Wearables, video playback and tracking devices can help athletes because

Answers

Answer 1

Answer: rap accusations

Explanation:


Related Questions

heeeeeeeeeeeelp idek plz help

Answers

Answer:

b

Explanation:

HELP PLZZ Which statement is true? Select 3 options.


A. A function must have a return value.

B. A function can use variables as parameters.

C. The definition of a function must come before where the function is used.

D. The definition of a function can come before or after it is used.

E. A function can have more than one parameter.

Answers

Answer:

B. C. E.

hope this helps :D

Answer:

The definition of a function must come before where the function is used.

A function can have more than one parameter.

A function can use variables as parameters.

Explanation:

What happens when a sender configures the sensitivity setting of a message to Private?

The security settings of the message are raised.
The recipient must send a confirmation of receipt.
The recipient is notified that the message is private.
The recipient receives a key code to unlock the message.

Answers

Answer:

The recipient is notified that the message is private.

Explanation:

In Microsoft Outlook: This is application software that is used as an electronic messaging platform otherwise known as email.

When a sender configures the sensitivity setting of a message to Private "The recipient is notified that the message is private."

Answer:

Look at the attached file

Explanation:

I'm 100% correct as you can see

Can someone help me get spotify premium

Answers

Answer:

Yes just go to spotify and pay for spotify premium.

Explanation:

Answer:

Buy it, go to the app store or google play and it will surely pop up like a sign saying premium.

Explanation:This is so hard :/

Major innovations made from the establishment of abucus to the 5th computer generation

Answers

Answer:

Cogs and Calculators

It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."

Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).

Explanation:

just hellllllp me plzzzzzzzzzzzzz

Answers

it should increase the amount of thrust

Answer:

It is C.

Explanation:

Hope this helped have an amazing day!

PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills

Answers

Answer:

Bank Rate skills

Explanation:

because it is i believe

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

what is bit and byte in computer​

Answers

A bit is the smallest unit of information a byte is to see how many bits need to be represented (letters/characters)

Hope this helps

The First Amendment of the Constitution is one of the most important parts of the Bill of Rights. What specific rights does this amendment guarantee to every American citizen?

Answers

Answer:

The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government

Explanation:

if this answer is correct make me as brainlelist

Answer:

its guarantees the freedom of speech, religion, and the freedom of the press.

Explanation:

Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro​

Answers

Answer:

b,c,d, and e

Explanation:

Hope this helps

Answer:

BCDE

Explanation:

EDG 2021

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

Food deliveries should be scheduled _____.

Answers

Answer:

1-11pm

Explanation:

Answer:

at less busy times so that staff has time to properly inspect food

Explanation:

choose the type of error described. can you help me bc i don’t know??

Answers

Answer:

logic error occurs when the result is wrong...

syntax error occurs when you use the wrong punctuation...

runtime error occurs when the program starts running...

Answer:

Logic error: When the computer outputs an undesirable value due to the wrong use of operations.

Syntax error: Occurs when syntax is not used correctly in code.

Zero division error: Occurs when a value is divided by zero.

Hope this helps :)

PLEASE ASAP!!

Today, most film editors manually cut and splice the actual film footage once it arrives.


O True
O False

Answers

The correct answer should be true, as their job is to *edit* the footage.

Answer:

True

Explanation:

edg2021

The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task

Users of a _____ database have access through their personal computers linked to local or wide area networks

Answers

Answer:

Company

Explanation:

A company database is a database of a firm or organization that contains the information about the firm's employees, their products, services, and as well their client's and customers' details.

This is often kept on the main database server and arranged and organized by a database administrator.

Hence, Users of a COMPANY database have access through their personal computers linked to local or wide area networks

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

Which job role requires you to create user guides for computer products and services?
A
creates users guides for computer products and services.
Reset
Next
Which job role requires you to create user guides for computer products and services

Answers

Answer: Technical writer

Explanation:

A technical writer is an individual who is responsible for the creation of technical documents such as user manuals, reference guides, instruction manuals, journal articles, etc.

Technical writers can work in software firms as they would be responsible for creating user guides for computer products and services.

Answer:

The answer for the blank box is :   technical writer

Explanation:

Hopefully this is right!

have a great day/eve!

heeeeelp
and thank you

Answers

Answer:

2375 calories

Explanation:

125% of 1900=2375 calories

Answer:

2375 calories

Explanation:

it's asking for 125% which is the same as 100% + 25%

100% is 1900

25% of 1900 is 475

1900 + 475 is 2375

What is Microsoft Windows?

Answers

Microsoft Windows is, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

Communication of the binary data via the voltage level for each time interval.
a
voice assistant
b
machine language
c
voltage
d
digital signal

Answers

Answer:

D

Explanation:

Answer:

D. Digital signal

Explanation:

Edge 2022

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

str = input("Enter a number: ")

sum = 0

for c in str:

   sum = sum + int(c)

print("Sample input - {}".format(str))

print("Sum of digits - {}".format(sum))

print("Number of digits - {}".format(len(str)))

Explanation:

That's python. Was that what you were looking for?

