Answer:
D
Explanation:
In general, a domain name identifies a network domain, or it represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet.
Which option offers predesigned formatting and design elements to facilitate the process of creating a document?
A.
themes
B.
templates
C.
design
D.
layout
Answer:
The answer is B, templates
Explanation:
Answer:
B. templates
Explanation:
Which of the following is not an operating system
A.LINUX
B.MAC OS
C.NEXUS
D.WINDOWS
Answer:
C
Explanation:
I hope this helped.
Answer:
I honestly don’t know... But I’m still gettin that credit Broski
Explanation:
How do you respect a person's gender identity? *
You call them exactly what they choose to be identified by it doesn't matter what gender they were born as if they want to be something else that is their choice and they may do as they like.
In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
100,000
1 billion
1 million
1000
Answer:
The correct answer is D) 1 Million
Explanation:
It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.
Cheers!
To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities and commitments. allow the same amount of time each day for studying. budget periods of time to study daily, even if it is interrupted.
Answer:
B) write down all activities and commitments
Explanation:
It seems the most logical.
Write down all activities and commitments.
What is Commitments?An planned schedule describing study periods and learning objectives is called a study plan.
College students should create a calendar that allots specific time each week for studying, much like with work or school schedules. The dates of the quizzes, tests, and exams should be included in this plan, as well as the due dates for the papers and projects.
It can be hard to manage your time. You most certainly have obligations outside of school, such as work, extracurricular activities, and social events.
Therefore, Write down all activities and commitments.
To learn more about commitments, refer to the link:
https://brainly.com/question/13864456
#SPJ6
Enhancing personal identity is often a factor in making a career choice
List inputs to a technological system
The seven inputs to a technological system are people, materials, tools and machines, energy, information, finances, and time.
what is the full form of flops
Answer:
Floating Point Operations Per Second (FLOPS)
Explanation:
Floating Point Operations Per Second (FLOPS) is a measure of a computer’s performance, especially in fields of scientific calculations that make heavy use of floating-point calculations. Floating-point operations include any operations that involve fractional numbers.
Answer:
Floating Point Operations Per Second
WILL GIVE BRAINLIEST!!!!!!!!
Trade-offs are the moral principles and values that guide conduct within a group of people.
Group of answer choices
True
False
yes trueso true true true
What is the origin of the name “breadboard”?
Answer:
Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.
(BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a reality?
Answer:
Internet of Vehicles (IoV) is a concept in intelligent transportation systems (ITS) in which vehicles with IoV will be able to communicate with each other and [ublic networks through V2I (vehicle-to-infrastructure), V2P (vehicle-to-pedestrian) interaction, and V2V (vehicle-to-vehicle).
There are some challenges that will need to be overcome in order for the Internet of Vehicles to become a reality:
IoV is unable to predict human behavior and body language of other drivers so it can be dangerous sometimes to take respective actions that a normal vehicle driver can do. Risk of security challenges and security attacks is one of the biggest challenges as the networks can be manipulated.People have lack of trust in IoV due to privacy and health concern.The initial cost of IoV is very high that only few rich people can buy it.What is the greatest common
factor of the following three
numbers?
12, 18, 32
Answer: 2
Explanation:
Which correctly lists the two elements that make up the empty space in the universe? ice and debris debris and dark matter dark matter and dark energy dark energy and dust
Answer:
The answer is "dark matter and dark energy and dust".
Explanation:
In the empty room, the universe is gases and ashes. Even though humans think the exterior universe's blank space is nothing more than empty. Fortunately, the plasma form of its hydrogen and helium gases, including the various types of dirt and debris, occupy this void vacuum. There are also several other materials however these greenhouse gases and dust particles are also the bulk of the material.
Answer:
c
Explanation:
Wi-fi works by converting data signals into which of the following?
Answer:
Radio waves
Explanation:
Wi-fi works by converting data signals into radio waves.
What is WI-Fi?Wi-Fi is a family of network protocols which is wireless based.
Wi-Fi are generally used for local area networking of devices and Internet access. It allows nearby digital devices to exchange data by the help of radio waves.
Hence, Wi-fi works by converting data signals into radio waves.
Learn more about Wi-Fi.
https://brainly.com/question/13267388
#SPJ2
15. The legal right to control the
production and selling of a book, play,
film and software is known as
A. Production right
B. Copyright
C. Trade mark
D. Patent
Answer:
I believe the answer is copyright
Explanation:
Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
destination. Other applications work fine. What might you suspect is happening?
a) The Network connection is broken
b) the network is experiencing latency
c) firewall is blocking that application
d)data loss is occurring due to network congestion
Answer:
Firewall is blocking that application.
Explanation:
i got it right on the test and i hope yall have a great day :3
Answer:
FIREWALL
Explanation
i did it on edj
A consumer is the name for:
A. A person who buys and uses products and services
B. A product or service that a person purchases.
C. The person who sells goods and services to others.
D. Goods and services sold via the internet.
Answer:
A. a person who buys and uses products and services
Which inventor developed a method through which groups of people, instead of just
individuals, could view films at the same time?
Al Jolson
Robert Paul
Edwin S. Porter
Thomas Edison
Answer:
Thomas Edition is the inventor developed a method through which groups of people instead of just individuals,could view films at the same time.
Hope it will help you
Answer:
B: Robert Paul
Explanation:
edg2021
It is not Thomas Edison. He created the Kinetoscope that allows for individuals to watch, "The British inventor, Robert William Paul, expanded on Edison’s Kinetoscope parlors with his film projector, enabling theaters to display movies for groups instead of individual viewing"
24. A key on a keyboard of a computer
has two symbols on it, top and down.
Which of the following procedures will be
appropriate to use to get the top key?
A. Hold down the Shift key and
press the identified
B. Hold down the Alt key and
press the identified key
C. Hold down the Ctrl key and
press the identified key
D. Hold down the Del key and
press the identified key
Answer:
Its A
Explanation:
.................
Nathan notices his computer System is slowing down when he tries to copy documents to it he also gets a prompt I warned him that the system is running low on storage space which hardware device should he consider upgrading in order to increase the system storage space?
Answer:Hard drive or Solid State drive
Explanation:
Conversion Practice: Find the equivalent binary or decimal numbers below. Binary Decimal Binary Decimal 100 5 101 17 1101 63 0001 1111 64 0010 0000 127 1010 1010 256 1111 1111 513
Explanation:
Binary --> Decimal
100 --> 4
101 --> 5
1101 --> 13
0001 1111 --> 31
0010 0000 --> 32
1010 1010 --> 170
1111 1111 --> 255
Binary <--> Decimal
101 <--> 5
0001 0001 <--> 17
0011 1111 <--> 63
0100 0000 <--> 64
0111 1111 <--> 127
0001 0000 0000 <--> 256
0010 0000 0001 <--> 513
Samantha was working on a Word document and the horizontal and vertical margins disappeared. Which solution will fix the problem? Close the Word document and reopen it. Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen. Double-click in the ruler area to redisplay the ruler. Click on the View Ruler button located at the top left-hand side of the screen that looks like an L.
Answer:
B
Explanation:
Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen is the solution will fix the problem. Hence, option B is correct.
What is MS Word DOC?Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional caliber. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.
Microsoft Word documents can be opened and edited in Docs. Even better, you may download your document as a Word document with a typical Word extension. But Docs also allows you to export other file types.
It is simple to modify huge sections of text, alter the flow between pages, change font sizes and styles, and perform other operations with Word and the DOC format.
Thus, option B is correct.
For more information about MS Word DOC, click here:
https://brainly.com/question/9174181
#SPJ2
Question #1
Multiple Select
Before you write a computer program, what can you use for planning? Select 2 options.
O pseudochart
O pseudocode
flowplan
flowcode
flowchart
Answer:
Pseudocode and flowchart.
Explanation:
I just got it correct.
PLEASE HELP!! Which of the following computing devices would best address the needs for a CYBER SECURITY ANALYST?
Answer:high end laptop.
Explanation:
Which step is done first to replace existing text in a text box?
•Select the text to be replaced.
•Type new text into the text box.
•Click and drag the text to replace.
•Click an area outside the text box.
The step is done first to replace existing text in a text box is to Select the text to be replaced.
What is a text box used for?A text box is known to be a tool or an object that a person can add to their document and it is the one that p[permits one to lets add type text anywhere in one's file.
Note that based on the above, The step is done first to replace existing text in a text box is to Select the text to be replaced.
Learn more about text box from
https://brainly.com/question/26372855
#SPJ1
Answer:
A. Select the text to be replaced.
Explanation:
hope this helps :)
When you perform a search, a general search engine searches the entire Internet.
A. True
B. False
Answer:
a
Explanation:
general search is a
advanced search is b
how many types of fundamental movement are there
Answer:
12
Explanation:
Which is true regarding pseudocode?
O It uses simple words and symbols to communicate the design of a program.
O It compiles and executes code.
O It expresses only complex processes.
O It gives a graphical representation of a set of instructions to solve a problem.
Answer:
The answer is A it uses simple words and symbols to communicate the design of a program.
Explanation:
Science Stuff
The true regarding pseudocode is it uses simple words and symbols to communicate the design of a program. The correct option is a.
What is pseudocode?Pseudocode is a simple language description of an algorithm or other system's processes used in computer science. Although pseudocode frequently employs standard programming language structure rules, it is written for humans rather than automated comprehension.
In the field of computer science, a pseudocode is a linguistic description of an algorithm's steps. They consist of text-based components and are simple. Informally expressing concepts and techniques during the development process is known as pseudocoding.
Therefore, the correct option is a, It uses simple words and symbols to communicate the design of a program.
To learn more about pseudocode, refer to the link:
https://brainly.com/question/17442954
#SPJ6
Multiple Choice
Which of the programs below will result in the following output?
Hours
8
85
10
Total
26.5
Answer:
print("Hours")
print(8)
print(8.5)
print(10)
print("Total")
print(8 + 8.5 + 10)Explanation:
Answer:
A
Explanation:
Ethernet network. Your job is to decode it and answer the below questions.
