Explanation:
Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.
discuss five domains of Instructional technology
Answer:
Design, Development, Utilization, Management, and Evaluation.
PLS HELP SO I CAN PASS WILL GIVE BRAINLINESS AND 30 POINTS
Charlie Chaplin is know for developing
a
The Dramedy
b
Early Special Effects
c
Slap-Stick
d
The Prat-Fall
Question 2 (1 point)
Chaplin felt it was important for the audience to
a
turn off their cellphones during the movie.
b
believe the stunts were real by doing them himself.
c
escape from their problems by avoiding difficult topics.
d
have an emotional connection with the characters.
Question 3 (3 points)
Match the silent film with its modern influence
Column A
1.
Metropolis:
Metropolis
2.
The Kid:
The Kid
3.
Nosferatu:
Nosferatu
Column B
a.Freddy Kruger
b.The Simpsons
c.Sharknado
d.Star Wars
Question 4 (1 point)
How did Nosferatu change the Vampire cannon (story)?
a
Vampires are friendly
b
Vampires can be killed by sunlight
c
Vampires can become invisible
d
Vampires can be repelled by garlic
Question 5 (1 point)
Metropolis was the first film to
a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.
movies being the kid , nosferatu , and metropolis
Answer:
a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.
Explanation:
Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentations side by side? Which command allows a user to show one presentation overlapping another? Which command allows a user to jump from one presentation to another?
Answer:
Look at the attached file for the correct answer to this question on edge:
Explanation:
The command allows a user to jump from one presentation to another Switch windows.
What is Switch windows?Flip is similar to the Task view feature, although it operates somewhat differently. Click the Task view button in the taskbar's lower-left corner to launch Task view.
As an alternative, you can use your keyboard's Windows key and Tab. You can click on any open window to select it from a list of all your open windows.
It may be challenging to view the desktop if you have many windows open at once. When this occurs, you can minimize all currently open windows by clicking the taskbar's bottom-right corner. Simply click it once again to bring back the minimized windows.
Therefore, The command allows a user to jump from one presentation to another Switch windows.
To learn more about Windows, refer to the link:
https://brainly.com/question/13502522
#SPJ3
What methods do phishing and spoofing scammers use?
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information
Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.
Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).
Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).
On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses
Answer:
Explanation:
suna shahani kesa a ..
The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.
Required:
Develop a program to count the incoming votes at election central.
Answer:
Explanation:
The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.
precinct = input("Enter Precinct Number: ")
option1 = 0
option2 = 0
while True:
choice = input("Enter your vote 1 or 2: ")
if int(choice) == 1:
option1 += 1
else:
option2 += 1
endVote = input("Vote again y/n")
if endVote.lower() != 'y':
break
f = open("results.txt", "w")
f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))
Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks
Answer:
The answer is below
Explanation:
There are various methods of phishing and spoofing scammers use, some of which are:
Phishing:
1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details
2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim
3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.
Other phishing attacks are vishing, smishing, and pharming, etc.
Spoofing:
1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim
2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.
3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.
Others include website spoofing, text message spoofing, Io spoofing etc.
Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file
Answer:
The answer to this would be D: A music file
Explanation:
Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.
which software manages the functioning of the entire computer system
help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..
Answer:
if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus
Explanation:
what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term
I want to know the basic of Excel
Answer:
Use Pivot Tables to recognize and make sense of data.
Add more than one row or column.
Use filters to simplify your data.
Remove duplicate data points or sets.
Transpose rows into columns.
Split up text information between columns.
Use these formulas for simple calculations.
Get the average of numbers in your cells.
Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According to O*NET, what are common skills needed by Secondary School Special Education Teachers? Check all that apply.
instructing
installation
learning strategies
repairing
active listening
technology design
Answer:
A. Instucting C. Learning Strategies E. Active Listening
Explanation:
Got it right on assignment
SimpleScalar is an architectural simulator which enables a study of how different pro-cessor and memory system parameters affect performance and energy efficiency.
a. True
b. False
Answer:
a. True
Explanation:
SimpleScalar refers to a computer architectural simulating software application or program which was designed and developed by Todd Austin at the University of Wisconsin, Madison, United States of America. It is an open source simulator written with "C" programming language and it's used typically for modelling virtual computer systems having a central processing unit (CPU), memory system parameters (hierarchy), and cache.
The main purpose of SimpleScalar is to avail developers or manufacturers the ability to compare two computers based on their capacities (specifications) without physically building the two computers i.e using a simulation to show or illustrate that computer B is better than computer A, without necessarily having to physically build either of the two computers.
Hence, it is an architectural simulator which makes it possible to study how different central processing units (CPUs), memory hierarchy or system parameters and cache affect the performance and energy efficiency of a computer system.
Explain what an IM is, and what is the technology shown in the accompanying figure
Answer: Instant Message
Explanation:
Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz
Explanation:
Write a Python class that inputs a polynomial in standard algebraic notation and outputs the first derivative of that polynomial. Both the inputted polynomial and its derivative should be represented as strings.
Answer:Python code: This will work for equations that have "+" symbol .If you want to change the code to work for "-" also then change the code accordingly. import re def readEquation(eq): terms = eq.s
Explanation:
web analytics can tell you many things about your online performance, but what can analytics tools not tell you
Answer:
The answer is below
Explanation:
While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:
1. Web Analytics can’t accurately track leads
2. Web Analytics can’t track lead quality
3. Web Analytics can’t track the full customer journey
4. Web Analytics can’t highlight the true impact of payment.
State
any three (3) reasons why users attach speakers to their computer?
Answer:
To complete the computer setup, to hear audio, to share audio.
Explanation:
A computer is not really complete without speakers.
So that you can actually hear the computer's audio.
So that you can have multiple people hear the same audio. (Headphones do not do this)
PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
Select all benefits of using a wiki for business.
inexpensive
accessible twenty-four hours per day and seven days per week
online conversation
quick and easy editing
document sharing
Answer:
B, D, E is the answers I think
Answer:
Accessible twenty-four hours per day and seven days per week
Quick and easy sharing
Document sharing
Write a program named HoursAndMinutes that declares a minutes variable to represent minutes worked on a job, and assign a value to it. Display the value in hours and minutes. For example, 197 minutes becomes 3 hours and 17 minutes.'
Answer:
Explanation:
The following code is written in Python, it asks the user for the number of minutes worked. Divides that into hours and minutes, saves the values into separate variables, and then prints the correct statement using those values. Output can be seen in the attached image below.
import math
class HoursAndMinutes:
min = input("Enter number of minutes worked: ")
hours = math.floor(int(min) / 60)
minutes = (int(min) % 60)
print(str(hours) + " hours and " + str(minutes) + " minutes")
Write an application that combines several classes and interfaces.
Answer:
Explanation:
The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.
import java.util.Scanner;
interface Animal {
void animalSound(String sound);
void sleep(int time);
}
public class PetInformation {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
String petName, dogName;
String dogBreed = "null";
int petAge, dogAge;
Pet myPet = new Pet();
System.out.println("Enter Pet Name:");
petName = scnr.nextLine();
System.out.println("Enter Pet Age:");
petAge = scnr.nextInt();
Dog myDog = new Dog();
System.out.println("Enter Dog Name:");
dogName = scnr.next();
System.out.println("Enter Dog Age:");
dogAge = scnr.nextInt();
scnr.nextLine();
System.out.println("Enter Dog Breed:");
dogBreed = scnr.nextLine();
System.out.println(" ");
myPet.setName(petName);
myPet.setAge(petAge);
myPet.printInfo();
myDog.setName(dogName);
myDog.setAge(dogAge);
myDog.setBreed(dogBreed);
myDog.printInfo();
System.out.println(" Breed: " + myDog.getBreed());
}
}
class Pet implements Animal{
protected String petName;
protected int petAge;
public void setName(String userName) {
petName = userName;
}
public String getName() {
return petName;
}
public void setAge(int userAge) {
petAge = userAge;
}
public int getAge() {
return petAge;
}
public void printInfo() {
System.out.println("Pet Information: ");
System.out.println(" Name: " + petName);
System.out.println(" Age: " + petAge);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void animalSound(String sound) {
System.out.println(this.petName + " says: " + sound);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void sleep(int time) {
System.out.println(this.petName + " sleeps for " + time + "minutes");
}
}
class Dog extends Pet {
private String dogBreed;
public void setBreed(String userBreed) {
dogBreed = userBreed;
}
public String getBreed() {
return dogBreed;
}
}
How can the adoption of a data platform simplify data governance for an organization?
Answer:
by implementing models that predict compliance with data protection and data privacy policies.
Explanation:
A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .
A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.
You will write code to manipulate strings using pointers but without using the string handling functions in string.h. Do not include string.h in your code. You will not get any points unless you use pointers throughout both parts.
You will read in two strings from a file cp4in_1.txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i] = a[i], but rather *c *a is allowed. You will not get any points unless you use pointers.
Example:
Input file output file
ABCDE APBQCRDSETFG
PQRSTFG arrow abcdefghijklmnopgrstuvwxyz
acegikmoqsuwyz
bdfhjlnprtvx
Solution :
#include [tex]$< \text{stdio.h} >$[/tex]
#include [tex]$< \text{stdlib.h} >$[/tex]
int [tex]$\text{main}()$[/tex]
{
[tex]$\text{FILE}$[/tex] *fp;
[tex]$\text{fp}$[/tex]=fopen("cp4in_1.txt","r");
char ch;
//while(1)
//{
while(!feof(fp))
{
char *[tex]$\text{s1}$[/tex],*[tex]$\text{s2}$[/tex],*[tex]$\text{s3}$[/tex];
[tex]$\text{s1}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));
[tex]$\text{s2}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));
[tex]$\text{s3}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$40$[/tex] * [tex]$\text{sizeof}$[/tex](char));
[tex]$\text{int i}$[/tex]=0,j=0,x,y;
while(1)
{
ch=getc(fp);
if(ch=='\n')
break;
*(s1+i)=ch;
i++;
}
while(1)
{
ch=getc(fp);
if(ch=='\n')
break;
*(s2+j)=ch;
j++;
}
for(x=0;x<i;x++)
{
*(s3+x)=*(s1+x);
}
for(y=0;y<j;x++,y++)
{
*(s3+x)=*(s2+y);
}
for(x=0;x<i+j;x++)
{
printf("%c",*(s3+x));
}
printf("\n");
getc(fp);
}
}
Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.
Answer:
Explanation:
The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.
import java.util.Scanner;
class Brainly {
static int[] arr;
public static void main(String[] args) {
// Print Unsorted Array and Call Selection Sort and print
resetArray();
SelectionSorter(arr);
System.out.print("\nSelection Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Bubble Sort and print
System.out.println('\n');
resetArray();
BubbleSorter(arr);
System.out.print("\nBubble Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Insert Sort and print
System.out.println('\n');
resetArray();
InsertSorter(arr);
System.out.print("\nInsert Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void resetArray() {
arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};
System.out.print("Unsorted Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void SelectionSorter(int[] arr) {
for (int i = 0; i < arr.length - 1; i++) {
int index = i;
for (int j = i + 1; j < arr.length; j++) {
if (arr[j] < arr[index]) {
index = j;//searching for lowest index
}
}
int smallerNumber = arr[index];
arr[index] = arr[i];
arr[i] = smallerNumber;
}
}
static void BubbleSorter(int[] arr) {
int n = arr.length;
int temp = 0;
for (int i = 0; i < n; i++) {
for (int j = 1; j < (n - i); j++) {
if (arr[j - 1] > arr[j]) {
//swap elements
temp = arr[j - 1];
arr[j - 1] = arr[j];
arr[j] = temp;
}
}
}
}
public static void InsertSorter(int arr[]) {
int n = arr.length;
for (int j = 1; j < n; j++) {
int key = arr[j];
int i = j - 1;
while ((i > -1) && (arr[i] > key)) {
arr[i + 1] = arr[i];
i--;
}
arr[i + 1] = key;
}
}
}
Ten output devices you know
Which best describes the possible careers based on
these employers?
Yoshi worked in Logistics Planning and Management
Services, Dade worked in Sales and Service, Lani
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation, and Miki
worked in Transportation Operations.
Yoshi worked in Transportation Operations, Dade
worked in Logistics Planning and Management
Services, Lani worked in Sales and Service, and Miki
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation
Yoshi worked in Health, Safety, and Environmental
Management, Dade worked in Transportation
Operations, Lani worked in Facility and Mobile
Equipment Maintenance, and Miki worked in
Warehousing and Distribution Center Operations.
Answer:
It's c bodie I'm fr on this question rn lol
Answer:
the guy above is right, its c
Explanation:
edge 2021
d) State any three (3) reasons why users attach speakers to their computer?
Answer:
the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: Hope this helps!
4 reasons why users attach speakers
to their computers
Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: Hope this helps!
Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.
Solution :
class Account
[tex]$ \{ $[/tex]
public:
[tex]$\text{Account}()$[/tex];
double [tex]$\text{getBalance}$[/tex]();
void [tex]$\text{setBalance}$[/tex]();
[tex]$\text{bool withdraw}$[/tex](double bal);
[tex]$\text{private}:$[/tex]
double [tex]$\text{balance}$[/tex];
}:
[tex]$\text{Account}()$[/tex] {}
double [tex]$\text{getBalance}$[/tex]()
[tex]$ \{ $[/tex]
[tex]$\text{return balance}$[/tex];
}
void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])
[tex]$ \{ $[/tex]
this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];
}
[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])
[tex]$ \{ $[/tex]
if([tex]$\text{balance}$[/tex] >= bal)
[tex]$ \{ $[/tex]
[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;
[tex]$\text{return}$[/tex] true;
}
[tex]$\text{return}$[/tex] false;
}
}
why do we need to settle technology in business?
Answer:
Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.
a buffer storage that improve computer performance by reducing access time is