Answer:
B. JavaScript
Explanation:
It is very useful to easily create a good website with it.
what is 8 4/7 divided by 15
Answer: 4/7
Explanation:
8 4/7 ÷ 15
60/7× 1/15
=4/7
ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.
Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.
then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.
I hope this help you to understand
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the graphics? DOCX PDF MP3 MPEG
Answer:
MpEg
Explanation:
Answer:
Explanation:
brainliest please
(Correct Answer Recieves Brainliest)
The excerpt is a sample works-cited list.
A typed list of citations titled Works cited, with W and C capitalized. There are 3 citations. The turnovers for the second and third citations set flush left. There is extra space between citations. The first words in each citation, from top to bottom, are Keegan, Keller, South. The third citation does not have an access date.
Based on MLA standards, how could this list be improved?
alphabetize according to title
change it to a bibliography
order it according to in-text citations
use hanging indents in the second line
Answer:
D
Explanation:
What will be the result of the following lines of CSS?
body{
background-color:yellow;
}
A.
The background of the header will be yellow.
B.
The text will be highlighted yellow.
C.
The background of the body of the webpage will be yellow.
D.
The photo will change to a yellow box if the user clicks on the photo.
Answer:
C.
Explanation:
The correct option that explains the result of the given lines of CSS is:
C. The background of the body of the webpage will be yellow.
The CSS code provided sets the background color of the body element to yellow. The "body" selector targets the entire body of the webpage, and the "background-color" property sets the background color to yellow. This means that the background of the entire webpage will be displayed in yellow.
Answer:
C. The background of the body of the webpage will be yellow.
Why isn't my brainly post being answered?
Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.
Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?
Answer:
I think they should show one subject per month so students are more prepared
Answer: some changes that should be made are dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .
Explanation:
(I made this up teehee) what anime is katski bakugo from
Which of the following options shows the correct code to increase a player’s lives by an amount equal to a variable called hits?
A.
lives == lives + hits
B.
hits == lives + hits
C.
lives = lives + hits
D.
lives + hits = lives
The answer is C.
The line lives = lives + hits increments a player's lives by an amount equat to hits.
Typing on a Keyboard is an example of ______
a) Input
b) Output
c) Processing
d) Storage
Answer:
Input
Explanation:
Typing on a keyboard is an example of input.
Example if I have 13 answers one day in brainly.com and the next day
I get 15 will I have 28 answers??
Answer:
Yes you should
Explanation:
13+15=28
THE FIRST PERSON THAT ANSWER THIS QUESTION GETS 18 POINTS AND BRAINLY!!!!!
You are creating an online form for a streaming music service. Users will need to enter at what point they want their contract to end. Which data type should you use?
Boolean
char
date
string
Answer:
data
Explanation:
Open the NetBeans IDE and create a new project named MySizes.java. Your program should do the following:
Declare and initialize an int variable for the comparison expression (waist measurement).
Assign a value to the variable to be used as the customer’s response for the program.
Create a switch-case statement that includes three cases and a default statement. Use appropriate conditional operators ( =, >) to define the three case comparisons.
Create output lines for each case, stating the appropriate pant size.
Create a default statement if the customer waist measurement does not match any case.
Then, Create nested if statements that accomplishes the same results.
( I really need this for a project, it doesn't need to be correct it just needs to look like it is, this is in Java )
Explanation:
Open the NetBeans IDE and create a new project named MySizes.java. Your program should do the following:
Declare and initialize an int variable for the comparison expression (waist measurement).
Assign a value to the variable to be used as the customer’s response for the program.
Create a switch-case statement that includes three cases and a default statement. Use appropriate conditional operators ( =, >) to define the three case comparisons.
Create output lines for each case, stating the appropriate pant size.
Create a default statement if the customer waist measurement does not match any case.
Then, Create nested if statements that accomplishes the same results.
( I really need this for a project, it doesn't need to be correct it just needs to look like it is, this is in Java )
1. A virtual network of websites connected by hyperlinks is called
A. a browser
B. a URL
C. the internet
D. the World Wide Web
2. The Domain Name System translates the URL into
A. a client
B. an IP address
C. a website
D. a web browser
the answer of the first McQ is a and second one is b
Answer:
1 Option D is correct: World wide web
2 Option B is correct: Ip addresses
I have a 50$ GameStop gift card, What should I buy????
If you have a P s 4 or a P s 5 you should buy V bucks for F o r t n i t e
Or Rec Room Bucks
Or if you have a Nintendo then buy those small chip games like animal crossing
What are the pros and cons of doing research for homework projects online over using offline resources like libraries?
How do solar ovens track the sun as it moves during the day?
Answer:
A sort of solar thermal collector is a solar cooker. It "collects" and retains the thermal (heat) energy of the Sun. When high frequency light (visible and ultraviolet) is transformed into low frequency infrared radiation, heat is created.
Explanation:
Which is one of the modes of game advertising?
A.
media
B.
hoardings
C.
transport
D.
schools
Answer:
I'm pretty sure its A
Explanation:
The Media it the biggest platform rn
Answer:
A more people will be able to see
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
You can find this out on Brainly! Recycling one glass jar saves enough energy to watch television for _ hours It's one of the fun facts!
Recycling one glass jar saves enough energy to watch television for 3 hours.
blank are defined by how a company interacts with customers and employees
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
what software is my teacher using to do this and how can i stop her from doing this
Answer:
I’m not sure if you can only teachers can acess that
Explanation:
How do you get brainlist answers?
Answer:
you have to answer a question where there's already an answer or you answer a question and wait for someone else to answer it. when there are 2 answers, the person who asked the question will choose someone's answer to be brainliest. ( the brainliest answer is usually the better answer out of the 2 basically)
Explanation:
Answer:
1)Give a helpful answer:Avoid guessing or choosing an answer you are unsure of. Remember, you’ll only get the extra points if you give the correct answer.
2)Always explain:It’s important to know WHY. Great explanations are what makes Brainly awesome.
3)Start from the basics
Explain everything. Imagine that the person who was asking, knows nothing at all so you need to start from the very beginning.
4)Include steps
Always include the steps and/or background required to get to the final answer. Let’s help other people understand and solve future problems on their own
Explanation:
"+", "-", "x" are Arithmetical operators. "AND, "OR", "NOT" are which operators.
Answer:
+, -, *, % are Arithmetical operators because they do math operations
&(AND), | (OR), ! (NOT) are Logic Operators and they do logic gates operations on the bits.
ok 2 things please 1. i need one more question to add if u can come up with anything or what not and 2. please answer the following questions in the picture i need as many answer a s posable por favor nod nod thank youu
Answer:
5 siblings, 1 trip per month, 14 age, 12 hours of sleep, 2 hours games, 5 pairs of shoes owned
Explanation: i don't know if this is what u meant, but i hope this helps....
Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?
Answer:
A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:
Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.Answer:
Explanation:
Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
Brainliest for correct answer
Which of the following statements describes circuit boards?
They have billions of tiny switches.
They operate according to the decimal system.
They have been replaced in modern computers by hard drives.
They make the keyboard function properly.
Answer: A
Explanation: Been asked before.