Answer Using Java :-

import java.util.*;

public class Digit

{

public static void main(String args[ ] )

{

Scanner in=new Scanner (System.in)

System.out.print("Enter a number: ");

int n = in.nextInt();

int sum = 0, count = 0;

while (n!=0)

{

int d = n % 10;

sum + = d;

count++;

n /= 10;

}

System.out.println("Sum of digits=" +sum);

System.out.println("Number of digits=" +count);

}

}

What will you see on the next line?

>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)

1

7

3

2

Answers

Answer:

its 3, just did it on edg 2020

Explanation:

sdfdsfdsfdsfsdfsdf vote me brainliest!

The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.

What is an array?

A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.

The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".

So, the next line will be:

>>> aList = [12, 3, 5, 7, 7]

>>> aList.index(7)

3

Therefore, the correct option is c. 3.

To learn more about array, refer to the link below:

brainly.com/question/14915529

#SPJ2

HELP ME!!! I WILL GIVE BRAINLY THINGY!!!

What does the code if (num2==50){ do?

Answers

Answer:

What subject is this?

Explanation:

is this math ?????????????????????

Select the correct answer
Which filter enhances the color contrast around the edges of an image?

A. Texture filters

B.Sharpen filters

C.Blur filters

D.Noise filters

Answers

Answer: C. Blur filters

Explanation:

The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.

So, the color answer C. Blur filters

Answer:

B, Sharpen Filters

Explanation:

i got it right lol

What is the other name of the horizontal column graph?
graph is also known as the horlzontal column graph.

Answers

Answer:

Side Graph mabye?

Explanation:

Answer:

A bar graph.

Explanation:

A bar graph is also known as the horizontal column graph.

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right

help pleaseee!!!!!!! will give brainliest !!!!!
How do you increase the number of CPUs in a virtual machine in order to optimize it?

Answers

Answer:

Not sure if this will help

Explanation:

increase the number of motherboards, and install compatible CPUs on each motherboard

Other Questions
5. The weight of 1 bag of sugar is 12.5 kg. What is the weight of 15 such bags? The highest score on an algebra test was 42 points more than the lowest. When added together, the lowest and the highest score was 154. Find both the lowest and the highest score. In 628 CE, the Muslims and the Meccans wrote a peace treaty so that Muslims could make the annual pilgrimage to Mecca for religious purposes. What did Muhammad decide to do after one of the allied tribes broke the treaty? who founded the Standard Oil Company i will mark you brainliest if you get this riddle rightIn a bus there is:A 26 years old pregnant lady.A 30 years old policeman.A 52 years old random woman.The driver who is 65 years old.Who is the youngest? What is gained from each part of aerobic respiration? Iooooooooooooookkn ooooo In a molecule of calcium sulfide, calcium has two valence electron bonds, and a sulfur atom has six valence electrons. How many lone pairs of electrons are present in the Lewis structure of calcium sulfide? Also, state why.A. oneB. twoC. threeD. fourE. none who wan.na cha..t 2+2 if you sovle your co.ol Mark has a pain in her lungs that hurts so much that it interferes with his sleep. Monash has pain in his elbow that seems to be getting a little worse each week. Who is most likely to see her physician tomorrow? PLEASE HELP ME OUT REALLY NEED THE HELP!!! Prokaryotic cells reproduce by a process called a. mitosis. b. meiosis. c. binary fission. d. binary fusion. 2. In eukaryotic cells, DNA is copied during a phase of the cell cycle called a. M phase. b. S phase. c. G1 phase. d. G2 phase. 3. The cytoplasm of a eukaryotic cell divides by a process called a. mitosis. b. meiosis. c. replication. d. cytokinesis. 4. The fibers that extend from centrosome to centrosome during mitosis are a. polar fibers. b. spindle fibers. c. kinetochore fibers. d. binary fibers. 5. In the G0 phase, cells a. synthesize DNA. b. prepare for cell division. c. exit from the cell cycle. d. move their chromosomes to the cell equator. Discuss how the Constitution was designed to helpensure liberty, justice and peace for U.S. citizens? 0.075,0.75%, 3/4.. Which of the following correctly orders the values above from least to greatest hi whats 750 X 2+ 5also howdy my names venus or fork i go by they/them and if youd like to talk with me for a few minutes before i do an exam im ok with that! PLEASE SOMEONE ACTUALLY HELP I WILL MARK BRAINLIEST Is this a function or not Find in term of pi, the volume of the water Which of the following is matter?dustthe moona strand of hairall of the above Find the value of x. 15 30 120 60