(21 POINTS) EASY QUESTION PLEASE ANSWER I NEED YOU TO ANSWER ASAP IT IS VERY IMPORTANT SOMEONE PLEASE ANSWER THIS QUESTION!!!
We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
We've known each other for so long
Your heart's been aching but you're too shy to say it
Inside we both know what's been going on
We know the game and we're gonna play it
And if you ask me how I'm feeling
Don't tell me you're too blind to see
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give, never gonna give
(Give you up)
(Ooh) Never gonna give, never gonna give
(Give you up)
We've known each other for so long
Your heart's been aching but you're too shy to say it
Inside we both know what's been going on
We know the game and we're gonna play it
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry

Answers

Answer 1
Never gonna make you say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you

Related Questions

When comparison shopping, all of these hint at a good deal EXCEPT_____________________.

Answers

Answer:

lower-priced models offer more features

Explanation:

The devices that can read, write, and erase data are called _________. Select your answer, then click Done.

Answers

The devices that can read, write, and erase data are called drives

One problem with _______ is that often many copies of the same document are made.

HELPPP ​

One problem with _______ is that often many copies of the same document are made. HELPPP

Answers

Answer:

computer or internet is that often many copies of the same document .........

Select the correct answer.
Ben wants to keep similar items close to each other in the image he is working on. Which is the most effective technique for applying the gestalt
concept of proximity?
The BLANK technique is the most effective technique for applying the gestalt concept of proximity.

Answers

Gestalt Principles are principles/laws of human perception that describe how humans group similar elements, recognize patterns and simplify complex images when we perceive objects.

What are the Gestalt Principles?

The tendency to view items as belonging to the same grouping when they are close to one another is known as the gestalt principle of

proximity

. It claims that regardless of how different the forms and sizes are from one another, if shapes are close to one another, you will perceive them as groups. One of Gestalt's principles, the concept of closeness focuses on how each stimulus would be seen in its most basic form. The

Law of Simplicity

or the Law of Pragnanz are other names for it. It is founded on the idea that the sum of a thing is worth more than the sum of its components.

To learn more about Gestalt Principles refers to;

https://brainly.com/question/4734596

#SPJ1

which of the following is not a component of URL; a. web protocol b. name of browser c. name of web server d. name of the file with the directory​

Answers

The component of URL that is not listed correctly is b. name of browser. The components of a URL (Uniform Resource Locator) are:

a. Web protocol: specifies the protocol used to access the resource, such as HTTP or HTTPS.

b. Domain name or IP address of the web server: identifies the location of the server hosting the resource.

c. Path to the resource: specifies the location of the specific resource on the server, including the name of the file and any directories or subdirectories.

d. Query parameters (optional): additional information that is sent to the server to help retrieve or filter the resource.

The name of the browser is not a component of the URL itself, but rather a software application that is used to access the URL.

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answers

Answer:

Me

Press the Windows key and Print Screen at the same time to capture the entire screen. Your screen will dim for a moment to indicate a successful snapshot. Open an image editing program (Microsoft Paint, GIMP, Photoshop, and PaintShop Pro will all work). Open a new image and press CTRL + V to paste the screenshot.

Explanation:

You need press this button for take a capture

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answer:

Use the keys win + shift + s

If that doesnt work than I don't know what will

What is a variable in programming?
1) A symbol or set of characters in a programming statement whose value can
be changed
2) A symbol in a mathematical equation
3) The characters that make up a string
4) The output when code is printed

Answers

A symbol or set of characters in a programming statement whose value can be changed

help please and thank you :)

help please and thank you :)

Answers

Answer:First one net is the answer ........

The is_palindrome function checks if a string is a palindrome. A palindrome is a string that can be equally read from left to right or right to left, omitting blank spaces, and ignoring capitalization. Examples of palindromes are words like kayak and radar, and phrases like "Never Odd or Even". Fill in the blanks in this function to return True if the passed string is a palindrome, False if not.
def is_palindrome(input_string):
# We'll create two strings, to compare them
new_string = input_string.replace(" ", "").lower()
reverse_string = input_string.replace(" ",""). lower()[::-1]
if new_string == reverse_string:
return True
return False
----------------------------
print(is_palindrome("Never Odd or Even")) # Should be True
print(is_palindrome("abc")) # Should be False
print(is_palindrome("kayak")) # Should be True

Answers

The given code already checks whether the passed string is a palindrome or not. It first removes all the blank spaces from the input string using the replace() function and converts it into lowercase using lower() function.

Then, it creates a reversed string using slicing with [::-1] and compares it with the original string. If they are the same, it returns True, otherwise False.  The given function named is_palindrome(input_string) takes one parameter, which is the input string that needs to be checked for being a palindrome or not. A palindrome is a string that can be read the same way from both ends, and this function checks for the same by comparing the input string with its reverse string.
To compare both strings, the function first removes all the blank spaces from the input string using the replace() function. Then, it converts both the input string and the reversed string into lowercase using lower() function, so that case doesn't affect the comparison. Finally, it creates the reversed string using slicing with [::-1]. This slicing operation means that it starts at the last character of the string and moves backwards towards the first character, with a step size of -1, thus reversing the string.

After creating both the strings, the function compares them using the equality operator (==). If both the strings are the same, it means that the input string is a palindrome, and the function returns True. Otherwise, if they are not equal, it returns False, indicating that the input string is not a palindrome. The function is then tested with three examples: "Never Odd or Even", "abc", and "kayak". The first example is a palindrome and should return True. The second example is not a palindrome and should return False. The third example is a palindrome and should return True as well.

To know more about palindrome visit:

https://brainly.com/question/13556227

#SPJ11

When an object is acted on by unbalanced forces, the object will always

Answers

Answer:

If an object has a net force acting on it, it will accelerate. The object will speed up, slow down or change direction. An unbalanced force (net force) acting on an object changes its speed and/or direction of motion. An unbalanced force is an unopposed force that causes a change in motion.

Explanation:

A piece of hardware used to enter data into a computer: Output Device Backing Storage Device Programming language Input Device

Answers

Answer:

Input Device.

Explanation:

A piece of hardware used to enter data into a computer is known as an input device.

Basically, this input device is also known as peripherals and it comprises of all of the devices that are interconnected with the CPU. Some examples of input devices used with a computer includes keyboards, scanner, mouse, etc. They avail the end users the ability to send an information to the computer system for processing into a desired output.

what are the correct order of steps that ssl uses in its coding process? group of answer choices fragmentation, compression, encryption encryption, compression, fragmentation compression, fragmentation, encryption fragmentation, encryption, compression

Answers

It is important to note that SSL has been superseded by TLS (Transport Layer Security) and is no longer considered a secure protocol. TLS uses a similar process for encrypting data, but with different encryption algorithms and other improvements to security.

The correct order of steps that SSL (Secure Sockets Layer) uses in its coding process is:

Fragmentation: The data is divided into small fragments so that it can be transmitted easily over the network.

Encryption: Each fragment is encrypted using a symmetric encryption algorithm such as AES, 3DES, or RC4. The encryption key is generated using a public-key encryption algorithm such as RSA or Diffie-Hellman.

Compression: The encrypted fragments are compressed using a compression algorithm such as zlib to reduce the size of the data being transmitted.

Transmission: The compressed and encrypted fragments are transmitted over the network.

Reception: The receiver receives the compressed and encrypted fragments and performs the reverse process - decompressing the fragments, decrypting them, and reassembling them into the original data.

To know more about secure protocol,

https://brainly.com/question/9561645

#SPJ11

Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

Answers

Answer:

unique

Explanation:

what is the purpose of a router

Answers

Answer:

below

Explanation:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

Answer:

to help connect a network to a device

Explanation:

for example a WiFi router is needed so that a specific device can be able to be connect with the WiFi network

Question 7 (1 mark) In a computer information system control procedures that provide reasonable assurance that the recording, processing and reporting of data are properly performed for specific appli

Answers

Control procedures in a computer information system ensure proper recording, processing, and reporting of data for specific applications.

In a computer information system, control procedures play a vital role in maintaining the integrity, accuracy, and reliability of data. These procedures are designed to provide reasonable assurance that the recording, processing, and reporting of data are performed correctly and in accordance with predefined standards and objectives.

Control procedures encompass a range of measures implemented to minimize the risks associated with data manipulation and ensure the system operates effectively. They can include both preventive and detective controls. Preventive controls aim to prevent errors or irregularities from occurring in the first place, while detective controls focus on identifying and correcting errors or discrepancies that may have occurred.

Examples of control procedures include access controls, segregation of duties, data validation and verification, data backup and recovery mechanisms, error handling procedures, and audit trails. These procedures are typically documented and enforced through policies, protocols, and system configurations.

By implementing control procedures, organizations can reduce the risk of data inaccuracies, unauthorized access, and fraudulent activities. They provide a level of assurance that data is processed in a controlled and secure manner, ensuring the reliability of the information produced by the computer information system.

Learn more about control procedures

brainly.com/question/30623695

#SPJ11

at fort sill in oklahoma the u.s. is training soldiers from what country on u.s. weapons systems?

Answers

At Fort Sill in Oklahoma, the United States is currently training soldiers from various countries on U.S. weapons systems. Among the countries being trained at Fort Sill are Taiwan, Saudi Arabia, and Jordan. These countries have requested training from the United States in order to better equip their military forces with U.S. weapons and tactics.

The training at Fort Sill is comprehensive and covers a wide range of U.S. weapons systems, including artillery, missile systems, and advanced targeting systems. The training is conducted by experienced U.S. military personnel who have extensive knowledge of these systems and how to use them in combat situationsThe goal of the training at Fort Sill is to provide these countries with the knowledge and skills needed to effectively use U.S. weapons systems in their own military operations. This is part of a larger effort by the U.S. military to build stronger partnerships with countries around the world and to promote stability and security in regions of strategic importance.In addition to the training provided at Fort Sill, the United States also works closely with these countries to provide ongoing support and assistance as they continue to develop and modernize their military capabilities. This includes providing access to advanced technologies, equipment, and training programs to help them stay ahead of emerging threats and challenges.

For such more question on targeting

https://brainly.com/question/31315094

#SPJ11

Can anyone help me answer this question?
Deep learning deals with how a machine provides information by processing data carried through the neural network and outputting the data.
Is this correct?

Answers

Deep learning deals with how a machine provides information by processing data carried through the neural network and outputting the data, is the correct statement.

What is deep learning in neural network?

Machine learning, which is simply a neural network with three or more layers, is a subset of deep learning. These neural networks make an effort to mimic how the human brain functions, however they fall far short of being able to match it, enabling it to "learn" from vast volumes of data.

Deep learning is a machine learning method that instructs computers to learn by doing what comes naturally to people. Driverless cars use deep learning as a vital technology to recognize stop signs and tell a pedestrian from a lamppost apart.

Thus, it is the correct statement.

For more information about deep learning in neural network, click here:

https://brainly.com/question/14632443

#SPJ1

Which is NOT the quality of an entrepreneur?

a) self-discipline
b) non-risk taking
c) persistence
d) creative thinking

Answers

Answer:

Option b). is the right choice.

Explanation:

An enterpreneur must have a risk-taking quality.

Best Regards!

Answer:

b)

Explanation:

An entrepreneur is always ready to take risks

:) :)

Module 9 Test What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Answers

The smartphone feature that allows a user to change from portrait view to landscape view when watching a video is called "Auto-Rotate" or "Screen Rotation."

Auto-Rotate or Screen Rotation is a feature that uses a built-in accelerometer in smartphones to detect the orientation of the device. When the user turns their phone, the accelerometer senses the change and adjusts the screen display accordingly, switching between portrait and landscape views.

In summary, the Auto-Rotate or Screen Rotation feature enables a seamless transition between portrait and landscape views when watching a video on a smartphone, providing an improved user experience.

To know more about accelerometer visit:

https://brainly.com/question/30881051

#SPJ11

Most presentations use text: A. To draw attention to content
B. At a minimum
C. Without restraint
D. To maximize area and style

Answers

i think it’s c hope this helps

What is the prefix for the host address 2001:db8:bc15:a:12ab::1/64? the network portion, or prefix, of an ipv6 address is identified through the prefix length. a /64 prefix length indicates that the first 64 bits of the ipv6 address is the network portion. hence the prefix is 2001:db8:bc15:a.

Answers

An IPv6 address's prefix length serves as a means of identifying the network portion, or prefix. The network portion of an IPv6 address is the first 64 bits, as indicated by a prefix length of /64. The prefix is 2001:DB8:BC15:A as a result.

The IPv6 address 2001 db8 is associated with what prefix?

A unique IPv6 prefix that is used only for documentation examples is 2001:db8::/32. Additionally, you can specify a subnet prefix, which tells a router how the network is organized internally. The subnet prefix for the example IPv6 address is as follows. The subnet prefix is always 64 bits long.

Describe the IPv6 prefix.

The idea of IPv6 prefixes is comparable to IPv4 subnetting. When an IPv6 address has a prefix, it is written as an IPv6 address followed by a decimal number that indicates how many bits in the address make up the prefix.

To know more about network visit:-

brainly.com/question/29350844

#SPJ4

who got houseparty and tryna play uno

Answers

Answer:

awww shiiiii yessss

Which of these factors needs to be considered when filming in HD?
The screen is a rectangle.
The screen is a square.
There are no pixels involved.
There will be less definition in each shot.

Answers

Note that the factors that need to be considered when filming in HD is: "

There are no pixels involved. (Option C)There will be fewer definitions in each shot. (Option D)

What is HD Filming?

High-definition video is greater in resolution and quality than standard-definition video. While there is no accepted definition of high-definition, it is commonly defined as any video picture with much more than 480 vertical scan lines or 576 vertical lines.

High Definition video is of greater quality than standard definition video (or Standard Definition). The image will be crisper in HD than in SD.

Note that the screen being a rectangle or square does not need to be considered when filming in HD. However, the presence of pixels and potential loss of definition in each shot are factors that should be considered.

Learn more about filming:
https://brainly.com/question/14824318
#SPJ1

when I click on spotify it give me this error message what do I do?
upstream connect error or disconnect/reset before headers. reset reason: connection failure, transport failure reason: delayed connect error: 111

Answers

Answer:

Try disconnecting your WiFi and reconnecting it. If that doesn't work, delete and reinstall the app and see if that works.

The error message you are seeing suggests that Spotify is having trouble connecting to its servers.

What is error message?

When an unexpected condition occurs, an operating system or application will display an error message to the user.

Examine your internet connection: Check that your device is online and that your internet connection is stable. To ensure that your internet connection is working properly, open a few different websites.

If you're using the Spotify web player, try clearing your browser cache and cookies. This can aid in the resolution of web page loading issues.

Restart the Spotify app: Close the Spotify app and then reopen it. This can aid in reconnecting to the Spotify servers.

Thus, this can be done in the given scenario.

For more details regarding error message, visit:

https://brainly.com/question/30458696

#SPJ2

What would the coordinates be of a 1x1x1 cube in a 3D space if the front lower-left corner is placed at (0,0,0) and the back top-right corner is placed at (1,1,1)?

Answers

Answer:

See picture.

Explanation:

The picture shows all the 8 coordinates.

What would the coordinates be of a 1x1x1 cube in a 3D space if the front lower-left corner is placed

Which tools or methods can you use to import a. Reg file? (Choose all that apply)


a. Registry Editor (regedit) d. Double-clicking the. Reg file in File Explorerb. HKEY_CURRENT_USERC. . NET Framework 3. 5 d. . NET Framework 4. 0 e. . NET Framework 4. 6

Answers

The tools or methods that can be used to import a .reg file are: a. Registry Editor (regedit) and d. Double-clicking the .reg file in File Explorer.

Using the Registry Editor (regedit) allows you to manually import the .reg file into the Windows Registry. You can open the Registry Editor, navigate to the desired location in the registry, and then use the "Import" option to import the contents of the .reg file.

Alternatively, you can simply double-click the .reg file in File Explorer, and Windows will automatically prompt you to confirm the import operation. By confirming, the contents of the .reg file will be merged into the Windows Registry.

The options b, c, and e mentioned in the question (HKEY_CURRENT_USER, .NET Framework 3.5, .NET Framework 4.0, .NET Framework 4.6) are not directly related to importing .reg files. They represent specific registry keys or software frameworks and are not directly involved in the import process of .reg files.

To know more about .reg file, visit:

brainly.com/question/32263983

#SPJ11

who determines how many items to select for the sprint backlog? a. the product owner b. the scrum master c. the developers d. the stackholder

Answers

The developers determines how many items to select for the sprint backlog.

What is sprint backlog?

According to the Scrum Guide, the Sprint Backlog is made up of the Sprint Goal (why), the selection of Product Backlog items for the Sprint (what), and a workable delivery plan for the Increment (how).

By and for the developers, the Sprint Backlog is a plan. It is a very clear, in-the-moment representation of the work that the Developers intend to complete throughout the Sprint in order to achieve the Sprint Goal. As a result, throughout the Sprint, the Sprint Backlog is updated as new information becomes available. It ought to be thorough enough for them to check their development in the Daily Scrum.

Learn more about  Sprint Backlog

https://brainly.com/question/14587191

#SPJ4

if any one answered this i will give brilientst what is stimulation program​

Answers

Explanation:

organized programs of enrichment designed to provide developmentally appropriate activities to babies and toddlers who have, or who are at risk for a variety of conditions (environmentally or biologically caused) that might interfere with their ability to ultimately have a full and productive life."

Which of the following does NOT represent a typical method for installing the driver on a Windows system?A) PnPB) Add Hardware WizardC) Device ManagerD) Programs and Features

Answers

D) Programs and Features does not represent a typical method for installing the driver on a Windows system. Programs and Features is used to uninstall programs that have already been installed on the system, not to install drivers or other hardware components.

What is a Windows system?

A Windows system refers to a computer system that runs on a Microsoft Windows operating system. Microsoft Windows is a popular operating system used by many individuals and organizations around the world. It is designed to provide a user-friendly interface and support for a wide range of hardware and software applications.

A Windows system can be a desktop or laptop computer, server, or other device that runs on a version of the Windows operating system, such as Windows 10, Windows Server 2019, or Windows Embedded. Windows systems can be used for a variety of tasks, including productivity, gaming, web browsing, media consumption, and more.

To know more about Windows 10 visit:

https://brainly.com/question/31252564

#SPJ11

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?

Answers

Answer:

The answer is:

(1)Select the bullet, that is used in the list

(2)Defining the new bullet, which is used in the list

Explanation:

In the question, the choices were missing. so, we define the correct choice only.

In choices 1 and choice 2, both use the bullets, but in choice 1, it is used in the list, in which it is used to define the list options, and in the choice 2, it defined the new bullets in the list.  

Other Questions
On the firt week, the company accountant completed 2/9 of the company' annual report which needed to be finihed within 3 week. During the econd week he completed another 2/3 of the financial report. What fraction of the financial report did he finih during the firt and econd week? How does whether a bank reorders transactions impact the cost of overdraft fees? If the temperature of sink is equal to absolute zero the effeciency of heat engine should be if a reaction vessel initially contains an n2o4 concentration of 0.0550 m at 500 k , what are the equilibrium concentrations of n2o4 and no2 at 500 k ? express your answers in moles per liter to three significant figures separated by a comma. How did water from the great barrier reef affect photosynthesis A dot plot titled Number of Hours Spent on Homework goes from 1 to 6. There is 1 dot above 1, 5 dots above 2, 6 dots above 3, 4 dots above 4, 1 dot above 5, and 1 dot above 6.What is a dot plot and how do you read it?Check all that apply.A dot plot is a simple plot that displays data values as dots above a numberline.Dot plots show the frequency with which a specific item appears in a data set.3 students spent 4 hours on homework.5 students spent 2 hours on homework.Dot plots show the distribution of the data.Students spent 1 to 6 hours on homework the nurse determines that which individual presenting to the clinic is at the greatest risk for development of an integumentary disorder? HURRY Suppose that 15% of people own dogs. If you pick two people at random, what is the probability that they both own a dog?Give your answer as a decimal (to at least 3 places) or fraction Let's assume there is an inctease in both the sapply and demand for-semiconductor chips. In addition, assume that the deanand of semiconductor chips increases inote than the supply for semiconductor chips. In the market for semiconduclor chips, we would expect the equalibrium quantity to rise and the change in the cquilibrim price to be ambiguous, equilibritim quantsty to rise and the equilituriumprice to fall: equiliturium quantity to rise and the equilibrium price to rise: charige in the equalitorim quantity to be ambigoons and the equilibrium price to frice. Which development would most reflect Karl Marxs belief in the economic system that he predicted would replace free markets? Finding a way to build on each person's area of expertise along with Billie's experience with the company enabled the group to produce a superior report. This is an example of successful integration of different types of diversity. Imagine, however, instead of being older and more experienced, Billie was from another country such as Japan. Based on the cultural profiles of different countries, what types of value differences might exist between Billie and other U.S. managers? Choose the correct answer. (Keep in mind that these are general trends and you should guard against sterotyping people based on nationality.)a. Billie is likely to be much less deferential to authority and lines of power than her U.S. counterpartsb. Billie is likely to have a much longer time orientation Which one of the following timer parameters determines the accuracy of the timer? s. Time base. b. Accumulated time. c. Timer address. d. Preset time. Can you identify any parts of Wiesel's speech where the flow becomes choppy? Please explain. ?cual es el Cambio de temperatura cuando pasa de -5 c a 50c The charitable organization Creating Hope International trains women in Afghanistan to become tailors. This effort reduces A) entrepreneurship differences between advanced and developing economies. B) human capital differences between advanced and developing economies. C) agricultural differences between advanced and developing economies. D) manufacturing differences between advanced and developing economies. E) physical capital differences between advanced and developing economies. Did the form of the present tense of each verb in parentheses to complete the sentence.Your NOT supposed to put it in English ( Ill make you as brainlest ) The angle of elevation to a nearby tree from a point on the ground is measured to be 32^{\circ} . How tall is the tree if the point on the ground is 71 feet from the tree? Round your answer to the nearest tenth of a foot if necessary. The __________image file format ensures that images don't lose their quality and details when graphic designers save them. An example of such image file format is ______ . Help help help please indeed close why might a marketer want to engage in marketing cost analysis? a. to allocate the firm's marketing resources better in the future b. to reflect the market's reaction to the marketing mix c. to help outline how the company will achieve its objectives d. to determine how much the company will charge customers e. to evaluate the firm's strengths and weaknesses