Answer: dynamic computer language
Explanation:
JavaScript is a dynamic computer language. Hope this helps! (•‿•)
Answer:
It is called JavaScript, or simply scripting.
What can macro mode on a camera be used for?
Answer:
taking photos of small things or a close up.
Explanation:
great for taking photos of bugs or flowers, it's very helpful
How do you code things to make shapes out of them and add color
Answer:
go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top
What is the use of an NDP?
A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address
Answer:
Taking an IP address from a network layer and identifying the associated MAC address
Explanation:
Option D
When did y2k first occurred?
Answer:
if ur saying the style it would be the late 2000s or 90s
Dr. Kim divides a programming class into groups. Each group will create a large program as their
final exam. To make this big project more manageable, which of these should the group use?
an algorithm creator
a binary translator
a text editor
top-down programming
Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the three correct answers. A. The Metropolitan Museum of Art in Modern in New York City contains many abstract paintings. B. We read fables as children to learn moral lessons. C. Today sculptors and painters avoid realism in their art. D. The columns of the Lincoln Memorial in Washington D.C. provide balance and harmony. E. Comedies and dramas are popular types of theater on Broadway.
Fist one will mark brainlyest
Answer:
A, B, D
Explanation:
I'm gonna go with these few answers because, well I'm not an expert with this stuff but the Metroplian Museum of Art has the Greek Design on the walls. And B, children are required in school to read such things for this reason. And D, seams like the correct answer for this better than the other ones.
Hope I helped you out, Reza106157
Answer:
B
Explanation:
A college campus uses robots to give students tours. The prospective students can ask the robot questions about life on campus. The robot allows the visiting student to choose which parts of campus to visit. What best describes the type of AI possessed by the robot?
weak AI
neural network AI
symbolic AI
Strong AI
The type of AI possessed by the robot in this scenario is Weak AI, also known as Narrow AI or Applied AI.
Weak AI is designed to perform a specific task, and it operates within a limited domain. The robot in this scenario is programmed to give tours of the campus and answer questions about life on campus. It does not have general intelligence, consciousness, or the ability to think and reason like a human being, and it cannot perform tasks outside of its programmed capabilities.
In contrast, Strong AI, also known as Artificial General Intelligence (AGI), is a theoretical form of AI that would possess human-like intelligence and the ability to reason and perform any intellectual task that a human can do. However, Strong AI does not currently exist.
Neural network AI and Symbolic AI are categories of techniques and approaches used in the development of AI, and they can be applied to both Weak AI and Strong AI systems. Neural network AI involves developing algorithms that are modeled after the structure and function of the human brain, while Symbolic AI involves creating AI systems based on a set of rules or symbols. However, the type of AI possessed by the robot in this scenario is more specifically described as Weak AI.
What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware
Answer:
Hardware
Explanation:
Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.
Hope this helps. <3
Hardware is the name given to the parts of a computer that you can actually touch.
What is Hardware?
The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.
Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.
Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.
Therefore, Hardware is the name given to the parts of a computer that you can actually touch.
To learn more about Hardware, refer to the link:
https://brainly.com/question/15232088
#SPJ5
If you were programming a robot to respond to touch, the path might look something like this:
touch --> touch receptor --> computer processor--> motor --> movement
Write a similar path showing how the same information would be processed within the human body.
a.Distance sensor
b.Programable microcontroller
c.Ambient light sensor
d.Wi-Fi
D WiFi
It uses wifi to connect to the internet
Answer:
.Wi-Fi
Explanation:
Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and other devices to the internet. ... The device transmits a radio signal back to the router, which connects to the internet by wire or cable.
Why isn't my brainly post being answered?
Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My teacher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)
Answer:
I think we are so this is hard lol
Explanation:
we are not too dependable
things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online
this is hard if I can think of any others I'll come back I'm sorry if this isn't any help
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
Da heck is happening in my history class
Answer:
wow what in the word why tho lol
Explanation:
Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.
Answer:
1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.
Explanation:
1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.
I hope that my answer helped you. Thank you, and good luck.
The three examples of ethical or legal issues that an IT professional may encounter are:
Privacy violationsCybersecurity breachesIntellectual property violationsWhat are the negative consequences of the issues with IT professional?In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.
In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.
Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.
Learn more about IT professional from
https://brainly.com/question/6947486
#SPJ1
Identify the error in the following block of code.
for x in range(2, 6):
print(x)
A. The first line is missing quotes.
B. The first line has a spelling error.
C. The second line has a spelling error.
D. The second line needs to be indented four spaces
Answer:
D.The second line needs to be indented four spaces
Explanation:
Since the print statement is not indented, it is not part of the for loop. This means that there are no lines of code to be executed in the for loop, so this will cause an error.
Can you please help me with this crossword puzzle, I am having trouble with numbers 5 down and 22 across.
Thank you so much for your help! I really needed this
Please help it's on scratch coding !
(You can use an if statement block with a sensing (if touching some Sprite) block.)
A True
B False
True, you can because in Scratch, you actually can use an if statement block and use an if touching another sprite.
Which best describes desktop publishing? the process of designing and laying out printed material the positioning of text, graphics, and white space on a page the style of letters and how they are arranged the use of images and colors
Explanation:
the process of designing and laying out printed material.
Answer:A photographic proof where all colors are shown in blue, best used for spot color jobs, and it is used primarily to ... WYSIWYG is technical jargon that describes.
Explanation:
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
Which of the following best describes a feedback loop?
A) A set of design features that helps users keep media balance.
B) A personal habit that you develop when you start using social media.
C) A response to something you do online that causes your brain to experience a temporary moment of pleasure.
D) When you and a classmate give feedback on each other's assignment.
Answer:
I believe it might be: A response to something you do online that causes your brain to experience a temporary moment of pleasure.
Explanation:
Sorry if I got it wrong.
Carina's computer is turning off without warning. Which of the following steps should she take to troubleshoot the problem?
A: Try several fixes at once.
B: Uninstall the anti-virus software.
C: Check the cable connections.
D: Remove devices.
Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?
Answer:
I think they should show one subject per month so students are more prepared
Answer: some changes that should be made are dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .
Explanation:
What is output?
Print (12 % 5)
Answer
0
5
2
1
6. The ink pen was dropped by her parent. Change this sentence to active voice. *
Answer: g what are you talking ab
Explanation:
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
An example of how a merge code would appear in a letter would be _____.
Answer:
Space blank
Explanation:
It means the question needs you to answer the question
Answer:
An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.
Explanation:
I hope this helps
What is the best way for coding without downloading anything?
Answer:
web sites
Explanation:
how has social media changed my journalism looks like?
A. journalists use poor grammar online
B. journalist can be everyday people
C. Only journalists from major news stations report the news
D. Journalists can dress down while reporting the news
This is for a test, so I need to get answers fast.
Please help me
Answer d
Explanation: