Answers

Answer 1

Explanation:

sksmsskdkdkdkdkkkkdkdkdkdkfkfkfkfkkfkggkhkkkkkbkjvk


Related Questions

PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?

A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive

Answers

Answer:

a) all cabling hope it helps

In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
Explain the concepts of GIGO—garbage in, garbage out. Why do you think it’s a helpful concept in coding? How do you think it can be a helpful concept outside of coding?

Answers

Answer:

GIGO is a computer science acronym that implies bad input will result in bad output. Good programming practice dictates that functions should check for valid input before processing it. ... A well-written program will avoid producing garbage by not accepting it in the first place.

Explanation:

Select the effective subject lines.


Timecard Machine Relocated

This Message Contains Some Important New Information About Company Operations

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed

Test Results Attached

New Expense Reporting Procedures

Servers

IT Department Closed for Server Maintenance

Answers

Answer:

dont click the link

Explanation:

Answer:

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed  

Servers

 

This Message Contains Some Important New Information About Company Operations

Explanation:

i did this on edge 2021 there is a quizlet with most of the questions

what is the fullform of COMPUTER?​

Answers

Answer:

COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research

Explanation:

The property that allows a metal to be drawn into wires is called...
A. Hardness
B. Malleability
C. Ductility
D. Elasticity

Answers

Answer:

Malleability and ductility

Explanation:

Metals are also easily distinguished from non-metals and other materials in their ductility (ability to be drawn into a wire) and malleability (the ability to be beaten into a. sheet).

Did you need help on this with an assignment? Hope this helps!

Join for a pack battle loud microphone.

Answers

you look like the battle passss

1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.

The following scenario is an example of?​

Answers

Answer:

Industrial espionage

Explanation:

Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market

It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant

Industrial espionage is also known as economic espionage

What is inputted into a computer system?

Answers

Answer:

Hey mate.....

Explanation:

This is ur answer.....

Input refers to any information, or data, that is sent to a computer for processing. Input is often sent to the computer from a device such as a keyboard, mouse, or other input device. Putting it simple, input is the act of entering data into a computer.

Hope it helps!

Mark me brainliest....

FOLLOW ME!!!! :)

The information regarding inputted into the computer system is as follows:

Input refers to any information, or data, that is sent to a computer for processing. Input is often sent to the computer from a device like a keyboard, mouse, or other input device. It is the act of entering data into a computer.

Learn more: brainly.com/question/17429689

what is the best free website to learn phyton programming

Answers

That is something you should may research on with yourself! Don’t accept a link
From strangers it’s preferred to find one that best suits you!

pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?

Answers

Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine

Select the correct answer.

Nina obtains an image in which birds are flying across the sky. Some parts of the image are blurry. In which stage of image processing will Nina fix the blurry parts?

A.
image acquisition
B.
preprocessing
C.
extracting features
D.
segmentation

Answers

Answer: Image Acquisition

Explanation:

Timmy walks into a store to buy a PC game. He reads this information about a game on its packaging:

System Requirements
Minimum Recommended
Processor Intel Core i3 or equivalent Intel Core 2 Quad or higher
Memory 2 GB 4 GB or higher
Video Card Integrated Discrete


Based on this information, which statement is true?
A.
Timmy can play the game even if his computer’s specifications don’t meet the minimum requirements.
B.
Timmy can play the game even if his computer has less than 2 GB memory.
C.
Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.
D.
Timmy can play the game even if his computer’s processor class is lower than an Intel Core i3.
E.
Timmy can play the game at a higher level of visual detail if his computer has an Intel Core 2 Quad processor.

Answers

Answer:

C. Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.

Explanation:

The processor efficiency and memory requirements are much more necessary to get the game to run and give it a playable framerate. Having a video card will improve his graphics, so this is more of a suggestion than a necessity.

conceited or self confident? why?

Answers

Answer:

self confident

Explanation:

self confident mean that u don't lose your hope and you can focus on your aim then u cann be success in any field

Answer: self confident because you should always love yourself and not need other people option or attention to motivate yourself

Explanation:

Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.

Answers

Answer:

1. Hyperlink

2. IP address

3. Fault tolerance

4. Server

5. To do list

Explanation:

Text within a document that is linked to other information available to the reader is called HYPERLINK.

A unique location for a computer on the network is its IP ADDRESS.

The FAULT TOLERANCE is the ability of a network to cover after any type of failure.

The computer that responds to requests from the client computer is known as the SERVER.

A TO-DO LIST is an ordered list of tasks waiting to be performed.

Answer:

hypertext

IP address

fault tolerance

server

queue

Explanation:

just did it on edg

Help Please! Computer science question !!!!!!!!!!20 points!!!

Answers

Answer:

45 abc

Explanation:

What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances

Answers

The thing that a user should do to find and replace text throughout a field  are:

1. Put the cursor in the field to search.

2. Open the  find  dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click  Replace All  to change all instances.

How do you search for and replace text across an entire field?

The keys on the keyboard CTRL+F is often used  to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.

The operations are:

1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.

2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.

3. Press the Replace or Replace All button.

Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.

Learn more about Editing  from

https://brainly.com/question/15768529
#SPJ1

See full question below

What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to

complete the statements.

1. Put the cursor in the field to search.

2. Open the _____

dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click -------to change all instances.

HELP I SUCK IN THIS HELP!!!!! ​

Answers

Answer:

I think it's print(5**3)

Does a Laser Printer use its beam to attach dry powdered ink to a sheet of paper?​

Answers

Answer: A laser printer is different only in terms of ink heads. Hile Traditional Printers use physical contact to embed ink onto the paper laser jets use laser beams with inks to forms impressions into papers. They require no special paper to print. So probably not.

Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.

Answers

Answer:

it is either c or d

I'm 99.5% sure it is C tho

8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.

After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.

Answers

Answer:

import random

def buildArray():

   amount = int(input("How many values to add to the array: "))

   array = []

   for i in range(amount):

       array.append(random.randint(10, 99))  

   return array

array = buildArray()

print(array)

def sumArray(array):

   return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

Explanation:

this gave me 80%

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

import random

def buildArray():

  amount = int(input("How many values to add to the array: "))

  array = []

  for i in range(amount):

      array.append(random.randint(10, 99))  

  return array

array = buildArray()

print(array)

def sumArray(array):

  return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

See more about python at brainly.com/question/26104476

PLEASEEE HELPPP im gonna cry
What’s the name for the array of buttons that provides quick access to commonly used commands?

A.
menu bar
B.
toolbar
C.
ruler
D.
scroll bar

Answers

Your answer is:

B. toolbar

Answer:

B) Toolbar

_______________

Which of the following is a table which can be rearranged to analyze data in a variety of ways?
A. Pivot Table
B. HLOOKUP Table
C. VLOOKUP Table
D. PivotLookup

Answers

Answer:

A. Pivot Table

Explanation:

Given that a Pivot Table is a form of a table in statistics that comprises various data of several tables in a shortened form.

This table is then used to carry out analysis of data in numerous ways to reach a meaningful conclusion to make a decision.

Hence, in this case, the correct answer is a PIVOT TABLE.

Which WYSIWYG editor keeps the code clean and validates HTML code
?

A. MS Word

B. Kompozer

C. Gedit

D. Notepad

E. BlueGriffon

Answers

Answer:

E. BlueGriffon

Explanation:

Answer:

b. KompoZer

Explanation:

KompoZer is free software. You can use it on Windows, Mac OS, and Linux. It has a customizable interface with modified toolbars. It validates HTML against the current web standard and keeps the code clean.

How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies

Answers

Answer:

d. European nations competed and made alliances to control colonies.

Explanation:

The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.

Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).

This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.

Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.

In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.

what are the uses of plotters​

Answers

Answer:

Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materials

Hope it helps :)❤

Answer:

 Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....

Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False​

Answers

Answer:

true

Explanation:

we can connect to any device which has a network connection

name the statement which is used at end of each case from computer subject

(plz answer fast and correct i will mark as brainlist ......)​

Answers

Answer:

In computer programming, a statement is a syntactic unit of an imperative programming language that expresses some action to be carried out.[1] A program written in such a language is formed by a sequence of one or more statements. A statement may have internal components (e.g., expressions).

Many programming languages (e.g. Ada, Algol 60, C, Java, Pascal) make a distinction between statements and definitions/declarations. A definition or declaration specifies the data on which a program is to operate, while a statement specifies the actions to be taken with that data.

Statements which cannot contain other statements are simple; those which can contain other statements are compound.[2]

The appearance of a statement (and indeed a program) is determined by its syntax or grammar. The meaning of a statement is determined by its semantics.

What is ransomware
я​

Answers

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

Which sentence best justifies the benefits of using enterprise systems?


Early systems (in the 1960s) focused on the automation of individual functions, such as financial accounting and inventory management, primarily in the manufacturing industry. In the 1970s, the systems allowed planning of product requirements. Resource planning then began, which included not just shop floor planning but finance, engineering, human resources, distribution, and project management planning activities as well.

We now use enterprise systems that integrate all functions, including inventory control, accounting, and human resources. These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency. Extended ERP systems include CRM, SCM, and advanced planning and scheduling. New systems include capabilities for business intelligence and cloud-based computing.

Answers

The first sentence is true

Answer:

These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency.

Explanation:

What is a font? A)
a typeface on a label
B) a typeface on a poster
C) a typeface on a computer or d) a typeface on a sign

Answers

Answer:

A is most likely the answer

Explanation:

Other Questions
Help please!! Thanks I don't know how to do this... Please help me Fannie has a credit card that using the average daily balance method. For the first 16 days of one of her billing Cycles, her balance was $1,050, and for the last 14 days of the billing cycle, her balance was $1,280. If a credit cards APR is 19%, which of these Expressions could be used to calculate the amount Fannie was charged in interest for the billing cycle?A. (0.19/365 x 31)(16 x $1050+14 x $1280/31)B. (0.19/365 x 30)(16 x $1050+14 x $1280/30)C. (0.19/365 x 30)(14 x $1050+16 x $1280/30)D. (0.19/365 x 31)(14 x $1050+16 x $1280/31) A town plans to clear a patch of forest to make a road wider. What possible changes should the town take into account? Identify each sentence as either sentence or fragment 1.) Do your work 2.) Every time she raises her hand. 3.) Never in a million years 4.) Because I said so 5.) They wondered 6.) Go7.) left on the frying pan 8.) Each and every one of the misbehaved kids 1) In your own words, explain when (-3)n is positive and when it is negative. An object with little mass won't require a lot of force to move.Group of answer choicesA. FalseB. TrueC. Only sometimes What kind of questions are used to start a socratic essay A ramp was constructed to load a truck. If the ramp is 8 feet long and the horizontal distance from the bottom of the ramp to the truck is 3 feet, what is the vertical height of the ramp? Lonergan Company occasionally uses its accounts receivable to obtain immediate cash. At the end of June 2021, the company had accounts receivable of $920,000. Lonergan needs approximately $570,000 to capitalize on a unique investment opportunity. On July 1, 2021, a local bank offers Lonergan the following two alternatives:A. Borrow $570,000, sign a note payable, and assign the entire receivable balance as collateral. At the end of each month, a remittance will be made to the bank that equals the amount of receivables collected plus 10% interest on the unpaid balance of the note at the beginning of the period.B. Transfer $620,000 of specific receivables to the bank without recourse. The bank will charge a 3% factoring fee on the amount of receivables transferred. The bank will collect the receivables directly from customers. The sale criteria are met.Required: 1. Prepare the journal entries that would be recorded on July 1 for: a. alternative a. b. alternative b.2. Assuming that 70% of all June 30 receivables are collected during July, prepare the necessary journal entries to record the collection and the remittance to the bank for:____. a. alternative a. b. alternative b. When would a female have a 100% chance of inheriting a sex-linked recessive trait?A. She inherits an affected X chromosome, but only from her mother.B. Mother and father both pass on dominant alleles on somatic (body) chromosomes.oC. She inherits an affected X chromosome from both mother and father.D. Mother and father both pass on recessive alleles on somatic (body) chromosomes. The line plot shows the distances, in miles, run by joggers in a park.---------------------------------A number line with one x above .5, one x above 1.5, one x above 2, one x above 3, two xs above 3.5, two xs above 4, one x above 4.5, and one x above 8.5.How many runners ran at least 3 miles?Enter your answer in the box.{ } runners In 1994, Leroy Burrell of the United States set what was then a new world record for the mens 100 m run. He ran the 1.00 102 m distance in 9.5 s. Assuming that he ran with a constant speed equal to his average speed, and his kinetic energy was 3.40 103 J, what was Burrells mass? Give three examples from the text which support Muhammad Alis statement that, "I have always believed in myself." HELP ME ASAP Qu es? (Limit your response to a definite article and noun) *Your answer Hi yall can plz help me with this it would mean a lot.....Thanks! An Olympic sized swimming pool is 50 meters long, 25 miters wide and 2 meters deep. What is the volume of the pool? Please help me someone? Write two equivalent rates for 3 breads made in 45 minutes. Society during the middle ages was organized into a feudal system, which consisted of small communitiescongregated around a central "Lord." The owner of all of the land in a country was ultimately the king, but because the king couldneither protect nor rule all of his land himself, he divided it up into segments called "fiefs" and awarded fiefs to important nobles,typically barons or bishops, in exchange for their contributions of soldiers and/or money to the king's armies. The Lords lived in alarge house or a castle called the manor. People would gather at the manor for celebrations, or for protection, if necessary.Immediately around the manor was the village, which included the church. Farms, which supplied food to the Lord and to thevillagers, were in the outlying areas.About 90% of the people that lived under the feudal system in the middle ages were peasants, usually called "serfs." The Lordsprotected the peasants, and in return the peasants worked for the Lords. Though some peasants were free and practiced trades likecarpentry, baking, and blacksmithing, most were little more than slaves. They worked long, hard days, six days a week for not muchmore than subsistence.Women worked hard during this period too, and not only at the household tasks that you would expect them to do, like cooking,baking bread, sewing, weaving and spinning. They also hunted for food, fought in battles, and worked as blacksmiths, merchants andapothecaries, midwives, fieldworkers, writers, musicians, dancers or painters. Other women became nuns. Some women werebelieved to be witches. A famous woman from the middle ages is Joan of Arc, the daughter of a French peasant, who claimed to hearvoices instructing her to protect France against the English invasion. Dressed in armor, she led a victorious troop of soldiers againstthe English in the fifteenth century. But the Middle Ages was rife with ignorance and superstition, and even after her service to hercountry, Joan of Arc was burned as a witch.1. What was the benefit of the feudal system to the king?