SEARCH: Hex to ASCII converter
Copy the code below and paste into the Hex Code section.
Copy the converted code and paste underneath where it says <Insert>
d4 a9 28 06 f0 43 50 7b 9d e4 db e1 08 00 45 00
03 2f 4b 9d 40 00 80 06 62 cc c0 a8 01 bb 83 f7
03 05 de 92 00 50 62 72 96 9e c8 61 7b 5f 50 18
01 00 c9 cf 00 00 47 45 54 20 2f 7e 6b 63 68 72
69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68 74
6d 6c 20 48 54 54 50 2f 31 2e 31 0d 0a 48 6f 73
74 3a 20 77 77 77 2e 63 73 65 65 2e 75 73 66 2e
65 64 75 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a
20 6b 65 65 70 2d 61 6c 69 76 65 0d 0a 43 61 63
68 65 2d 43 6f 6e 74 72 6f 6c 3a 20 6d 61 78 2d
61 67 65 3d 30 0d 0a 55 70 67 72 61 64 65 2d 49
6e 73 65 63 75 72 65 2d 52 65 71 75 65 73 74 73
3a 20 31 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a
20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69
6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57
69 6e 36 34 3b 20 78 36 34 29 20 41 70 70 6c 65
57 65 62 4b 69 74 2f 35 33 37 2e 33 36 20 28 4b
48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f
29 20 43 68 72 6f 6d 65 2f 36 38 2e 30 2e 33 34
34 30 2e 31 30 36 20 53 61 66 61 72 69 2f 35 33
37 2e 33 36 0d 0a 41 63 63 65 70 74 3a 20 74 65
78 74 2f 68 74 6d 6c 2c 61 70 70 6c 69 63 61 74
69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 2c 61 70
70 6c 69 63 61 74 69 6f 6e 2f 78 6d 6c 3b 71 3d
30 2e 39 2c 69 6d 61 67 65 2f 77 65 62 70 2c 69
6d 61 67 65 2f 61 70 6e 67 2c 2a 2f 2a 3b 71 3d
30 2e 38 0d 0a 41 63 63 65 70 74 2d 45 6e 63 6f
64 69 6e 67 3a 20 67 7a 69 70 2c 20 64 65 66 6c
61 74 65 0d 0a 41 63 63 65 70 74 2d 4c 61 6e 67
75 61 67 65 3a 20 65 6e 2d 55 53 2c 65 6e 3b 71
3d 30 2e 39 0d 0a 43 6f 6f 6b 69 65 3a 20 5f 5f
75 74 6d 61 3d 31 31 38 36 31 39 32 37 37 2e 31
37 34 32 37 37 36 38 33 30 2e 31 35 33 34 36 34
34 39 36 33 2e 31 35 33 34 36 34 34 39 36 33 2e
31 35 33 34 36 38 38 34 35 35 2e 32 3b 20 5f 5f
75 74 6d 7a 3d 31 31 38 36 31 39 32 37 37 2e 31
35 33 34 36 38 38 34 35 35 2e 32 2e 32 2e 75 74
6d 63 73 72 3d 63 73 65 65 2e 75 73 66 2e 65 64
75 7c 75 74 6d 63 63 6e 3d 28 72 65 66 65 72 72
61 6c 29 7c 75 74 6d 63 6d 64 3d 72 65 66 65 72
72 61 6c 7c 75 74 6d 63 63 74 3d 2f 7e 6b 63 68
72 69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68
74 6d 6c 3b 20 5f 5f 75 74 6d 74 3d 31 3b 20 5f
5f 75 74 6d 74 5f 61 63 63 6f 75 6e 74 32 3d 31
3b 20 5f 5f 75 74 6d 62 3d 31 31 38 36 31 39 32
37 37 2e 34 2e 31 30 2e 31 35 33 34 36 38 38 34
35 35 0d 0a 49 66 2d 4e 6f 6e 65 2d 4d 61 74 63
68 3a 20 22 31 37 61 39 2d 35 37 33 35 34 61 35
33 39 30 31 33 65 22 0d 0a 49 66 2d 4d 6f 64 69
66 69 65 64 2d 53 69 6e 63 65 3a 20 4d 6f 6e 2c
20 31 33 20 41 75 67 20 32 30 31 38 20 31 37 3a
34 34 3a 32 39 20 47 4d 54 0d 0a 0d 0a
<INSERT>
a) What is the Ethernet destination and source address (in hex)?
b) Identify the vendor of the equipment of the source?
c) What is the protocol type (in the Ethernet header)?
d) What version of IP is this?
e) What are the IP destination and source addresses (give in proper dotted decimal notation)?
f) Identify if the transport protocol is TCP or UDP.
g) What are the transport protocol destination and source port numbers (in decimal)?
h) What is the application protocol (be sure to give the version number)?
i) What is the function being performed at the application layer (that is, what is the purpose of
this packet)?
j) What are the checksum values for all protocols that have a checksum in this packet? Note
that a CRC is not a checksum.
ang gulo po pede po ba pa picture thank you po.