The inside color of a shape or object is it’s

The Inside Color Of A Shape Or Object Is Its

Answers

Answer 1

Answer:

A.

Explanation:


Related Questions

Learning Task 3: Below are different electronic diagrams. Write the name of
the diagram on your answer sheet.
BELL
Input
Video
Transform
Quantization
Entropy
Coding
Output
Bitstream
Inverte
Quantization
1 2 3
Inverse
Transform
Number to be
dropped when
energized by
electric current
Annunciato
DOOD
Intor intra
Prediction
Frame
Buffer
Ordinary
Push Button​

Answers

Answer:

WAOW

Explanation:

You did better than I can

What is the name of the tab that becomes available after you add and select an image in your PowerPoint presentation?
Home
Insert
Picture
View

ASAP PLS

Answers

Answer:

INSERT

Explanation:

INSERT PCIURE

Most slide layouts include at least one ________ by default.
Question 2 options:

placeholder

action button

transition

animation

Answers

Hey

I think that the answer placeholder :)

Sry if im wrong tho

Answer:

The answer is placeholder.

Add the beginning comments at the top of the program.
In the first part of your program, create a for loop that runs three times:
Inside the for loop, prompt the user for an integer
Prompt the user for another integer
Call the function compare (you are going to create this function next)
Pass the variables that you used for the integer inputs from above
Create a function called compare (remember the function definition should go at the top of the program) and use two variables in the parameters of the function:
Inside of the function, create an if / elif / else structure that compares the two values passed into the function
If one value is less than the other, output that to the user (Ex: 2 is less than 4)
Elif the other value is less than the other output something similar (Ex: 4 is less than 9)
Else, output that they are equal to each other
That is it for the first part of the program.
Next, create an empty list called names.
Create a loop that runs 6 times:
Inside of the for loop, prompt the user for a name
Append the name to the list
Outside of the for loop, prompt the user for how many people they would like to vote off the island.
Call the function eliminate and pass the variable you used from step 7 to it.
Also, this function will return a value, so store this back function call back to a new variable.
Create a function called eliminate and create a variable to use as the parameter:
Inside the function, randomly shuffle (use the shuffle() method) all the values in the list (you will need to import random at the top of the program)
Then using a for loop, loop it as many times as the value that was passed to the function:
Inside the for loop, remove one name from the list (use the pop() method)
Outside the for loop, but still inside the function, return the list of remaining people
Underneath where you left off in step 8, print the remaining people that are left: those that did not get voted off the island.
WILL GIVE BRAINIEST!

Answers

Answer:

#################

# Python Practice

#################

# Part 1

# ------------------------------------------------------

run_compare = 3

ran_compare = 0

while run_compare != ran_compare:

   num1 = int(input('Please input the first number: '))

   num2 = int(input('Please input the second number: '))

   def compare(number1, number2):

       if number1 < number2:

           print(f'{num1} is less than {num2}')

       elif number1 > number2:

           print(f'{num1} is greater to {num2}')

       else:

           print(f'{num1} is equal than {num2}')

   compare(num1, num2)

   ran_compare += 1

# ------------------------------------------------------

# Part 2

run_name = 6

ran_name = 0

names = []

# ------------------------------------------------------

while run_name != ran_name:

   name = input(str('Please insert a name: '))

   names.append(name)

   print(names)

   ran_name += 1

# ------------------------------------------------------

give me a second im going to resolve the last part but this is what i have so far

Following are the program to the given question:

Program Explanation:

Import random package as r.Defining a method "compare" that takes two variable "n1,n2" inside the parameter.In the next step, a conditional statement is declaed that checks the parameter value and prints its value. Defining a method "eliminate" that takes two variable "n, names" inside the parameter.It calls the shuffle method, and define a for loop that removes names value and return its value.In the next step, a for loop is defined inside this two variable "i1, i2" is declared that inputs value and calls the comapre value.In the next line, an empty list "names" is declared inside this a for loop is defined that inputs name value and calls the "eliminate" method and print its calculated value.

Program:

import random as r#import package random

def compare(n1, n2):#defining a method compare that takes two parameters  

   if n1<n2:#defining if block that checks n1 value less than n2 value

       print("{} is less than {}".format(n1, n2))#print value with the message

   elif n2<n1:#defining if block that checks n2 value less than n1 value

       print("{} is less than {}".format(n2, n1))#print value with the message

   else:#defining else block

       print("{} and {} are equal".format(n1, n2))#print value with the message

def eliminate(n, names):#defining a method eliminate that takes two parameters

   r.shuffle(names)#calling the shuffle method

   for i in range(n):#defining a for loop that checks n values

       names.pop()#calling pop method to remove value

   return names #return a names value  

for i in range(3):#defining a for loop that inputs value

   i1 = int(input("Enter an integer: "))#defining i1 value to input value

   i2 = int(input("Enter another integer: "))#defining i2 value to input value

   compare(i1, i2)#calling the compare method  

   print()#using print to break line  

names= [] #defining an empty list      

for i in range(6) :#defining a loop that inputs name value

   name = input("Enter name: ")#defining name variable that inputs value

   names.append(name)#calling append method  

n = int(input("\nHow many people you would like to vote off the island: "))#defining n variable that input value

new_names = eliminate(n, names)#defining new_names that calling eliminate method

print("\nRemaining people that did not get voted off the island:")#print message

if(len(new_names) != 0):#defining if block that checks new_names length not equal to 0

   for name in new_names:#defining a for loop that checks name is in new_names

       print(name)#print name value

else:#defining else block  

   print("None")#print message None

Output:

Please find the attached file.

Learn more:

brainly.com/question/21922031

If I want to control the aperture and I want the camera to control the shutter speed which setting on the mode dial is most appropriate?
a)AV
b) TV
c) M
d) P
since this is my last question im giving 100 points and brainliest

Answers

Answer:

answer is a

hopes this helps

For all programs, you should write a small amount of code and _______
it before moving on to add more code?

Answers

Answer:

test

Explanation:

One newly popular development paradigm is "test-driven development"; which borrows agile engineering principles in architecting project components.

cutting of trees is bad or not bad​

Answers

It is bad cutting tree :(

Answer:

bad

Explanation:

it gives out air and oxygen

Ryan is a manager who maintains an official record of the events that happen in his company. At the end of the day, he writes about the events that took place. The words that he frequently mentions in his record are today, client, and meeting. The moment he types the first two letter of these words, they appear as a suggestion. Which feature of the word processing program makes these suggestions

Answers

Answer: word completion

Explanation:

Answer:

Word Completion

Explanation: because i took the test.

For this exercise, you are going to write a recursive function that counts down to a Blastoff!
Your recursive function will not actually print. It will return a String that can be printed from the main function. Each recursive call will add on to that string.
In your main function, prompt the user for a starting value, then print the results.
Sample Output
Please enter a number to start:
5
5 4 3 2 1 Blastoff!
import java.util.Scanner;
public class Countdown
{
public static void main(String[] args)
{
// Start here
}
public static String countdown(int number)
{
// Base case - return Blastoff!
// Recursive call
}
}

Answers

Answer:

import java.util.Scanner;

public class Countdown {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

int n;

System.out.print("Please enter a number to start: ");

n = input.nextInt();

System.out.print(countdown(n));

}

public static String countdown(int number) {

if(number>0) {     return " "+number+countdown(number-1);    }

   else    {        return " Blastoff!";    }

}

}

Explanation:

The main method begins here

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

This declares an integer variable n

int n;

This prompts user for a number

System.out.print("Please enter a number to start: ");

This gets user input n

n = input.nextInt();

This calls the countdown function

System.out.print(countdown(n));

}

The countdown function begins here

public static String countdown(int number) {

This is the base case where input number is greater than 0

if(number>0) {     return " "+number+countdown(number-1);    }

This ends the recursion

   else    {        return " Blastoff!";    }

}

C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?

Answers

Answer:

"resume.docx" is located in "Documents"

Explanation:

[<drive-letter:: represents drive name>]:/Main_Directory/Sub_Directory/ETC..

The  "resume" is located in the "Documents" according to the file structure.

Given the information C:/Users/Documents/resume.docx, this can be interpreted as Documents is in the Users folder and the resume can be found in the Document folder.

We can also say that the document folder was created by the user and the "resume" file is placed directly into the documents.

Based on the explanation, we can say that the  "resume" is located in the "Documents" according to the file structure.

Learn more here: https://brainly.com/question/13715153

Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
Select "Text" from the Insert menu.

Click in the Task pane and enter text.

Draw a text box, click in it, and enter text.

Click in a placeholder and enter text.

PLEASE help

Answers

Answer:

Draw a text box

Explanation:

Because if she draw it she can edit and write what she want

Question 24 Multiple Choice Worth 5 points)
(01.04 MC)
Zavier needs to compress several files. Which file type will allow him to do this?
ODOC
GIF
OJPG
O ZIP

Answers

Answer:

ZIP

Explanation:

ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections

TBH:

it may be O ZIP but i've never heard of it.

Answer:

Zip (D)

Explanation:

Took The Test

A __ consists of wires connecting the CPU and other parts of the computer. The __ transfers the data between the CPU and the memory unit.

Answers

Answer: A BUS consists of wires connecting the CPU and other parts of the computer. The DATA BUS transfers the data between the CPU and memory unit.
Explanation: PLATO

The U.S. military's standard for computer security is known as
DCS-3000.
TEMPEST.
Daubert standard.
Carnivore.

Answers

Answer:

TEMPEST.

Explanation:

TEMPEST is an acronym for Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions and it is a secret (classified) project of the government of the United States of America that originated with its military in the 1960s based on the study of security with respect to telecommunication devices emitting Electromagnetic Radiation (EMR).

Hence, the U.S. military standard for computer security is known as TEMPEST.

The main purpose of the Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions (TEMPEST) is to prevent the theft, compromise or interception of informations that are being transmitted on various telecommunications devices through the use of Electromagnetic Radiation (EMR).

Multi-part question:

Part 1:

Use MySQL Workbench to create an EER model for a database that stores information about the downloads that users make. (When you create the EER model, it will be given a default name of mydb. For this exercise, it’s not necessary to change this name.) Define the tables that are necessary to implement this data structure:

Each user must have an email address, first name, and last name.

Each user can have one or more downloads.

Each download must have a filename and download date/time.

Each product can be related to one or more downloads.

Each product must have a name.

When you’re done defining the tables, create a diagram for the database. Then, use the diagram to define the required relationships. When you do that, be sure to use the relationship button that uses existing columns.

Part 2:

Create a view named order_item_products that returns columns from the Orders, Order_Items, and Products tables.

This view should return these columns from the Orders table: order_id, order_date, tax_amount, and ship_date.

This view should return the product_name column from the Products table.

This view should return these columns from the Order_Items table: item_price, discount_amount, final_price (the discount amount subtracted from the item price), quantity, and item_total (the calculated total for the item).

Part 3:

Write a SELECT statement that uses the view that you created in part 2 to get total sales for the five best selling products. Sort the result set by the order_total column in descending sequence.

Answers

Answer:

part 1:

Explanation:

dad always arrives home from work thoroughly exhausted​

Answers

Yes plz explain your answer

Which of these parts serves as the rear cross structure of a vehicle?
Rear body panel
Rear bumper cover
Rear rails
Rear core support
ontents

Answers

Answer:

Rear bumper cover

Explanation:

What is cybercrime?
Describe some of the various cybercrimes?
What are the laws that govern cybercrimes?
What can we do to prevent being a victim?

Remember to provide examples.

Answers

Answer:

criminal activities carried out by means of computers or the internet is known as cyber crime.

Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smallest and largest integers in the list.

Ex: If the input is:

10
5
3
21
2
-6
the output is:

2 and 21

Answers

n = 1

lst = []

while n > 0:

   lst.append(n := int(input()))

lst.pop(-1)

print(str(min(lst)) +" and "+str(max(lst)))

I wrote this code in python 3.8. I hope this helps

explain the major innavotions made from the establishment of abacus​

Answers

Answer:

The major innovations made from the establishment of abacus​ is explained below in details.

Explanation:

Industrial Age - 1600

John Napier, a Scottish aristocrat, and statesman dedicated much of his relaxation time to the knowledge of mathematics. He was particularly involved in devising ways to aid calculations. His greatest offering was the discovery of logarithms. He recorded logarithmic measures on a set of 10 boarded rods and thus was capable to do multiplication and division by equaling up numbers on the sticks. These enhanced identified as Napier’s Bones.

In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose is

Answers

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.

A. export
B. sort
C. link
D. import

Answers

A.Export

I got it right on test

Answer:

pretty sure that it would be A. Export :)

----------------------------------------------------------------------------------------------------------------

Explanation:

Because B and C don't make too much sense, and D would mean to 'bring in' and A means the opposite, which is take out.

explain the major innavotions made from the establishment of abacus​

Answers

Answer:

The abacus is one of many counting devices invented to help count large numbers.

Explanation:

2. When You buy 4 GB memory unit (pendrive) you
will get memory less than 4 GB?​

Answers

Answer:

Yes.

Explanation:

I believe so, because the pendrive takes some storage for it to actually function. If they wanted it to have exactly 4 GB of memory, they would have to add extra memory.




Predict the output
int ma3, n = 5, p=4
if(m==n&&n!=p)
{
System.out.println (m*n) ;
system.out.println(n%p);
}
if (m!=n) " (n==p)

System, out println (m+n)
System.out printen (m-n))
}​

Answers

Answer:

the output will be "hello word"

A formal method for designing and representing human-computer interaction dialogues using box and line diagrams is called:________.

Answers

Answer:

Dialogue Diagramming

Explanation:

Dialogue is simply a sequence of interaction that usually occurs between a user and a system.it consists of Designing the dialogue sequence, Building a prototype and Assessing Usability

Dialogue diagramming is a known widely anf formal means by which we are designing and representing human-computer dialogues using box & line diagrams.

Please help this computer science question(Pseudocode and Trace table)

Answers

Answer:

can u explain more specific plz

Explanation:

What is the name of the variable in the
following code?

Answers

Answer:

Lift

Explanation:

When coding, you use a variable name for an object, and assign it to move up, down, and/or sideways.

Lift is the answer for that

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?

Compatibility Checker
Accessibility Checker
Insights
AutoCorrect

Answers

Answer:

Accessibility Checker

Answer:

answer is accessibility checker or B on edge

describe the impact of technology in your life . how does it affects your human relations with other people .​

Answers

Answer:

Technology has a huge impact on my life, it has helped me visit places, talk to people, and captivate me. For example, using a car I have visited my friends and family. This is making a stronger bond with those people I visited. And, using my phone I can call and text people. this has led to making lots of friends and stronger relationships. Technology is important for human contact unless you want to ride carriages around the streets.

Other Questions
Which expression is equivalent to -3(4x-0.50)?PLEASEEEEEEEEEEEEE HELPPP At the marine aquarium where she works, Meera is in charge of the penguin exhibit. She notices that one of the chinstrap penguins, Bob, looks to be gasping for breath. She calls in the veterinary specialist, who performs tests. The specialist tells Meera that Bob has aspergillosis and will need treatment. Which kind of medication will the specialist MOST likely use to clear up Bob's issue? Read this sentence from Abraham Lincoln's Second Inaugural Address:Yet, if God wills that it continue until all the wealth piled by the bondsman's two hundred and fifty years of unrequited toil shall be sunk, and until every drop of blood drawn with the lash shall be paid by another drawn with the sword, as was said three thousand years ago, so still it must be said "the judgments of the Lord are true and righteous altogether.Which of the following best explains the effect of the phrase until every drop of blood drawn with the lash shall be paid by another drawn with the sword? (4 points) aIt creates a sense of honored fairness. bIt creates a sense of sorrow and grief. cIt suggests a feeling of suffering and pain. dIt suggests a much-deserved justice. The percent ionization of a 0.350 M HC,H,O2 solution. Ka(HC2H302) "What is the equation of the line parallel to the given line with an x-intercept of 4?"y = __x + __ HELPPP I NEED AN ANSWER ASAP I need an answer to What is: p - 10 = 5 Identify a law that promotes equality. Discuss how the law promotes equality. What is the life cycle of an average sized star? How did people in Mesopotamia live before city-states were developed?K12 6th grade unit 4 test.A. They lived as craftsmen in towns. B. They almost all lived as hunters in groups. C. They lived as nomads. D. They lived as farmers and herders in communities. Hygdye218 Corporation has two divisions: the Domestic Division and the Foreign Division.The Hygdye218 Corporation's net operating income is $84,300.The Domestic Division's divisional segment margin is $48,200 and the Foreign Division's divisional segment margin is $172,000.What is the amount of the Hygdye218 Corporation's common fixed expense not traceable to the individual divisions?A. $132,500B. $135,900C. $256,300D. $220,200 Gestational diabetes occurs when a pregnant woman has high levels of blood sugar. Cells in the pancreas usually keep blood sugar levels normal, but hormones produced during pregnancy deactivate the cells. After pregnancy, hormone levels return to normal, and so do the pancreas cells. Is this an example of DNA or the environment controlling gene expression? Explain your answer ASAP Please what is the answer to this question?By the ways, this is not a quiz or a test. It is a benchmark review. Literary Terms"Demanding" and "assertive" have the same literal dictionary definition, but the word"demanding" has a much more negativeO denotationO connotationO moodO diction At a school carnival, tickets can be purchased to participate in different activities. The table shows the total cost for different numbers of tickets.What is the constant of proportionality that relates y , the total cost in dollars, to x , the number of tickets purchased?PLZ I HAVE TO FINISH THIS TEST TODAYYY Why was Mexico not happy about California? HELP MATH STIKES AGAIN!Hotel A hotel charges $140 per night for the first two people and $10 for each additional person. Hotel B charges $80 per night for the first two people and $20 for each additional person. At how many additional people per night is the rent for the two rooms the same. I will mark brainlyist for correct answer PLSSSS HELPPPPP ASAP How many points will I get if I get 60 points every 5 mins and it goes on for 4 hours? On Miss Gless iPhone, she has 400 songs 24 of those songs are country songs. What percent of her songs are not country?Your answer:help o_o