks into a store to buy a PC game. He reads this information about a game on its packaging:
System Requirements
Minimum Recommended
Processor Intel Core i3 or equivalent Intel Core 2 Quad or higher
Memory 2 GB 4 GB or higher
Video Card Integrated Discrete
Based on this information, which statement is true?
A.
Timmy can play the game even if his computer’s specifications don’t meet the minimum requirements.
B.
Timmy can play the game even if his computer has less than 2 GB memory.
C.
Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.
D.
Timmy can play the game even if his computer’s processor class is lower than an Intel Core i3.
E.
Timmy can play the game at a higher level of visual detail if his computer has an Intel Core 2 Quad processor.
Answer:
C. Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.
Explanation:
The processor efficiency and memory requirements are much more necessary to get the game to run and give it a playable framerate. Having a video card will improve his graphics, so this is more of a suggestion than a necessity.
what are the uses of plotters
Answer:
Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materialsHope it helps :)❤
Answer:
Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....
1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.
The following scenario is an example of?
Answer:
Industrial espionage
Explanation:
Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market
It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant
Industrial espionage is also known as economic espionage
Help Please! Computer science question !!!!!!!!!!20 points!!!
Answer:
45 abc
Explanation:
I need help I have questions I need answers in coding html,css,js and python.Fast
The purpose of the sleep method is to reduce the amount of energy the program uses.
True
False
The _____ is a collection of webpages that use the internet.
pseudocode
World Wide Web
Python
server
Which of the following lines of code would correctly create a list called weapons?
weapons == [“sword”, “sling”, “knife”]
weapons = [“sword” or “sling” or “knife”]
weapons = (“sword”, “sling”, “knife”)
weapons = [“sword”, “sling”, “knife”]
Which of these lines of code would import both the random and the time modules?
import random, time
import random and time
time.import, random.import
import(random, time)
When using HTML, your text should be placed between the opening and the closing tags.
True
False
Answer:
1. True
2. World Wide Web
3. weapons = [“sword”, “sling”, “knife”]
4. import random, time
5. True.
Explanation:
For number 1 I'm not quite sure since I never personally used it, but it does reduce CPU usage when activated so it's very possible it's true.
--concept mapping--
importance of trees for people:
1.
2.
3.
4.
5.
importance of trees for animals
1.
2.
3.
4.
5.
Answer:
-Both need oxygen from the trees to breathe
-Without trees the population of animals and people would be dying
Explanation:
Thats all I can think of
Join for a pack battle loud microphone.
Select the effective subject lines.
Timecard Machine Relocated
This Message Contains Some Important New Information About Company Operations
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Test Results Attached
New Expense Reporting Procedures
Servers
IT Department Closed for Server Maintenance
Answer:
dont click the link
Explanation:
Answer:
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Servers
This Message Contains Some Important New Information About Company Operations
Explanation:
i did this on edge 2021 there is a quizlet with most of the questions
when should a computer definitely have an ip address
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive
Answer:
a) all cabling hope it helps
What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances
The thing that a user should do to find and replace text throughout a field are:
1. Put the cursor in the field to search.
2. Open the find dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click Replace All to change all instances.
How do you search for and replace text across an entire field?The keys on the keyboard CTRL+F is often used to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.
The operations are:
1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.
2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.
3. Press the Replace or Replace All button.
Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.
Learn more about Editing from
https://brainly.com/question/15768529
#SPJ1
See full question below
What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to
complete the statements.
1. Put the cursor in the field to search.
2. Open the _____
dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click -------to change all instances.