Answer:
Videographer
Explanation:
Answer:
i think i would be costume designer
Explanation:
because if you spell videographer it gives you the little red squiggly line
Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?
In the proposal, Jeff states the reason to create the project. He also explains how his project will conclude with a perfect takeaway point. Jeff describes how he is going to tell the story through photography. He then mentions various strategies to engage his audience and describes plans to make sure that the project reaches his intended audience.
Answer:
I believe its the last question
Explanation:
Answer:
I would say describes plans to make sure that the project reaches his intended audience
Explanation:
none needed
Write a simple JavaScript function named makeFullName with two parameters named givenName and familyName. The function should return a string that contains the family name, a comma, and the given name. For example, if the function were called like this: var fn = makeFullName("Theodore", "Roosevelt");
Answer:
Explanation:
Ji
A JavaScript function exists as a block of code created to accomplish a certain task.
What is a JavaScript function?In JavaScript, functions can also be described as expressions. A JavaScript function exists as a block of code created to accomplish a certain task.
Full Name with two parameters named given Name and family Name
#Program starts here
#Prompt User for Input "given Name and family Name "
given Name = input("Enter Your given Name: ")
family Name = input("Enter Your family Name: ")
#Define Function
def last F(given Name, Family Name):
given Name = given Name[0]+"."
print(Last Name+", "+Family Name);
last F(given Name, Family Name) #Call Function
#End of Program
To learn more about JavaScript function
https://brainly.com/question/27936993
#SPJ2
Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data
59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this
Answer:
False Positive
Explanation:
A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.
In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Answer:
Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.
write c++ program to find maximum number for three variables using statement ?
Answer:
#include<iostream>
using namespace std;
int main(){
int n1, n2, n3;
cout<<"Enter any three numbers: ";
cin>>n1>>n2>>n3;
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
else{
cout<<n3<<" is the maximum";}
return 0;
}
Explanation:
The program is written in C++ and to write this program, I assumed the three variables are integers. You can change from integer to double or float, if you wish.
This line declares n1, n2 and n3 as integers
int n1, n2, n3;
This line prompts user for three numbers
cout<<"Enter any three numbers: ";
This line gets user input for the three numbers
cin>>n1>>n2>>n3;
This if condition checks if n1 is the maximum and prints n1 as the maximum, if true
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
This else if condition checks if n2 is the maximum and prints n2 as the maximum, if true
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
If the above conditions are false, then n3 is the maximum and this condition prints n3 as the maximum
else{
cout<<n3<<" is the maximum";}
return 0;
list down four ways to start word 2010
im trying to call the keys in a dictionary I have called "planet_dict". in order for them to be included in the for loop, the values of the keys have to be within a range of
273 <= x <= 373
I understand how to do this with certain values, but idk how to call them from a dictionary.
You can do something like this. My code iterates through the dictionary keys and then we use that key to get a value. We check if the value is between 273 and 373 and if it is, it's a water planet. My code is just a general idea of what to do. Instead of printing, you could add the key to a list and then print the contents of the list.
Match the examples on the left with the categories on the right
Which hard drive type would be best to use by the army when writing operational data while traveling in a jeep in rough terrain?
Answer:
They should use an SSD.
Explanation:
The fact that the writing operation takes place in a jeep in rough terrain suggests that they should be using an SSD (Solid State Drive) which unlike HDD's, don't have a spinning disk and a head that writes data on it. So there are no moving parts in an SSD, and they have about 30 times more resistance to shock/vibration damage which is really helpful in this situation.
I hope this answer helps.
Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.
Answer:
Function schedule( list of tuple of start and end times, class available)
class_list = create list of class from class available
for items in time_list:
if items is not same range as time_list[-1]:
newdict[items] = class_list[0]
print class time: class venue
elif items is same range as time_list[-1]:
used_class = newdict.values
index = class_list.index(used_class[-1])
new_dict[items] = class_list[index + 1 ]
print class time: class venue
Explanation:
The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.
Overflow and roundoff errors result from real-world limitations in representing . . . (10 points)
A. number systems
B. fractions
C. place values
Answer:
C. place values
Explanation:
Place value can be defined as the numerical value representing a digit owing to its position in a number. Some examples of the various place values used in representing each digit are tenths, hundredths, thousandths, unit, tens, hundreds, thousands etc.
For example, in the number 316.2;
The place value of 3 is hundreds. The place value of 1 is tens. The place value of 6 is units. The place value of 2 is tenths.In the real-world, their instances where there are limitations in counting and representing real numbers that are infinite (too small or too large). In order to overcome these limitations or barriers, we use place values.
An overflow error arises when a real number cannot be represented because it is too large and exceeds the upper limits of a range chosen.
Also, a roundoff error can be defined as the difference between the output generated from an algorithm using an exact or actual numbers and the output generated using rounded or finite-precision numbers.
Hence, overflow and roundoff errors result from real-world limitations in representing place values.
What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions?
Screenshot feature
Photo Album feature
Online Pictures command
Format command
Answer:
B
Explanation:
Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
What is Photo album feature?Slideshows are excellent for many types of presentations than simply professional ones. To make a memorable performance, use Microsoft PowerPoint to make a photo album and add music or visual effects.
Let's look at how to construct a photo book in PowerPoint for personal presentations of special occasions like weddings and anniversaries or even slideshows for organizations where the major focus is photographs.
Open PowerPoint and either start from scratch or use an existing presentation. PowerPoint automatically adds the photo album to a new slideshow when you create it.
Therefore, Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.
To learn more about Photo album feature, refer to the link:
https://brainly.com/question/20719259
#SPJ3
Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.
Answer:
Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.
Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.
Explanation:
Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.
The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as what type of attack
Answer:
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as
TCP Session Hijacking.
Explanation:
TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network. The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server. To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.
. What is a one-dimensional basic component in art and geometry
Answer:
a straight line
Explanation:
Anything one dimensional can only be a line
Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparisons executed by the sequential search algorithm is _____.
Answer:
≅500,000 comparisons.
Explanation:
The sequential search algorithm is, as its name express, a comparison method to search for a specific value in a list, sorted or not.
It starts with the first element in the list, compares the element with the searched value, if it is a match it stops, otherwise it moves to the next element and repeats.
In general, if the list size is X, the average number of comparisons is:
[tex]\frac{X+1}{2}[/tex]
Solving for X=1,000,000, the result is ≅500,000 comparisons.
Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?
Answer:
The port that should be set open to allow users to access this new server is:
TCP port.
Explanation:
Ports are openings or entrance doors through which data packages have access to a PC or server. TCP and UDP are transport protocols with port numbers. TCP means Transmission Control Protocol. They are used to connect two devices over the internet and other networks. UDP means User Datagram Protocol. They are used to connect applications and to speed the transfer of data. Comparatively, UDP is faster, simpler, and more efficient than TCP. TCP enables retransmission of lost data packets, which UDP cannot do.
Database are pranized in
consist of a series of
which consist of a senes of
Answer:
fields and records I guess is the answer
PLEASE ANSWER ASAP! THANKSSSSS
To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi