Answer:
Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.
Explanation:
- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.
Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do?
Answer:
Remove the tuner board from the expansion slot. That way he can't use it to watch TV and you likely will eliminate the source of BSODs.
If you want to be sure that the tuner board is the cause of BSODs, check the stop code on the BSOD, or debug the minidump file that is auto generated by Windows whenever it crashes. Or, if you configure windows for a full memory dump, you can wait for another crash and then analyze the full dump instead.
Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.
Answer:
Parent
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.
In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:
Answer:
Software piracy.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.
Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).
Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
What is the error in the following line: (1)
age=int(input("Enter your age:")
Answer:
14
Explanation:
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?
A)Altered
B)Variable
C)Authentic
D)Player Adjusted
Answer: D. Player Adjusted
Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.
Have a nice day!
(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.
Answer:
a) SELECT No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';
b) SELECT branchname, No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe'
GROUP BY branchname;
c) SELECT Name
FROM borrowers B
WHERE cardno NOT IN ( SELECT cardno FROM book_loan)
d) SELECT title, name, B.address
FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)
WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';
e) SELECT title, No_of_copies
FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)
WHERE authorname = 'Stephen King' AND branchname = 'Central';
g) SELECT DISTINCT title
FROM ((book JOIN book_copies) JOIN library_branch)
Explanation:
The SQL statements query's a book store database of seven relations using joins and subqueries to return results.
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
…….. and ……...are called binary digits. (Computer Science)
Answer:
Explanation:
0 and 1 are called binary digits.
here is your answer..
The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register
Answer:
b. Memory-Management Unit
Explanation:
The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.
How will future space flights be different for NASA?
Answer:
Explanation:
NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.
Answer:
NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...
Explanation:
NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth
Answer: B. Higher Bandwidth
write a program to calculate the area of rectangle
Answer:
program by LET statement
Explanation:
CLS
REM to find the area of rectangle
LET L=40
LET B=20
LET AOR=L*B
PRINT "AOR=";AOR
END
Press F5
output
AOR=800
When attaching a file or files in outlook 365 you select the attach command and then select the files location
Answer:
When you click the attachment button a window pops up allowing you to select the file/s you want to upload
You can also drag and drop file/s this is an alternative method
Explanation:
Microsoft Outlook is a personal information manager software system from Microsoft.
Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia
You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location
Answer: Windows Configuration Designer (WCD)
Explanation:
The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).
Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.
What is the definition of WLAN
Explanation:
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.
stay safe healthy and happy.Select the correct answer.
Dina created a database related to essential oils and their uses. For every oil, she wants to enter a unique code number. Which data type would be suitable for entering this data?
A.
Boolean
B.
autonumber
C.
BLOb
D.
memo
E.
null
Answer:
Autonumber
This is because Autonumber is the only option out of the four that accepts random unique code numbers
Feel free to mark as brainliest :D
What is one similarity between compiled and interpreted programming languages? (5 points)
Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.
Both compiled and interpreted languages can be shared with others while keeping the source code private.
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
There are no similarities between compiled and interpreted programming languages.
Answer:
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
Explanation:
The one similarity between compiled and interpreted languages is that they are both high-level languages.
A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.
A high-level language can either be interpreted or compiled.
An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.
So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.
Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
Match the elements used in web searches to their functions.
1. row
2. column
3. cell
4. worksheet
where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells
Answer:
where data and formulas can be entered - Cells
A grid of rows and columns - Worksheet
A horizontal set of cells - Row
A vertical set of cells - Column
Explanation:
I got it right on the Edmentum test.
What do you use the Pygame library for?
Answer:
Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.
Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression
feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends
PLEASE HELP !!!! 40 POINTS BUT HELP
Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]
Answer:
So in a way it is about a python calculation
what is file management?can please help me
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices
Answer: implicit
Explanation:
When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.
Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
a) Realiza un esquema en planta del mecanismo.
b) Calcula n2 n3, n4. y la relación de transmisión.
c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
Answer:
a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4
z1 = 10 z2 = 20 z3 =10 z4 = 20
b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm
la relacion de transmision = 2
Explanation:
where z1 = 10, z2 = 20, z3 = 10, z4 = 20
and n1 = 1200 rpm
n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm
n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm
n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm
la relacion de transmision = z2/z1 * z3/z2 * z4/z3
= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2
What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit
Answer:
it's D
Explanation: i had this question before and i got it right :)
Answer:
D. An initial deposit
Explanation: Hope this helps :)