Answer:
A computing system
Explanation:
A computing system is a group of computing devices and programs working together for a common purpose. A computing device is a physical object that can run a program, such as computers, tablets, cell phones, and smart sensors.
Hope this helps!
Source: bjc.edc.org
What is the result when you run the following line of code after a prompt??
>>>print(3 + 11)
Answer:
The following output is 14
Explanation:
When you print something, python interprets it and spits it out to the console. In this case, python is just interpreting 3 + 11, which equals 14. Thus, making the answer 14.
hope i helped :D
Answer:
14
Explanation:
ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next
Answer:
B
Explanation:
I dont no if it is right but B has the things you would use for desktop publishing
Answer:
the answer is B.
a process to design and produce publications, with text and images, on computers
Explanation:
i will mark brainalist!
Answer:
I would say
1) Weather Station
2) (word missing)
3) Robot perihen devices
4) Bit
5) Primary Key
6) Algorithim
7) Flow Chart
8) Table Wizard
9) Design View
10) SIMS
Answer:
i think it would be 1) Weather Station
2) (word missing)
3) Robot perihen devices
4) Bit
5) Primary Key
6) Algorithim
7) Flow Chart
8) Table Wizard
9) Design View
10) SIMS
Explanation:
Solve: ["Success is the sum of small efforts repeated”- R. Collier ]
Please compute for the file size of the quote above. Kindly show your solution and encode your
final answer in the yellow box and make sure it is in bytes.
although the internet provides unlimited sources of information and entertainment, what are we still restricted by? question 46 options: a) data limits b) text message character limits c) satellite placement d) devices that use power quickly
Although the internet provides unlimited sources of information and entertainment, the factor that are we still restricted by option c) satellite placement.
Can I immediately access the internet through satellite?In that regard, satellite internet is comparable. Your home will have a satellite dish erected, and the internet will be transmitted from there. Satellite internet requires no cables or other equipment because it is 'directly' supplied by satellites that are circling in space. 12
Therefore, At an altitude that is of 10,900 nautical miles (20,200 km) and for a duration of 12 hours, GPS satellites travel in circular orbits. To ensure coverage of the poles, the orbits are 55 degrees slanted toward the equator of the planet.
Learn more about satellite placement from
https://brainly.com/question/15187476
#SPJ1
What is the default folder for text file
documents or download
It depends where you install it to
Answer:
numbers are stored as characters
Explanation:
currently saved in if another folder
Symbols that store values are called what?
What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )
Answer:
c
Explanation:
send a copy of the messege
What functionality does a person with L4 SCI have?
A person with L4 SCI (spinal cord injury at the fourth lumbar vertebrae) may experience varying levels of functionality, depending on the severity of their injury.
The L4 spinal nerve controls movement and sensation in the quadriceps muscle (front of the thigh), the inner lower leg, and the big toe. As a result of the injury, the person may have difficulty controlling or moving these areas, leading to challenges with walking, standing, or maintaining balance.
An L4 SCI affects the lumbar region of the spinal cord, which controls lower body movement. After such an injury, a person usually retains the ability to flex and extend their hips and knees.
To know more about SCI visit:-
https://brainly.com/question/14331199
#SPJ11
List the three words using in programing LOGIC statements
Answer: If, Than, Else.
Explanation: Programming languages control the flow of a program using logic statements which are a specific form of IF…THEN…ELSE statements.
Programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.
What are the "if", "then," and "else" statements?The "if or then" statements, together with its optional "else" clause, only require one statement to be performed for each of the two cases. Multiple statements can be combined together to execute more than one statement using a begin/end Block Statement:
if = (If something is true, do it; otherwise, do something else.)
{ if x < 10 then begin
x := x+1;
y := y+1;
end
else}
Even if just one statement is given, a begin/end statement block can be used as an option. This is a typical technique to keep code clean and understandable, as well as to prevent making the usual error of forgetting to add begin/end when later extending a single-line "if or then" statement.
Thus, programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.
To learn more about the programming languages here :
https://brainly.com/question/11023419
#SPJ1
Why should you always name directory files using lowercase letters?
Answer: Using all-lowercase filenames rather simplifies things here. If you somehow make the directory available to a Windows system, it will not be able to access both files. It will probably be able to access only the one that appears first in the directory, regardless of which name you use
Explanation:
what are output devices ?
name them
Answer:
Monitor.
Printer.
Headphones.
Computer Speakers.
Projector.
GPS.
Sound Card.
Video Card.
Explanation:
describe and analyze an algorithm to find the shortest path from s to t when exactly k edges in g have negative weight. how does the running time of your algorithm depend on k?
Modified Bellman-Ford algorithm solves shortest path with k neg. weights in O(km).
Algorithm for shortest path problem?The problem of finding the shortest path from a source vertex s to a target vertex t in a graph with exactly k negative weight edges can be solved using a modified version of the Bellman-Ford algorithm.
Initialize the distance from s to all other vertices as infinity, except for s which is set to 0. For i from 1 to k, repeat the following:For each edge (u, v) in the graph, update the distance to v as min(distance[v], distance[u] + weight(u, v)), where weight(u, v) is the weight of the edge (u, v).
For each edge (u, v) in the graph, update the distance to v again as min(distance[v], distance[u] + weight(u, v)), but this time, we consider the opposite of the weight of the edge (u, v).
Return the distance from s to t.The above algorithm works because for any path from s to t with exactly k negative weight edges, there must be at least one negative weight edge. Therefore, we first relax all edges as usual, and then relax them again, considering the opposite of their weights. This ensures that we consider all possible paths with exactly k negative weight edges.
The running time of this algorithm is O(km), where m is the number of edges in the graph. This is because we run the Bellman-Ford algorithm twice for each of the k negative weight edges.
The running time of this algorithm depends on k because we need to run the Bellman-Ford algorithm k times to ensure that we consider all possible paths with exactly k negative weight edges. However, in practice, k is usually a small constant, so the running time of the algorithm is still reasonable
In summary, the algorithm to find the shortest path from s to t with exactly k negative weight edges works by modifying the Bellman-Ford algorithm to consider all possible paths with exactly k negative weight edges. The running time of the algorithm is O(km), where k is the number of negative weight edges in the graph and m is the number of edges in the graph.
Learn more about Shortest-Path.
brainly.com/question/31214923
#SPJ11
Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.
Answer:
I am using normally using conditions it will suit for all programming language
Explanation:
if(minimum){
hours=10
}
Which of the following is NOT a way to build on your strengths?
A.
eating a healthy, well-balanced diet
B.
only participating in sports you are good at
C.
learning as much as possible about the sport
D.
studying and learning from other players
Answer: the answer is B
Explanation: You can't raise your strengths if you only do sports you are good at:)
provide explanations for temporal and spatial locality to reference data items and how memory hierarchy can affect access time. Explain the importance of considering memory behavior when writing programs.
The importance of considering memory behavior is temporal and spatial locality are concepts that refer to the tendency of programs to access data items that are close to each other either in time or space.
Temporal locality refers to the tendency of a program to access the same data items repeatedly over a short period of time. Spatial locality refers to the tendency of a program to access data items that are close to each other in memory. Memory hierarchy can affect access time by providing faster access to data items that are closer to the processor. This is because data items that are closer to the processor can be accessed more quickly. The importance of considering memory behavior when writing programs is that it can help to optimize the performance of the program.
Learn more about memory behavior: https://brainly.com/question/31212705
#SPJ11
a start-up company operates all of its web servers and services on a cloud platform using platform as a service (paas). the company offices run a local domain controller for directory services. which type of attacks would the cloud service provider consider as cloud-based attacks as opposed to on-premise? (select all that apply.)
Cloud-based attacks are those that occur through the Internet and that are directed against cloud servers or services. This may occur as a result of the attacker's attempt to gain access to sensitive information or to damage or disable the service.
Here are some types of attacks that cloud service providers would consider as cloud-based attacks:
1. Distributed Denial of Service (DDoS) attacks. Cloud-based DDoS attacks are among the most common and can come from various sources. In general, attackers utilize DDoS attacks to overwhelm cloud servers and prevent clients from accessing the services they require.
2. SQL Injection Attacks. A SQL injection attack occurs when an attacker injects malicious code into an online form or database query. As a result, the attacker may gain access to sensitive information such as credit card numbers, passwords, and other critical data.
3. Malware attacks. Malware is software that is installed on a user's device without their knowledge or consent. These programs are used by cybercriminals to obtain sensitive information from the victim's device, including passwords, bank account numbers, and other critical data.
4. Brute Force Attacks. This type of attack involves an attacker trying to gain access to a system by guessing the correct password. The attacker will attempt to use a variety of passwords until they find the correct one.
5. Man-in-the-middle attacks. Man-in-the-middle attacks occur when an attacker intercepts communication between two parties and steals sensitive information such as passwords, credit card numbers, and other critical data.Therefore, DDoS attacks, SQL injection attacks, Malware attacks, Brute Force Attacks, and Man-in-the-middle attacks are considered as cloud-based attacks as opposed to on-premise.
To know more about Cloud-based attacks visit:
https://brainly.com/question/16462984
#SPJ11
how to save an edited document.
You can either hit the save button (usually at the top of the window) or use CTRL-S or CMD-S (depending if you're on Windows or Mac).
Given the vehicle's dataframe.
Create a dataframe by grouping by brand and creating an array column that contains each unique vehicle model for each brand.
Data structure called a dataframe arranges data into a Two dimensional table of rows and columns which is Similar to a spreadsheet.
Dataframes provide a flexible and user-friendly method of storing and interacting with data, DataFrames are one of the most popular data structures used in contemporary data analytics.
The name and data type of each column are specified in a schema which is part of every DataFrame.
Both common data types like StringType and IntegerType as well as Spark-specific data types like StructType could be in Spark DataFrames. The DataFrame stores missing or incomplete values as null values.
Learn more about Spreadsheet, refer to the link:
brainly.com/question/8284022?
#SPJ4
exercise 1 which of the following statements is true? in java, data types in declarations of symbolic constants are needed only for documentation purposes. when a java interpreter is running, variables of the double data type are represented in memory as strings of decimal digits with a decimal point and an optional sign. a variable's data type determines where it is stored in computer memory when the program is running. a variable's data type determines whether that variable may be passed as a parameter to a particular method. a variable of the int type cannot serve as an operand for the / operator.
The true statement is a variable's data type that determines where it is stored in the computer memory when the program is running.
The data type of a variable in Java determines how much memory is allocated to it and where in the memory it is stored. The other statements are false. Data types in declarations of symbolic constants are not just for documentation purposes but are required for the compiler to check for type correctness.
Variables of the double data type are represented in memory as binary floating-point numbers, not as strings of decimal digits. Finally, a variable of the int type can serve as an operand for the / operator, but the result will be an integer division with any remainder truncated.
know more about data type here:
https://brainly.com/question/30459199
#SPJ11
When should students in a study session use flash cards to quiz one another ?
Answer:
while drilling
Explanation:
when is the new season of legacies coming out on netflix
Answer:
Not sure (I couldn't find info) but It is coming out on CW
Explanation:
It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.
this help me please.
Answer:
1) 1011010
2) 1100100
3) 1010101
4) 23
5) 22
6) 24
In Chapter 20 you read all about different types of private networks -- VLANs, NAT, PAT, and network segmentation. Additionally, the chapter covered virtual networks. Network virtualization has changed computing for the better. It saves money, allows for more scalability in networks, provides a more rich training environment since students or new hires are able to go out and "play" with the virtual machines and really get some hands-on experience! Some of you may not have really heard too much about virtual networks or how to use a virtual computer. For this discussion board, I want you to share with the class what experience (if any) you have with VMs. Initial Response Guidelines:
In roughly 100-150 words, describe to the class your experience with virtual networks or virtual computers. Virtual reality does not really count, but if it's all you have to discuss it will work. I want you to describe not only your experiences but also your thoughts on using virtual machines to save money, learn new techniques and any other aspects of VMs you want to share.
I have extensive experience with virtual networks and virtual machines (VMs). I have worked with various virtualization platforms like VMware, VirtualBox, and Hyper-V, both for personal use and in professional settings.
Virtual networks have been an integral part of my work and learning environment. They offer several advantages, including cost savings and increased scalability. By running multiple virtual machines on a single physical server, resources can be utilized more efficiently, reducing hardware costs. Moreover, VMs can be easily cloned, allowing for quick deployment and replication of complex network setups.
Using virtual machines has also enhanced my learning experience. I have been able to experiment with different operating systems, software configurations, and networking scenarios without the need for additional physical hardware. This hands-on approach has enabled me to gain practical skills, troubleshoot issues, and explore new techniques in a safe and isolated environment.
Overall, virtual machines have been invaluable tools for me. They have provided cost-effective solutions, facilitated learning opportunities, and allowed for the exploration of diverse network setups. The ability to create and manage virtual networks has not only saved money but also enriched my understanding of networking concepts and technologies.
To know more about virtual machines ,visit:
https://brainly.com/question/31674424
#SPJ11
hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me
Answer:
a pseu code is a is an artificial and informal language that helps programmers develop algorithms.
Explanation:
you have used the runas command with the /savecred option to start an application on your windows system. for security reasons, you have changed you mind and don't want to keep the password in windows vault.how can you delete the stored password?
To delete the stored password for the Runas /savecred command on a Windows system, you can use the Credential Manager or Command Prompt.
The stored password for the Runas /savecred command is saved in the Windows Credential Manager. To delete the stored password, you can open the Credential Manager and select the Windows Credential tab. From there, you can locate the entry for the Runas /savecred command and click the "Remove" button to delete the stored password. Alternatively, you can also use the Command Prompt to delete the stored password. Open the Command Prompt as an administrator and run the following command: "cmdkey /delete:targetname". Replace "targetname" with the name of the stored credential for the Runas /savecred command. This command will delete the stored credential from the Windows Credential Manager. In summary, to delete the stored password for the Runas /savecred command on a Windows system, you can use either the Credential Manager or Command Prompt. Deleting the stored credential can help improve security by preventing unauthorized access to sensitive information.
Learn more about Credential Manager here:
https://brainly.com/question/15889826
#SPJ11
Whenever you start a design in Fusion 360, you're given
options:
(a) 1 construction plans to work
(b) 3 construction plans to work
(c) 2 construction plans to work
(d) 4 construction plans to work
When starting a design in Fusion 360, users are typically presented with multiple options for construction plans. The available choices are usually (a) 1 construction plan, (b) 3 construction plans, (c) 2 construction plans, or (d) 4 construction plans.
The number of construction plans offered at the start of a design project in Fusion 360 depends on the template or workspace selected. These options provide users with different starting points based on their specific needs and preferences.
Option (a) with 1 construction plan typically offers a clean slate, allowing users to start from scratch without any predefined sketches or models. This can be useful when designing completely custom objects or when users prefer to build everything from the ground up.
Option (b) with 3 construction plans may present users with a few basic sketches or models as a starting point. These can serve as a foundation for further modifications or as a reference for specific design elements. Having multiple plans offers some initial guidance while still allowing for significant customization.
Option (c) with 2 construction plans strikes a balance between a completely blank canvas and a moderately guided starting point. It provides users with a couple of pre-established sketches or models that can be modified or expanded upon to fit their design requirements.
Option (d) with 4 construction plans typically offers the most predefined sketches or models among the available choices. This option is suitable for users who prefer a more structured starting point, as it provides additional references or design concepts to work from.
Ultimately, the number of construction plans available in Fusion 360 allows users to choose the level of guidance and starting point that best suits their individual design workflow and project requirements.
learn more about design in Fusion 360 here:
https://brainly.com/question/31969415
#SPJ11
Arrange the tasks based on the phases of website development in the order from start to finish.
1. The team uses a coded approach (HTML, CSS, and JavaScript) to create the required web pages.
2. The team creates a sitemap based on the gathered information.
3 Randolph and his team interview a client to find out the requirements for the client’s website.
4. The team creates a flowchart and wireframe based on a webbed storyboard.
5. The team checks the website against worst-case scenarios and for potential bugs.
6. Randolph delegates monthly update tasks to two team members.
7. After client approval, Randolph and his team launch the website on the client platform.
Please actually try to answer if you know and don't just answer for the answering points pls.
Based on the typical phases of website development, the correct order for the tasks would be:
1. Randolph and his team interview a client to find out the requirements for the client's website.
2. The team creates a sitemap based on the gathered information.
3. The team creates a flowchart and wireframe based on a webbed storyboard.
4. The team uses a coded approach (HTML, CSS, and JavaScript) to create the required web pages.
5. The team checks the website against worst-case scenarios and for potential bugs.
6. After client approval, Randolph and his team launch the website on the client platform.
7. Randolph delegates monthly update tasks to two team members.
Sports photography is not included in news coverage.
True
False
Answer:
False yes it is
Explanation:
Is there any router that you can just buy that provides a internet service and don't have to pay for monthly subscriptions?
There is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions.
What is a router?A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.
What is wi-fi?Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.
In conclusion, there is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions because this is the fee charged by an internet service provider (ISP) for data plans.
Read more on router here: brainly.com/question/24812743
#SPJ1