Answer:
D
Explanation:
Any of these is an example, but the most drastic would be D, Avoiding local friends in order to play online games
pls help me pass my finals!!
Answer:
(a): power(2&-2)
The code is as follows:
power = 2**-2
print(power)
(b): Largest and smallest in a list
The code is as follows:
num = [33,6,11,100,456,109,-4,366]
smallest= min(num)
largest= max(num)
print(smallest)
print(largest)
(c): Loop in Python
(i) Loop are instructions that are repeated until a certain condition is met;
(ii) For loop, in python are used to iterate over a sequence or through a certain range;
The syntax is:
for loop_element in range(iterating_range):
The following is an illustration of for loop that iterates 5 times
for i in range(5):
Explanation:
(a): power(2&-2)
The ** is used to calculate power.
So, 2**-2 represents 2 raise to power -2
power = 2**-2
This prints the calculated power
print(power)
(b): Largest and smallest in a list
This initializes the list
num = [33,6,11,100,456,109,-4,366]
This calculates the smallest using min() function
smallest= min(num)
This calculates the largest using max() function
largest= max(num)
This prints the smallest and the largest
print(smallest)
print(largest)
(c): See answer section
Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems
2. Cloud9 Analytics - manages the warehouse separately from the solutions
3. CVM Solutions - Enables users to "clean" supplier information and to centralize and standardize information
4. Exoprise Systems - It avoid use of complex database and Web servers
5. GageIn - It uses Networking and social tools to connect users and facilitate communications
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
Select the correct answer.
Dina created a database related to essential oils and their uses. For every oil, she wants to enter a unique code number. Which data type would be suitable for entering this data?
A.
Boolean
B.
autonumber
C.
BLOb
D.
memo
E.
null
Answer:
Autonumber
This is because Autonumber is the only option out of the four that accepts random unique code numbers
Feel free to mark as brainliest :D
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.
Answer:
1) Yes, Publisher relation should have a publisherID primary key.
2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.
Explanation:
The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.
Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?
budgeting
scientific analysis
creating presentations
number formatting
computer programming
Answer:
number formatting,
scientific analysis computer programming
Answer number formatting,
scientific analysis computer programming
Explanation: its right
which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive
Answer:
microphone
Explanation:
when you are using a microphone once it stop it done
How will future space flights be different for NASA?
Answer:
Explanation:
NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.
Answer:
NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...
Explanation:
NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.
Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday
Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard
Answer:
Your answer is D Storyboard
Explanation:
Storyboarding is a process where you plan how things will look on your website just as described.
Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.
Answer: destination unreachable
time exceeded
Explanation:
You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.
The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:
• destination unreachable
• time exceeded
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
a) Realiza un esquema en planta del mecanismo.
b) Calcula n2 n3, n4. y la relación de transmisión.
c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
Answer:
a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4
z1 = 10 z2 = 20 z3 =10 z4 = 20
b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm
la relacion de transmision = 2
Explanation:
where z1 = 10, z2 = 20, z3 = 10, z4 = 20
and n1 = 1200 rpm
n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm
n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm
n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm
la relacion de transmision = z2/z1 * z3/z2 * z4/z3
= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2
what is the correct way to write h1 tag
Answer:
[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]
Explanation:
The h1 tag in HTML is used to create title-like text.
HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.
Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.
Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.
<h1> Hello there! </h1>
The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.
Hope this helped!
Arrange the code so that the numbers are swapped.
Second part
savec
First part
C=D
Third part
D= save
Answer:
Following are the correct code for swapping:
save=C
C=D
D=save
Explanation:
Please find the attached file of the program with output.
In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.
At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.
Match the elements used in web searches to their functions.
1. row
2. column
3. cell
4. worksheet
where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells
Answer:
where data and formulas can be entered - Cells
A grid of rows and columns - Worksheet
A horizontal set of cells - Row
A vertical set of cells - Column
Explanation:
I got it right on the Edmentum test.
What will the computer do in response to a line of code reading # name = input("What is your name?")
Answer:
it would show What is your name? on the screen and you would be able to input your name
Explanation:
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
drive
eN
n
Complete the following calculations in your workbook.
What mechanical advantage does a hydraulic press have when punching
holes in a metal sheet with a force of 800 N using only 200 N? Provide your
answer as a ratio.
(3)
06 2. A hydraulic press has an input piston radius of 0,5 mm. It is linked to
an output piston that is three times that size. What mechanical advantage
does this press have?
(9)
3. A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N,
what effort is required to lift the weight? Provide your answer in newtons. (4)
4. Your deodorant sprays with a force of 15 N. What mechanical advantage is
achieved if your finger presses the deodorant nozzle with a force of 60 N?
Explain your answer.
(4)
[TOTAL: 20
Answer:
uses goodgle
Explanation:
A swimmer covers 180m in 20 seconds. How many metres does she swim in one second?
Answer:
9 meters per second
Explanation:
180/20= 9
A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices
Answer:
Private.
Explanation:
The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.
Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.
Thus, a private cloud is a correct answer.
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files
Answer:
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.
in python write a code to find power (2 & -2)
Explanation:
b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments
When using the “rule of thirds,” where should focal points be placed?
Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.
Have a nice day!
One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.
Answer:
connectionist
Explanation:
One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.
Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression
feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends
RELIGION QUESTION
What is the meaning of prayers of adoration and thanksgiving:
Answer:
prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration
Explanation:
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.
Answer:
Premises
On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.
Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using
Answer:
breakpoints.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Debugging and maintenance.
In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.
Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.
At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.
Answer:
C for Edge
Explanation: