Answer:
Relay
Explanation:
They both perform similar functions in terms of control of voltage and current but the relay would be better because although it cannot produce a variable output like that of an amplifier, it has the capacity to isolate its input from its output.
Many people worry about what would happen if either the Internet or the World Wide Web went down (if they suffered a complete outage and were unreachable).
A) If the Internet went down, the World Wide Web would also go down, since the WWW relies on the Internet protocols.
B) If the World Wide Web went down, the Internet would also go down, since the Internet relies on the WWW protocols.
C) If elther the Internet or the World Wide Web go down, the other system will not necessarily go down as well, as they fully independent of each other.
D) If either the Internet or the World Wide Web go down both systems would have to go down together, since they are interdependent.
Answer:
The correct answer is A. If the Internet went down, the World Wide Web would also go down, since the WWW relies on the Internet protocols.
Explanation:
The Internet is a worldwide association of computer networks, the autonomous systems. It enables the use of Internet services such as WWW, e-mail, etc. Each computer can connect to any other computer, and the data exchange between the computers connected via the Internet takes place via the technically standardized Internet protocols.
The proliferation of the internet has led to extensive upheavals in many areas of life. It contributed to a surge in modernization in many areas of the economy as well as to the emergence of new branches of the economy and has led to a fundamental change in communication behavior and media use in both professional and private life. The cultural significance of this development is sometimes equated with the invention of the printing press.
Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Which of the following is the best approach she could take?
a.
She could begin with a funny story about her adventures as a young girl digging up worms with her father and all the wonderful things he taught her about gardening.
b.
She could give a lengthy and detailed lecture about all the major gardening techniques and show several graphs demonstrating the benefits of cultivating earthworms.
c.
She could bring in actual worms for the audience to handle and observe, and actual soil samples for them to touch and smell.
d.
Both a. and c. would be effective approaches for Sharon to take.
Answer:
D
Explanation:
edg2021
The best approach in the above scenario is to follow both option a. and c. as it would be the effective approaches for Sharon to take.
What is vital in a presentation?For one to be able to get the attention of the audience, the right thing to do is to have a good body language in any presentation.
Conclusively, Sharon could start with a funny story about her adventures as a young girl digging up worms with her father and all the wonderful things he taught her about gardening.
Learn more about presentation from
https://brainly.com/question/24653274
#SPJ2
Write a python program that asks the user for two numbers. Using a for loop, add all of the numbers from the first to the second.
For example if the first number is 6 and the second number is 8 the result is 21 (6 + 7 + 8).
Print out the results when you are finished.
I included my code in the picture below.
Situation No. 1. Joey is about
to start working on his
experiment about plant cell
using a compound
microscope. He noticed that
one of the objective lens is
missing and the course
adjustment knob is not
working. The eyepiece lens is
also broken. *
Answer:
Explanation:
From the above explanation;
The main purpose of the objective lenses is to bring together the light from the specimen and then makes it appear larger by projecting it in the body tube.
Also, the coarse adjustment knob which can be found at the arm of the microscope is usually being used to transport the specimen into focus.
The eyepiece is an opening where the viewer perceives or observe the specimen. It comprises of 10X or 15X power lens.
So; since one of the objective lenses is missing, the coarse adjustment knob not working and the eyepiece lens is also broken. It is advisable to switch to the low power of about 10X and use a fine adjustment knob for the image focus.
Samuel was hired to create a program that asks the user questions and, based on the answers, recommend a book to read. What kind of program should Samuel create? O A. sequential OB. iterative O C. selection OD. syntax
Answer:
I think the answer is C
Explanation:
Selection
Answer:
c selection
Explanation:
Because after a series of questions, the code or program will create a selection of what book to recomend
Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)
Answer:
D
Explanation:
Based on the information given, the correct option will be:
D. findMin(-1,1)findMin(1,-1)
findMin(1,1)
It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.
In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.
In conclusion, the correct option is D.
Learn more coding on:
https://brainly.com/question/22654163
Hajar needs to copy files on a Linux system. What command can she use to create a new copy of a file in a different location while preserving the original file
Answer:
cp command
Explanation:
When copying files and directories under a Linux operating systems, we usually make use of the cp command . In Linux, this cp command is the one that is entered in a shell to copy a file from one location to another, and also possibly on another different file system.
at least 20 characters
Answer:
eh?
Explanation:
eh?
explain the digitization process
Answer:
Digitization is the process of converting information into a digital (i.e. computer-readable) format. The result is the representation of an object, image, sound, document or signal (usually an analog signal) by generating a series of numbers that describe a discrete set of points or samples
Explanation:
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the actions are listed below. Match the violation with the corrective action Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once.
a. Sets invalid foreign keys to a default primary key value, specified in SQL
b. Propagates primary key changes to foreign keys
c. Rejects an insert, update, or delete
d. Sets invalid foreign keys to NULL
1. Restrict
2. Set Null
3. Set Default
4. Cascade
Answer:
Follows are the matching to this question:
[tex]Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\[/tex]
Explanation:
While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.
write a program to QBASIC to display the first 10 numbers of fibonacci series
Answer:
FIB = 0
FNEXT = 1
FOR I=1 TO 10
PRINT FIB
TEMP = FNEXT
FNEXT = FIB + FNEXT
FIB = TEMP
NEXT I
Explanation:
The Fibonacci Sequence is: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89…
We're printing only the first 10 numbers.
One of the keys to using the FMEA method is to: Select one: a. have the 5S system in place b. have the seven basic tools of quality management completed c. have a cross-functional, multidisciplinary team d. have only common-cause variations
Answer:
c. have a cross-functional, multidisciplinary team
Explanation:
Failure Mode and Effects Analysis is a method developed and used by companies to evaluate their products to ensure that they are up to standard before releasing them to the customers. There are seven steps to setting up an FMEA.
One of the key steps in this process is assembling the FMEA team. There should be a cross-functional, multidisciplinary team that can accurately evaluate the process. They would evaluate past mistakes and draw up a pre-work checklist that would be used for evaluation. This is better than allowing one individual perform the analysis because many things might go unnoticed.
Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
Print each roll on its own line.
import random
for x in range(100):
print(random.randint(1,6))
I wrote my code in python 3.8. I hope this helps.
Of the following choices, which one is a type of firewall actively maintaining awareness of the status conversations between internal and external hosts? Explain.
A) Stateful Firewall.
B) Non-Passive Firewall.
C) Active State Firewall.
D) Stateless Firewall.
E) None of the above
Answer:
A) Stateful Firewall.
Explanation:
A stateful firewall actively inspects the conditions and integrity of active connections. It is always in an active and standby mode to holistically evaluate the conditions of active network conditions.
Network traffics that pass their evaluation can have access to the protected network whereas traffics that do not pass their evaluation are blocked. A disadvantage of this firewall is that it can slow the activity of the local network because of all the monitoring it has to perform.
Answer:
The correct answer is A)
Explanation:
A firewall in the computer science parlance refers to a program that is designed specifically to monitor the inflow and outflow of connectivity traffic. By a predetermined set of rules, it is able to block unwanted connections, suspicious and or malicious connections thus preventing the computer from external attack.
As indicated in the question, there are various types of firewalls.
A Stateful Firewall is one that checks the complete state of network connections. This includes all communication between all incoming connections and internal protocol. So all incoming traffic is first screened and if they demonstrate any semblance of a malicious program or traffic, they are terminated at source.
Cheers