Light pen is the answer to the question.
This device is an input device that is used on the computer. It is a light sensitive device that can select written words on the computer, it can draw and can also interact with other elements on the computer screen.
It is simply like the mouse. It performs similar operations like the computer mouse. It contains a photocell and a an optical cell that is placed in an object that resembles a pen.
Read more at https://brainly.com/question/13787883?referrer=searchResults
Need the answer ASAP plz!!!!!!!!
Select the correct answer.
What model defines data structures and expands software architecture and components?
O A.
architectural design model
OB.
data design model
O C.
interface design model
OD.
component-level design model
2.
Solve each equation.
a)
3n - 8 = 2n + 2
b)
4n + 75 = 5n + 50
Answer:
A) n=10
B) n=25
Explanation:
Mind marking me brainliest?
(50 POINTS)Look at the code in the example below, and then answer the question.
In the example code, what does the title attribute create?
a tool tip
an element
a source
a markup
Answer:
I think it is:
B. An ElementExplanation:
Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?
Answer:
8
Explanation:
In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.
Answer:
make the top answer brainly
Explanation:
Fill in the blank: A keyword set to ______ match type will display your ad when the search term contains any or some combination or variations of the words in your keyword, in any order.
Answer:
broad
Explanation:
A keyword set to broad match type will display your ad when the search term contains any or some combination or variations of the words in your keyword, in any order
edhesive assignment 2: room area?
Explanation:
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')
print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
What is program?The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked
The calendar program
The calendar program in Python, where comments are used to explain each line is as follows:
#This checks for leap year
def leap_year(y):
if y % 4 == 0:
return 1 else return 0
#This returns the number of days in the month
def number_of_days(m,y):
if m == 2:
return 28 + leap_year(y)
elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:
return 31
elif m == 4 or m == 6 or m == 9 or m == 11:
return 30
#This returns the number of days left in the month
def days(m,d):
dayList = [0,31,59,90,120,151,181,212,243,273,304,334]
return dayList[m-1] + d
#This returns the number of days left in the year
def days_left(d,m,y):
if days(m,d) <= 60:
return 365 - days(m,d) + leap_year(y) else:
return 365 - days(m,d)
#The main begins here
#This next three lines gets input for date
day=int(input("Day: "))
month=int(input("Month: "))
year=int(input("Year: "))
#This gets the choice from the user
menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))
#This prints the number of days in the month
if menu == 1:
print(number_of_days(month, year))
#This prints the number of days left in the year
elif menu == 2:
print(days_left(day,month,year))
Read more about Python functions at:
brainly.com/question/14284563
#SPJ7
The complete part of the question will be:
Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.
explain what the hexadecimal code in a MAC address represents
Answer:
An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.
highlight the possible risks and problems that should be address during the implementation of information system process
Answer:
The answer is below
Explanation:
The possible risks and problems that should be addressed during the implementation of the information system process are:
1. power loss or data corruption
2. System design faults
3. Cultural barriers
4. Integration of Software Development device
5. Using the same processes in the company
6. Security breaches
7. Hardware and Software failure
8. Work environment
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engineer utilize in an attempt to find the origin of the malware
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution
Can anyone can tell me the full form of CRT
Answer:
[tex]\huge\colorbox{pink}{✏﹏ \: CRT \: }[/tex]
✏ CRT stands for Cathode Ray Tube.
Answer:
CRT stands for; CATHODE RAY TUBE
Match the organelles to their functions.
Golgi apparatus
lysosome
smooth endoplasmic reticulum
nucleus
produces lipids and fats
arrowRight
produces lysosomes
arrowRight
digests foreign material
arrowRight
commands other organelles
arrowRight
Answer:
I. Smooth endoplasmic reticulum.
II. Golgi apparatus.
III. Lysosomes.
IV. Nucleus.
Explanation:
A cell can be defined as the fundamental or basic functional, structural and smallest unit of life for all living organisms. Some living organisms are unicellular while others are multicellular in nature.
A unicellular organism refers to a living organism that possess a single-cell while a multicellular organism has many (multiple) cells.
Generally, cells have the ability to independently replicate themselves. In a cell, the "workers" that perform various functions or tasks for the survival of the living organism are referred to as organelles.
Some examples of cell organelles with their respective functions in all living organisms such as trees, birds, and bacteria include;
1. Nucleus : it controls all the activities taking place in the cell and the synthesis of proteins. Thus, it's the organelle that commands other organelles.
2. Mitochondria : it provides all the energy required in the cell by transforming energy forms.
3. Lysosomes : they are responsible for absorbing materials and breaking the materials taken in by the cells. Thus, it digests foreign material.
4. Chromosomes : they give sets of instructions for the synthesis of products.
5. Ribosomes : they are involved in the build up of proteins.
6. Smooth Endoplasmic Reticulum : this is where the ribosomes perform their tasks. Thus, it produces lipids and fats.
7. Cytoskeleton : they help to maintain and support the shape of the cells.
8. Vesicles : they ensure proteins are properly transported to the right and exact location.
9. Golgi apparatus : it prepares the protein for export by chemically tagging them. Also, this organelle produces lysosomes.
10. Cell membrane : is the wall of the cell and typically controls what leaves and enters the cell.
Answer:
Golgi Apparatus matched to lysosomes
Lysosomes matched to digesting foreign material
smooth endoplasmic reticulum matched to produces lipids and fats
Nucleus matched to commands other organelles
Explanation:
The golgi apparatus produces the lysosomes
the lysosomes are in the cell to digest things to smaller and more usable for the cell
the smooth endoplasmic reticulum produces the lipids and fats
the nucleus is the biggest organelle in a cell and commands every other organelle. It also has the DNA of the cell.
I hope I was helpful!
Have a good day.
In what way do graphs and charts help in decision-making? Select the most important point.
A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.
A scale drawing that uses standardized terms, abbreviations, symbols and practices to show an object precisely
Answer:
Detail drawing
Explanation:
Detail drawing is a form of technical drawing often used in architecture and engineering design. It is well scaled and uses standardized terms, abbreviations, symbols, and practices to show an object precisely. Both engineers and architects use it. It is also part of assembly drawings that are used during the actual construction of structures. Detail drawings are produced on standard paper sizes, and it contains the following:
2. Engineer or Architect's name
2. Part of the structure's name
3. Material type for the structure
4. Drawing scale
5. Date of the drawing
6. Structural views, such as front, back, or side elevations.
7. isometric view
8. The dimensions used, including sizes
9. All dimension tolerances applicable
Pleaseeee hellppp!!!!!
Answer:
credit card info and delivery address
Explanation:
Drag the tiles to the correct boxes to complete the pairs.
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program does. Help
George by matching the software to their purposes.
Adobe InDesign
Microsoft Word
Adobe Photoshop
Quark QuarkXPress
creating and editing images
creating and editing page layouts
creating and editing text documents
Answer:
I just answered this today (5/11/2022) and these are the correct answers.
creating and editing images Adobe Photoshop
creating and editing page layouts Quark QuarkXPress
creating and editing text docs Microsoft Word
desktop publishing Adobe InDesign
Explanation:
Which one is not considered part of the cinematography team?
cinematographer
sound recorder
director of photography
camera operator
sound recorder
Explanation:
i hope it works
Debug the following program.
REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS
A=2
B=3
For I=1 to 10
Display A; B;
A=A+B
B=A+B
NEXT X
END
Answer:
The debugged program is as follows:
A=2
B=2
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
END
Explanation:
First, the value of B should be changed to 4 (because the second term of the sequence is 2
Next, change Display to Print because Q-basic uses the print keyword to display output
The sequence is not properly generated. So, I update that part of the program to:
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
Lastly, the loop is controlled by variable I (not X).
So change NEXT X to NEXT I
Which statement best describes a database?
Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.
I think it's a. A collection of related tables
In this last step of initiation phase, projects are (blank). At this stage, the project is (blank) with projects that are running.
Answer:
Approved; compared.
Explanation:
Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.
Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement the project plan.
Furthermore, the main purpose of project management is working toward a common goal.
This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.
The fundamentals of Project Management includes;
1. Project initiation
2. Project planning
3. Project execution
4. Monitoring and controlling of the project.
5. Adapting and closure of project.
In the last step of an initiation phase, projects are approved for execution. Also, at this stage, the project is compared with projects that are running or already being executed.
In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.
Steven wrote an algorithm for his coding class that explains how he makes toast. Which is the correct sequence of steps that he used?
Get out the bread, put butter on bread, place in the toaster
Get out the bread, place in the toaster, put butter on bread
Place in the toaster, get out the bread, put butter on bread
Place in the toaster, put butter on bread, get out the bread
Answer:
B
Explanation:
Answer:
answer b
Explanation:
because its the most descriptive :)
write the steps how to insert an online images
Answer:
There are many ways but this way is to upload a pick from desktop to ur doccument ( TAE IS MY BIAS, STREAM BUTTER BBG)
Explanation:
0) Well obv u have to download a pick
1) Click in your where you want to insert your picture.
2) Click the Insert tab.
3) pick the picture you want to insert and select it.
4)Click Insert button
Can someone plz help me answer my questions!!!!!!!!!!!
Answer:
what is your question
where is it at?
Which of the following is the file type of Microsoft® Publisher files?
.txt
.doc
.pub
.xlsx
Answer:
Which of the following is the file type of Microsoft® Publisher files?:
.pub
.pub is the file type of Microsoft® Publisher files.
What is Publisher Files?If an email contains a Publisher (.pub) file that you are unable to access, you can download the most recent Office trial, which includes Publisher 2013.
You may discover more about how Publisher can assist you in producing publications that appear professional with the trial version.
Although if you are no longer able to produce or modify publications, you can still use the trial version as a viewer for Publisher files once it expires.
Therefore, .pub is the file type of Microsoft® Publisher files.
To learn more about Publisher files, refer to the link:
https://brainly.com/question/17154296
#SPJ2
How do we calculate the BMI in python?
the formula is kg/m²
Answer:
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Explanation:
The python code for calculating BMI is as follows -
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Some conditions can also be added such as
if BMI <= 15:
print("You are underweight.")
elif BMI <= 30:
print("You are healthy.")
elif BMI <= 40:
print("You are over weight.")
1. How does a cellular network work?
In a cellular system, as the distributed mobile transceivers move from cell to cell during an ongoing continuous communication, switching from one cell frequency to a different cell frequency is done electronically without interruption and without a base station operator or manual switching.
which is the first mobile phone? when and who invented it?
Answer:
The first handheld cellular mobile phone was demonstrated by John F. Mitchell and Martin Cooper of Motorola in 1973, using a handset weighing 2 kilograms (4.4 lb). The first commercial automated cellular network (1G) analog was launched in Japan by Nippon Telegraph and Telephone in 1979.
Inventor: Martin Cooper
mark me brainliestt :))
Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Reesa is employed as a __________.
Answer:
System Administrator
Explanation:
A System Administrator is the individual who specifically handles the administrative functions of the IT department in an organization. The personnel is also responsible to administer, maintain, configure and upkeep the security of the computers.
In the given situation, Reesa is provided with the job responsibility of installing and maintaining the internet system in the company. The job specifications that are entitled to Reesa is of the System Administrator.
Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints a single line consisting of 5 periods (terminated by a new line character) .
Answer:
See the short code Below
Explanation:
Let us implement the code with Python programming language
def printDottedLine ():
print("..... "\n) # this line will print 5 dots
Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming
Answer:
E. modular programming
Explanation:
Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Protect system access of users.
Do no harm to a company when leaving.
Be fair and honest with customers.
Answer:
"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"
A: Respect confidentiality of data
Explanation:
correct on Edg
Answer:
Respect confidentiality of data.
And
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Explanation: