Answer:
Sizes
Explanation:
Can somebody help me? Thank you. ASAP
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
What is the use of an NDP?
A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address
Answer:
Taking an IP address from a network layer and identifying the associated MAC address
Explanation:
Option D
All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!
Answer:
computer system normally stores characters using the ASCII code. Each character is stored using eight bits of information, giving a total number of 256 different characters (2**8 = 256).
Explanation:
Which involves more human input, basic algorithms, or machine learning?
Answer:
Machine learning
Explanation:
Machine learning involves more human input. Check more about machine learning below.
Does machine learning needs human input?Note that as long as AI technology is invoke and there are new applications that are made for AI to learn, AI will need to have human input.
Therefore, Machine learning involves more human input as AI. needs to learn more about humans so as to function well.
Learn more about human input from
https://brainly.com/question/24953880
#SPJ2
How do solar ovens track the sun as it moves during the day?
Answer:
A sort of solar thermal collector is a solar cooker. It "collects" and retains the thermal (heat) energy of the Sun. When high frequency light (visible and ultraviolet) is transformed into low frequency infrared radiation, heat is created.
Explanation:
What matters most to teens when making a clothing purchase: Brand, Price or Quality? Explain. please have 4 sentences!!
Answer:
Teenagers have always been important to brands because they tend to be early adopters and because, traditionally, their brand preferences aren't yet firmly defined. ... With the internet and social media, teenagers have more access to that information than ever before." Teens also wield significant purchasing power.
Hope that helps have a wonderful rest of ur ay and God bless you
Explanation:
Answer:
To teens, brand influences what they purchase. This is because nowadays, people gain steam in social media based on what they wear, and it is very important to teens to show their value/worth. To do this, they choose brands that are trendy or a brand that will improve their reputation. It can also even be a brand that someone may like or enjoy. This shows that price and quality doesn't matter that much to them because the brand is what gets attention on online media.
This explains what I said better:
https://www.vox.com/the-goods/2018/9/24/17861398/gen-z-shopping-habits-juul-glossier
its a website that i got info from so ye
I hope you liked what I wrote, but you probably won't anyways. :)
(I made this up teehee) what anime is katski bakugo from
what is 8 4/7 divided by 15
Answer: 4/7
Explanation:
8 4/7 ÷ 15
60/7× 1/15
=4/7
ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.
Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.
then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.
I hope this help you to understand
How do you code things to make shapes out of them and add color
Answer:
go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top
Which of these represents information that is fact-based, measurable, and observable?
objective information
predictive information
subjective information
interpretive information
Answer: objective information
Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?
Answer:
A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:
Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.Answer:
Explanation:
Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.How many animals do I have? 1 or 2
How many siblings do I have? 3 or 6
How many aunts do I have? 10 or 13
How many grandparents do I have now? 4 or 6
Hint: Most of them passed away! :(
Good Luck! If u get most of them correct u will be Brainliest!
TRY UR BEST!!
What will you see on the next line?
>>> int(200.9123)
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
In the context of outside influences on research, what is the difference between maturation and attrition?
A. Maturation is the decrease in the number of subjects studied over time; attrition is the change in subjects over time.
B. Maturation is the change in subjects over time; attrition is the decrease in the number of subjects studied over time.
C. Maturation is the change in subjects over time; attrition is the change in subject responses due to world events.
D. Maturation is the change in subject responses due to world events; attrition is the change in subjects over time.
help please!!
Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.
b
Provide only her name and date of birth.
c
Provide only her name and address.
d
Provide the requested information to receive the discount.
Answer:
a
Explanation:
sis is gonna get scammed
Answer:
a
Explanation:
You dont know who is getting your information and it is not someone you know. STRANGER DANGER!
Help me please. I dont really understand this.
I didnt see the 2022 year date (sob sob) mbb
How do I get my text box to stop moving continuously on a Chromebook?
I will give brainliest to the first person who answers (and the suggestion helps!) and also friend anyone who answers, whether it is helpful or not!
Answer:
Go to Settings. Click on Advanced Settings. Scroll down to the Accessibility section. Make sure that the box next to “Automatically click when the mouse pointer stops” is Unchecked.
Explanation:
here you go hope this helps!!
HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order to get feedback. Which stage of the software development life cycle is Tyra currently in? Coding Design Planning Testing
Maintenance/Testing is the correct answer
Answer:
testing
Explanation:
Tyra developed a new game and let her friends try it. This means she already made it planned, designed, and coded the game. now her friends are testing it
im pretty sure this is the answer
An example of how a merge code would appear in a letter would be _____.
Answer:
Space blank
Explanation:
It means the question needs you to answer the question
Answer:
An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.
Explanation:
I hope this helps
Guys i keep trying to get in touch with brainly but it says "your request could not be submitted" Can someone please help me ?
Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.
Answer:
Python is the current language of choice in schools because it helps people build good coding techniques very quickly, and it has a robust range of uses. Code presentation is also an increasingly important distinction between the two languages. In the past, developers used code largely to create applications.
Explanation:
Python is related to flowcharts. because You write a program by setting up a flowchart. When you run the flowchart the software compiles to python byte-code so that you can easily import modules you write in Flowchart Python into standard Python programs.
sorry if i'm wrong
Python is a programming language which enables ciders to perform robust tasks very easily. Advantages of python include ;
Robustness and very large community Readable and very clean syntax Wide variety of applications such as data science, application development and so on.Python like most other programming language executes codes sequentially, hence a breakdown of the execution structure or pattern of the program could be traced. This is inline with the flowchart diagram whigh gives a diagrammatic representation of the flow structure of a program.
Learn more : https://brainly.com/question/22841107
What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware
Answer:
Hardware
Explanation:
Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.
Hope this helps. <3
Hardware is the name given to the parts of a computer that you can actually touch.
What is Hardware?
The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.
Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.
Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.
Therefore, Hardware is the name given to the parts of a computer that you can actually touch.
To learn more about Hardware, refer to the link:
https://brainly.com/question/15232088
#SPJ5
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
bro i will give brainly to anyone who beats me in just build .lol code is uspx11
Which statement assigns the value 99 to the variable myGrade in Python?
myGrade = 99
my Grade = 99
!myGrade = 99
myGrade == 99
Answer: I think that the answer is the first one, myGrade=99
Explanation: