Answer:
the names and ages of children
Anyone who know how to use canva .com please make a logo of the name : Deadly Sins
Answer:
Yes ma'am as in the anime?
Explanation:
Cuz there's a anime show called 7 deadly sins or just deadly sins?
Answer:
hello give the person above brainlist
Explanation:
According to forrester, what emerging technology is likely to improve service and create efficiencies by replacing many tasks that depend upon humans, such as customer service representatives, truck drivers, and taxi drivers?
According to forrester, the emerging technology that is likely to improve service and create efficiencies by replacing many tasks that depend upon humans, such as customer service representatives, truck drivers, and taxi drivers is Augmented and Virtual Reality.
What exactly is augmented reality?A computer-generated perception of the real world is enhanced through an interactive experience called augmented reality. Augmented reality uses software, apps, and hardware like AR glasses to superimpose digital material over actual settings and objects.
Therefore, AR enhances a real-world scene, while VR provides an immersive virtual experience. While just 25% of AR is virtual, VR is 75% virtual. Unlike AR, VR requires a headgear device. While AR users interact with the real world, VR users navigate through a wholly made-up environment.
Learn more about Augmented and Virtual Reality from
https://brainly.com/question/22621708
#SPJ1
State 3 limitations of the ancient methods of information transmission
Answer:
(I put two more just incase )
1 lack of speed. 2 lack of sustainability.3 fragile4 low security measures.5 lack of comparabilityHow to write a pseudocode to read a sequence of numbers terminated by the number 999 and print the sum of the positive numbers and the product of the two numbers
Answer:
The pseudocode (1) and (2) is as follows:
Pseudocode (1):
sum = 0
input n
while n ! = 999
if n > 0
sum+=n
Print sum
Pseudocode (2):
Input n1, n2
product = n1 * n2
Display product
Explanation:
Pseudocode (1):
sum = 0 --- Initialize sum to 0
input n --- Input a number
while n ! = 999 --- The loop is repeated until 999 is entered
if n > 0 --- Check if n is positive
sum+=n --- Compute the sum, if true
input n --- Get another input
Print sum --- Print the calculated sum
Pseudocode (2):
Input n1, n2 --- Get input for both numbers
product = n1 * n2 --- Compute their products
Display product --- Print the calculated product
Which of the following is not one of the three defining characteristics of a portal? A) commerce B) content C) auctions D) navigation of the Web
The three fundamental features of a portal do not include auctions. The three defining virtues of portals are personalisation, consistency, and integration.
What is the portal's architecture?Architecture is the art and technique of designing and building, as opposed to the skills associated to construction. Drawing, imagining, planning, designing, and building are all procedures that go into the creation of buildings and other structures.
What role does the portal play?Clients can easily access pertinent information via portals, including FAQs, troubleshooting advice, company and product data, and much more. This data is accurate and current thanks to well-managed portals. Major general portals include AOL.com by America Online, Yahoo, Excite, Netscape, Lycos, CNET, and Microsoft Network.
To know more about portal visit:-
https://brainly.com/question/29315516
#SPJ4
Which of the following is an example of an application ?
_______ consists of the programs that control or maintain the operations of the computer and its devices. A. A graphical user interface (GUI) B. A communications device C. System software D. Application software
The term that consists of the programs that control or maintain the operations of the computer and its devices is system software.
This software controls or maintains the functioning of the computer, its hardware, and its software applications.
It plays a key role in managing the computer's memory, input/output, and processing.
The system software provides a platform for the applications to run on.
It is the bridge between the hardware and the application software.
System software consists of several programs such as an operating system, device drivers, utility programs, and more.
System software includes the following:
Operating system
Device driversUtility programs: Language translatorsFirmwareThe operating system is the most important and essential system software.
The operating system is responsible for managing the hardware resources and providing common services for the application software.
Know more about programs here:
https://brainly.com/question/30783869
#SPJ11
A metaphor of human-computer interaction (HCI) in which interacting with the computer, is much like carrying on a conversation is called a _______ metaphor.
HURRY GIVING BRAINLIEST AND ALL MY POINTS and I only have 40
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
4. Use two variables to store your message.
Answer:
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
4. Use two variables to store your message
Explanation:
Answer:
A few sentences about you .
