iwill give 20 points and.
brainlyes

unscramble the word

CTYIECLRCEI

a typw of energy that is a result
of the flow of electrons​

Answers

Answer 1

The answer is ELECTRICITY

Answer 2

[tex] \implies \huge \tt \underline \red{answer}[/tex]

Your Answer Was Electricity.


Related Questions

Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.​

Answers

Answer:

The program in Pascal is as follows:

Program Perimeter;

Uses Crt;

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

Begin

 Clrscr;

 Write('Area: ');

 Readln(Area);

 Write('Length : ');

 Readln(Length);

 Width := Area/Length;

 Perim := 2 * (Length + Width);

 Write('Perimeter: ' ,Perim:5:2,'.');

End.

Explanation:

This declares all variables as real

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

The program execution begins here

Begin

This clears the screen

 Clrscr;

This prompts the user for Area

 Write('Area: ');

This gets input for Area

 Readln(Area);

This prompts the user for Length

 Write('Length : ');

This gets input for Length

 Readln(Length);

This calculates the width

 Width := Area/Length;

This calculates the perimeter

 Perim := 2 * (Length + Width);

This prints the calculated perimeter

 Write('Perimeter: ' ,Perim:5:2,'.');

This ends the program

End.

edhesive assignment 2: room area?

Answers

Explanation:

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')

print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

What is program?

The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked

The calendar program

The calendar program in Python, where comments are used to explain each line is as follows:

#This checks for leap year

def leap_year(y):

if y % 4 == 0:

return 1 else return 0

#This returns the number of days in the month

def number_of_days(m,y):

if m == 2:

return 28 + leap_year(y)

elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:

return 31

elif m == 4 or m == 6 or m == 9 or m == 11:

return 30

#This returns the number of days left in the month

def days(m,d):

dayList = [0,31,59,90,120,151,181,212,243,273,304,334]

return dayList[m-1] + d

#This returns the number of days left in the year

def days_left(d,m,y):

if days(m,d) <= 60:

return 365 - days(m,d) + leap_year(y) else:

return 365 - days(m,d)

#The main begins here

#This next three lines gets input for date

day=int(input("Day: "))

month=int(input("Month: "))

year=int(input("Year: "))

#This gets the choice from the user

menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))

#This prints the number of days in the month

if menu == 1:

print(number_of_days(month, year))

#This prints the number of days left in the year

elif menu == 2:

print(days_left(day,month,year))

Read more about Python functions at:

brainly.com/question/14284563

#SPJ7

The complete part of the question will be:

Assignment 3: Chatbot

What the code for assignment 3: chatbot Edhesive.

product of -6/13 and reciprocal of -7/16 is ____________​

Answers

Answer:

-250/91

Explanation:

Use a calculator

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Protect system access of users.

Do no harm to a company when leaving.

Be fair and honest with customers.

Answers

Answer:

"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"

A: Respect confidentiality of data

Explanation:

correct on Edg

Answer:

Respect confidentiality of data.

And

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Explanation:

Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)

Answers

Answer:

following are the responses to the given question.

Explanation:

The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.

A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engineer utilize in an attempt to find the origin of the malware

Answers

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

Select all the correct answers.

John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?

A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization

Answers

Answer:

acd

Explanation:

i cant explain

Answer:

A

C

D

Explanation:

Plato

Pleaseeee hellppp!!!!!

Answers

Answer:

credit card info and delivery address

Explanation:

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?

Answers

Answer:

It would be print.

Explanation:

If you want to execute a function it should be print so it will show up in the output box.

highlight the possible risks and problems that should be address during the implementation of information system process

Answers

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

Match the organelles to their functions.
Golgi apparatus
lysosome
smooth endoplasmic reticulum
nucleus
produces lipids and fats
arrowRight
produces lysosomes
arrowRight
digests foreign material
arrowRight
commands other organelles
arrowRight

Answers

Answer:

I. Smooth endoplasmic reticulum.

II. Golgi apparatus.

III. Lysosomes.

IV. Nucleus.

Explanation:

A cell can be defined as the fundamental or basic functional, structural and smallest unit of life for all living organisms. Some living organisms are unicellular while others are multicellular in nature.

