What is a contact position ?

What Is A Contact Position ?

Answers

Answer 1

Answer:

the poses that connect the extremes in motion

Explanation:


Related Questions

Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to an array; a2 is pointer to an array a1 is array of pointers; a2 is pointer to an array a1 is array of pointers; a2 is array of pointers

Answers

Answer:

The answer is "a1 and a2 is an array of pointers".

Explanation:

In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.

Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note​

Answers

Answer:

End note, I think plz tell me if im wrong thank you

3. Answer the following questions.
a. How does computer number system play
calculations?
a vital role in a
computer​

Answers

Answer:

Computers use the binary number system to store data and perform calculations.

Explanation:

Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.

Answers

Answer:

MULTITASKING OS

Explanation:

MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.

Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously

Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.

fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating

Answers

Answer:

that's a good fact about yourself the more love that better

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?

To be a digital media coordinator, Claire needs a bachelor’s degree in _______ digital media, or a related field. She also needs to have knowledge of _______ and emerging digital technologies.

1st blank:
psychology
public relations
finance

2nd blank:
computer programming
computer coding
search engine optimization

Answers

Answer:

1. Public Relations

2. Search Engine Optimization

Explanation:

Given that a public relations degree holder can work in various capacities such as Advertising, Media, Event, and Sale promotion position. Hence Claire needs a bachelor’s degree in PUBLIC RELATIONS.

Similarly, given that the knowledge of Search Engine Optimization is crucial in Digital media coordination, as it helps to drive and gain web or online traffic both in quality and quantity.

Hence, Claire also needs to know about Search Engine Optimization.

Write a recursive function called sum_values that takes in a list of integers and an index of one element in the list and returns the sum of all values/elements in the list starting with the element with the provided index and ending with the last element in the list.

Answers

Answer:

Explanation:

The following code is written in the Java programming language and actually takes in three parameters, the first is the list with all of the int values. The second parameter is the starting point where the adding needs to start. Lastly is the int finalSum which is the variable where the values are all going to be added in order to calculate a final int value. Once the recursive function finishes going through the list it exits the function and prints out the finalSum value.

   public static void sum_Values(ArrayList<Integer> myList, int startingPoint, int finalSum) {

           if (myList.size() == startingPoint) {

               System.out.println(finalSum);

               return;

           } else {

               finalSum += myList.get(startingPoint);

               sum_Values(myList, startingPoint+1, finalSum);

           }

           

   }

which of the following file formats cannot be imported using Get & Transform

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table  

B.)CVS  

C.)HTML  

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:B

Explanation: its the nucules

The answer most likely is B

What was the name of first computer?

Answers

The ENIAC (Electronic Numerical Integrator and Computer) was the first electronic programmable computer built in the U.S. Although the ENIAC was similar to the Colossus, it was much faster, more flexible, and it was Turing-complete.

A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.

Answers

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

Encryption are used to protect data and files when they are is being transmitted

The encryption program written in Python, where comments are used to explain each line is as follows:

#This gets input for the number

num = int(input())

#This converts the number to string

digit = str(num)

#This creates a list

myList = list()

#This encrypts the number, and add the numbers to a list

for i in digit:

   d = str((int(i) + 3)%10)

   myList.append(d)

#This prints the result of the encryption

print(int("".join([myList[2],myList[3], myList[0], myList[1]])))

Read more about encryption at:

https://brainly.com/question/14298787

The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.

True/False

Answers

Answer:

Yes they are to programmer

Explanation:

Plz give me brainiest

Answer:

true

Explanation:

What does cpu mean ​

Answers

Answer:

CPU or Central processing unit is the principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit.

Hope this helps and if you could mark this as brainliest. Thanks!

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Answers

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

Answer:

D.  

triple Data Encryption Standard (DES)

Explanation:

                                       Sincerely : Baby weeb

Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the element. Ex: lowerScores = {5, 0, 2, -3} becomes {4, 0, 1, 0}.Sample program:#include using namespace std;int main() { const int SCORES_SIZE = 4; vector lowerScores(SCORES_SIZE); int i = 0; lowerScores.at(0) = 5; lowerScores.at(1) = 0; lowerScores.at(2) = 2; lowerScores.at(3) = -3; for (i = 0; i < SCORES_SIZE; ++i) { cout << lowerScores.at(i) << " "; } cout << endl; return 0;}Below, do not type an entire program. Only type the portion indicated by the above instructions (and if a sample program is shown above, only type the portion.)

Answers

Answer:

Replace <STUDENT CODE> with

for (i = 0; i < SCORES_SIZE; ++i) {

       if(lowerScores.at(i)<=0){

           lowerScores.at(i) = 0;

       }

       else{

           lowerScores.at(i) = lowerScores.at(i) - 1;

       }  

   }

Explanation:

To do this, we simply iterate through the vector.

For each item in the vector, we run a check if it is less than 1 (i.e. 0 or negative).

If yes, the vector item is set to 0

If otherwise, 1 is subtracted from that vector item

This line iterates through the vector

for (i = 0; i < SCORES_SIZE; ++i) {

This checks if vector item is less than 1

       if(lowerScores.at(i)<1){

If yes, the vector item is set to 0

           lowerScores.at(i) = 0;

       }

       else{

If otherwise, 1 is subtracted from the vector item

           lowerScores.at(i) = lowerScores.at(i) - 1;

       }  

   }

Also, include the following at the beginning of the program:

#include <vector>

In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }

Answers

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

The CEO, calls you into her office and tells you that she's learned that the company needs a database to keep track of supplier contact data as well as the experiences that buyers and operations personnel have with the suppliers. She asks you to begin developing this database. What is your first step in developing the database?

Answers

the database has been a very unique way to park in

Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5 hurricanes have sustained winds of at least 157 miles per hour. The minimum sustained wind speeds for categories 4 through 1 are 130, 111, 96, and 74 miles per hour, respectively. Any storm with winds of less than 74 miles per hour is not a hurricane. If a storm falls into one of the hurricane categories, output This is a category # hurricane, with # replaced by the category number. If a storm is not a hurricane, output This is not a hurricane.

Answers

Answer:

def Hurricane(wind_speed):

   if wind_speed >= 157:

       print("Category 5 hurricane")

   elif wind_speed >= 130:

       print("Category 4 hurricane")

   elif wind_speed >= 111:

       print("Category 3 hurricane")

   elif wind_speed >= 96:

       print("Category 2 hurricane")

   elif wind_speed >= 74:

       print("Category 1 hurricane")

   else:

       print("Not a hurricane")

Hurricane(121)

Explanation:

The function "Hurricane" in the python code accepts only one argument which is the recorded speed of a hurricane. The nested if-statement evaluates the speed of the hurricane and output the appropriate category of the hurricane based on the speed.

For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk

Answers

Answer:

 a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.

b. Workstation Domain: Install anti-virus and constantly update the system software.

c. LAN Domain:  Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.

d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.

e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.

f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.

g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.

Explanation:

Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.

hey yall wanna send me some just ask for my phone #

Answers

Answer:

Send you some what?

Explanation:

the answer is 12

In a program a menu shows a list of?

Answers

Answer:

implemented instructions

Need help with 4.7 lesson practice

Answers

Answer:

1.a

2.sorry cant read it that wekk

3.c

Explanation:

Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check

Answers

Answer:

Essayons

Explanation:

the answer is Language

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

Write a program to output the following quote by Edsger W. Dijkstra:

"Computer Science is no more about computers
than astronomy is about telescopes"
- Edsger W. Dijkstra
Hint: Remember that the escape characters \n and \" can be used to create new lines and quotation marks in your code.

Answers

In python 3.8:

print("\"Computer Science is no more about \ncomputers\nthan astronomy is about telescopes\"\n-Edsger W. Dijkstra")

I hope this helps!

write an essay about yourself based on the dimensions of ones personality​

Answers

I don’t think that we can answer this question, since it’s based on yourself.

Select the correct navigational path to create the function syntax to use the IF function.

Click the Formula tab on the ribbon and look in the
gallery.

Select the range of cells.

Then, begin the formula with the
, click
, and click OK.

Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.

Answers

Answer:

wewewewewewe

Explanation:

wewe[tex]\neq \neq \neq \neq \neq \neq \neq \\[/tex]

Answer:

1. Logical

2.=

3.IF

Explanation:

JUST TOOK TEST GOOD LUCK!!!

what will be output of this program a. less than 10 b. less than 20 c. less than 30 d. 30 or more

Answers

Answer:

D. 30 or more

Explanation:

The score value is passed in as var, meaning, its value could change. In this instance score started at zero and 30 was added to it. The last condition is the only condition that fits score's value(if that makes sense). So its in fact D.

hope i was able to help ;)

UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE​

Answers

Explanation:

A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.

Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save those ten numbers in the reverse order. Display the original array and new array. Then define two separate methods to compute the maximum number and minimum number of the array.Sample Run:Please enter 10 numbers: 1 3 5 8 2 -7 6 100 34 20The new array is: 20 34 100 6 -7 2 8 5 3 1The maximum is: 100The minimum is: -7Bonus: Determine how many numbers are above or equal to the average and how many numbers are below the average.

Answers

import java.util.Scanner;

import java.util.Arrays;

public class JavaApplication47 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Please enter 10 numbers: ");

       String [] nums = scan.nextLine().split(" ");

       int newNums[] = new int [nums.length];

       int w = 0, total = 0, above = 0, below = 0;

       for (int i=(nums.length-1); i>=0;i--){

           newNums[w] = Integer.parseInt(nums[i]);

           w++;

       }

       System.out.println("The old array is: "+Arrays.toString(nums));

       System.out.println("The new array is: "+Arrays.toString(newNums));

       Arrays.sort(newNums);

       System.out.println("The maximum is: "+newNums[9] + "\nThe minimum is: "+newNums[0]);

       for (int i : newNums ){

           total += i;

       }

       total = total / 10;

       for (int i : newNums){

           if (i >= total){

               above += 1;

           }

           else{

               below += 1;

           }

       }

       System.out.println("There are "+above+" numbers above or equal to the average.");

       System.out.println("There are "+below+" numbers below the average.");

   }

   

}

I hope this helps!

Other Questions
simplify the following expression(16a10)(-3a) = 1. Salt has the chemical formula NaCl because it is made up of atoms of Sodium (Na) and Chlorine (CI).Which statement most accurately describes this compound in relation to the elements it is made of?A. When sodium and chlorine chemically combine they create a substance with completely differentpropertiesB. Salt has similar properties to the sodium and chlorine it is made ofC. Once salt is formed the sodium and chlorine atoms no longer exist, only salt atomsD. Salt can easily be separated back into sodium and chlorine atoms through physical means How did the flooding cycle provide seasonal rhythm for the Egyptians? Help me please Ill mark brainliest. Suppose that some country had an adult population of about 47 million, a labor-force participation rate of 123.4 percent, and an unemployment rate of 31.0 percent. How many people were unemployed?a. 18 million b. 81.0 million c. 58 million d. 40 million How did Chandraguptas relationship with Seleucus affect both of their empires?A. Both empires continued to fight with each other.B. Both empires benefited from trading with each other.C. Both empires joined together to attack smaller kingdoms.D. Both empires spied on each other to try to gain an advantage.PLEASE ANSWER 30 POINTS Which equation represents a line which is parallel to the line 5x-4y=-12? What word can come from these letters having the L at the end?: GonmiaclPlease help 100 points and brainliest if correct What are weather balloons? Locations with instruments that measure weather conditions in specific land areas Numerical equations based on weather-related factors that forecast weather Objects that carry instruments into the stratosphere to measure atmospheric conditions Structures that orbit Earth in the exosphere to capture images and collect data Two roads diverged in a yellow wood,And sorry I could not travel bothAnd be one traveler, long I stoodAnd looked down one as far as I couldTo where it bent in the undergrowth;Then took the other, as just as fair,And having perhaps the better claim,Because it was grassy and wanted wear;Though as for that the passing thereHad worn them really about the same,And both that morning equally layIn leaves no step had trodden black.Oh, I kept the first for another day!Yet knowing how way leads on to way,I doubted if I should ever come back.I shall be telling this with a sighSomewhere ages and ages hence:Two roads diverged in a wood, and I-I took the one less traveled by,And that has made all the difference.Which of the following is the best statement of theme?In life, we must make choices that both broaden and limit our experience. I think the theme of the story is that if we choose to do uncommon things, we will be happy.choicesRobert Frost made the choice to travel one path in the woods rather than another. what should be added to 7 3/5 to get 18 (Step explanation ) When coworkers need help, they ask Edwina. She seems to know more about the job than everyone. She graduated with high honors from college and continues to learn all she can about a variety of interests. Edwina would score high in ________. A. conscientiousness B. perception C. thinking D. openness to experience What is the product of 7-6 1/8 The phrase "por cierto" means:by certainfor sureover therefor now the incident at three miles island in 1979 involved What might happen if you snapped or tore one of yourligaments? if sec() < 0 and the sin() = 15/17 what is the exact value of cot () help with this translation! 15 points pls its urgent Why was Buksas discovery cause for a celebration? Question :Which group migrated to Texas to escape famine?A) Irish immigrantsB) free African AmericansC) migrants from eastern United StatesD) immigrants from Mexico