A unicellular organism refers to a living organism that possess a single-cell while a multicellular organism has many (multiple) cells.

Generally, cells have the ability to independently replicate themselves. In a cell, the "workers" that perform various functions or tasks for the survival of the living organism are referred to as organelles.

Some examples of cell organelles with their respective functions in all living organisms such as trees, birds, and bacteria include;

1. Nucleus : it controls all the activities taking place in the cell and the synthesis of proteins. Thus, it's the organelle that commands other organelles.

2. Mitochondria : it provides all the energy required in the cell by transforming energy forms.

3. Lysosomes : they are responsible for absorbing materials and breaking the materials taken in by the cells. Thus, it digests foreign material.

4. Chromosomes : they give sets of instructions for the synthesis of products.

5. Ribosomes : they are involved in the build up of proteins.

6. Smooth Endoplasmic Reticulum : this is where the ribosomes perform their tasks. Thus, it produces lipids and fats.

7. Cytoskeleton : they help to maintain and support the shape of the cells.

8. Vesicles : they ensure proteins are properly transported to the right and exact location.

9. Golgi apparatus : it prepares the protein for export by chemically tagging them. Also, this organelle produces lysosomes.

10. Cell membrane : is the wall of the cell and typically controls what leaves and enters the cell.

Answer:

Golgi Apparatus matched to lysosomes

Lysosomes matched to digesting foreign material

smooth endoplasmic reticulum matched to produces lipids and fats

Nucleus matched to commands other organelles

Explanation:

The golgi apparatus produces the lysosomes

the lysosomes are in the cell to digest things to smaller and more usable for the cell

the smooth endoplasmic reticulum produces the lipids and fats

the nucleus is the biggest organelle in a cell and commands every other organelle. It also has the DNA of the cell.

I hope I was helpful!

Have a good day.

Computers are able to think like human beings true or false?

Answers

Answer:

False. Cuz they work the way they are programmed, which can be like a human being, but is not exactly it. They are built this way so they work as what the user thinks. (e.g. being sure to delete a file/recommending what the user might like)

make me brainliestt :))

11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach

Answers

Answer:

C.

Explanation:

The cognitive Artificial Intelligence Approach is an approach that helps to test theories concerning human minds. It is an artificial intelligence agent that is designed to think and act rationally like humans.

The artificial neural network is based on the cognitive artificial intelligence approach. With the help of this artificial intelligence, computers will be able to test theories of how humans recognize faces, for instance.

Therefore, option C is correct.

In what way do graphs and charts help in decision-making? Select the most important point.

A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.

Answers

I think c. They reveal patterns in data.

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
O A.
billing
ОВ.
recruiting
OC.
testing
OD
installing
O E.
accounting

Answers

Answer:

E

Explanation:

Help! ASAP! 1 Question.........°○°​

Answers

Answer: I think D)?

Explanation: Or B)

Debug the following program.


REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS

A=2

B=3

For I=1 to 10

Display A; B;

A=A+B

B=A+B

NEXT X

END​

Answers

Answer:

The debugged program is as follows:

A=2

B=2

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

END

Explanation:

First, the value of B should be changed to 4 (because the second term of the sequence is 2

Next, change Display to Print because Q-basic uses the print keyword to display output

The sequence is not properly generated. So, I update that part of the program to:

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

Lastly, the loop is controlled by variable I (not X).

So change NEXT X to NEXT I

Los organos de los sentidos perciben de la misma manera un estimulo?porque?

Answers

Espero que te ayude!!!!

How do we calculate the BMI in python?
the formula is kg/m²

Answers

Answer:

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Explanation:

The python code for calculating BMI is as follows -

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Some conditions can also be added such as

if BMI <= 15:

   print("You are underweight.")

elif BMI <= 30:

   print("You are healthy.")

elif BMI <= 40:

   print("You are over weight.")

explain what the hexadecimal code in a MAC address represents

Answers

Answer:

An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.

Why are message board discussions moderated?

A.
to rectify spelling and grammar
B.
to delete irrelevant or offensive posts
C.
to facilitate communication between group members
D.
to ensure that discussions topics are interesting

Answers

A ibahg ninja idea a,c

Why do people say badass

Answers

Answer:

ummm....

Explanation:

maybe they just think it sounds cool?

Badass is defined as something or someone cool or something or someone tough, rebellious or aggressive. Like for an example “yo look at my new motorcycle doesn’t it look badass (cool”

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

Drag the tiles to the correct boxes to complete the pairs.
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program does. Help
George by matching the software to their purposes.
Adobe InDesign
Microsoft Word
Adobe Photoshop
Quark QuarkXPress
creating and editing images
creating and editing page layouts
creating and editing text documents

Answers

Answer:

I just answered this today (5/11/2022) and these are the correct answers.

creating and editing images                  Adobe Photoshop

creating and editing page layouts        Quark QuarkXPress

creating and editing text docs               Microsoft Word

desktop publishing                                 Adobe InDesign

Explanation:

Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?

Answers

Answer:

8

Explanation:

In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.

Answer:

make the top answer brainly

Explanation:

You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example

Answers

Answer: Amazon DynamoDB

Explanation:

The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.

Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.

Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Reesa is employed as a __________.

Answers

Answer:

System Administrator

Explanation:

A System Administrator is the individual who specifically handles the administrative functions of the IT department in an organization. The personnel is also responsible to administer, maintain, configure and upkeep the security of the computers.  

In the given situation, Reesa is provided with the job responsibility of installing and maintaining the internet system in the company. The job specifications that are entitled to Reesa is of the System Administrator.

Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming

Answers

Answer:

E.  modular programming

Explanation:

Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.

Need answer ASAP!!!!

Answers

Hi,

I tried answering this. Lol. Look at the image.

Other Questions
The cumulative frequency table shows the heights (inches) of every student in Mrs. Torjmans math class. What number should be written in the red box? Read the paragraph.As Ms. Cheng waited at the stop for her bus to arrive, a man who was carrying ashopping bag full of groceries walked by. Just as the bus came, the man's bag rippedand the groceries spilled to the ground. Ms. Cheng didn't want to abandon someonewho needed help, so she helped him pick them up while the bus came and went. Theman thanked Ms. Cheng, and together they waited for the next bus to arrive.What is a SYNONYM for the word abandon?botheraccusedesertpunish What the answer there are no options how can we prevent from corona virus?write its treatment. How did the United States seek to stop the spread of communism during the Cold War?by establishing satellite states around the USSRby promoting capitalism in countries near the USSRby ignoring countries that adopted communismby helping countries create democratic governments The following true stresses produce the corresponding true plastic strains for a brass alloy: True Stress (psi) True Strain 48400 0.11 60400 0.19 What true stress is necessary to produce a true plastic strain of 0.26 For what values of x and y is PQRS a parallelogram? How do you find the cosine and tangent of an angle if you are given thesine? You may make up (if you like) an example of this to helpillustrate (remember, sine can only be between -1 and 1). 3x+5(2+x)=4x-7 help me out here? what is pregnancy and labour A mosquito cell meiosis have 6 chromosomes how many chromosomes will the resulting gametes have ? Why did the Europeans want to colonize Africa? What is the answer to: 8+(n-4) Let f(x)=x3+9x281x+14. (a) Use the definition of a derivative or the derivative rules to find g Name a pair of adjectives What are the values of Limit of g (x) as x approaches 33 minus and Limit of g (x) as x approaches 33 plus? Define the topic sentence, including its primary purpose.Some paragraphs build up to a main idea, so the topic sentence is at the _____.Words and phrases like in conclusion, additionally, however, and for example are _______ words and phrases you can use to make one sentence flow smoothly into the next. Melanie is asked to list the complementary base pairings of a DNA sample in her lab. What is the MOST appropriate response she can give?ST, RJ, CO, DI, SERFLP and PCRchromosomes and genesAT, CG, CG, AT, CG PLEASE HELP ME!!! Boyle's law is :p1 v1 = p2 v2 what happens to the pressure of a container if the volume is doubled and the temperature is kept the same?- impossible to determine with the info provided- the pressure will increase - the pressure will decrease- the pressure will stay the same In a class of students, the following data table summarizes how many students playan instrument or a sport. What is the probability that a student plays a sport giventhat they play an instrument?Plays an instrument Does not play an instrumentPlays a sport82Does not play a sport116