Explanation:
why do we have layers in the osi model and protocols in general? mention the seven layers of the osi stack, and describe the basic function of each layer.
We have layers in the OSI model and protocols in general to ensure organized communication between different systems, enhance Compatibility, and facilitate troubleshooting.
The seven layers of the OSI model are:
1. Physical Layer: Handles the transmission of raw data as bits through physical mediums such as cables or wireless signals.
2. Data Link Layer: Establishes a reliable link between two network nodes, handles error detection and correction, and manages data frames.
3. Network Layer: Routes and manages data packets between different networks, determining the optimal path for data transmission.
4. Transport Layer: Provides reliable end-to-end data communication by managing data segmentation, flow control, and error correction.
5. Session Layer: Establishes, manages, and terminates sessions between applications on different devices, allowing them to exchange data.
6. Presentation Layer: Translates, encrypts, and compresses data to ensure compatibility between applications on different systems.
7. Application Layer: Provides the interface for users and applications to interact with the network, enabling tasks like email and web browsing.
Each layer plays a specific role, allowing for a modular approach to communication and making it easier to implement and update protocols.
To Learn More About Compatibility
https://brainly.com/question/29822179
SPJ11
Sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. Which of the following might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP?
a. OID b. TRAP c. TTF d. MIB
The option that might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP is option a. OID.
What purpose do database files serve?Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases. Any type of data can be stored, maintained, and accessed using databases.
Hence, A string of decimal integers called an object identifier (OID) uniquely identifies an object. These things are usually an attribute or an object class. You can supply the object class or attribute name added with -oid if you don't have an OID.
Learn more about OID from
https://brainly.com/question/29441658
#SPJ1
A professional photographer working for a top newspaper would like control over the quality and editing
process of digital photos. Which file format should be used on the digital camera to ensure the
photographer has this flexibility?
A. AI
B. JPEG
C. RAW
D. SVG
Answer:
RAW
Explanation:
raw usually gives you the best quality possible and its easy to go through the editing process with flexibility compared to the other options.
Answer: raw
Explanation: got a 100%
Which type of cryptography uses two mathematically linked keys, one key encrypting the data and the other decrypting the data?
Asymmetric
Encoding
Firewall
Symmetric
Answer:
Asymmetric.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
There are two (2) main types of encryption techniques used in cryptography and these are;
I. Symmetric encryption.
II. Asymmetric encryption.
Asymmetric encryption is a type of cryptography which uses two mathematically linked keys, one key encrypting the data and the other decrypting the data. These two keys are generally referred to as a public key and a private key respectively.
This ultimately implies that, a pair of key (two keys) that are different in values is required or needed to make a computer system secured.
Please please please help I beg I'll give brainiest. :(
A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable
Answer:
A) toggle switch B) Push to Make switch C) Monostable
Explanation:
toggle because it needs to go off when the timer ends and not when u press a button
Push to make because you turn the timer off manually
Monostable because it needs to go off once not repeatedly
Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?
A.
repeater
B.
modem
C.
switch
D.
bridge
what is the code i need to do
What will the Document search option search through?
Answer:
hi
Explanation:
nynttnynybynynynumkol0
A student entering high school is pursuing STEM education. What can you infer about this student?
Answer: according to my calculations, we can infer that the student is pursuing a STEM education
Explanation:
Answer:
he likes Science, technology, engineering, and mathematics
Explanation: beacause it makes sense
Define columns ,types of columns and it's stability and
equilibrium conditions?
The column stability factor, or CP, ought to be set to 1.0 when calculating the crushing stress of a wood compression member.
A parameter in the calculation of the allowable compressive stress for wood compression members is the column stability factor, or CP. It considers the thinness proportion of the part, which is the proportion of the successful length of the part to its least sweep of gyration.
The allowable compressive stress in wood design is determined by a variety of equations and factors based on the member geometry, loading conditions, and type of wood. One usually involved condition for wood pressure individuals is the Euler clasping condition, which decides the basic clasping load for a thin section.
Learn more about crushing stress here :
brainly.com/question/30214665
#SPJ4
Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in the theme. which feature should she apply to modify the theme to her liking? a. background style b. edit master slides c. theme variantsd. custom slide
The best particular design theme can be done through a few modifications using theme variants.
What is Theme Variant?
When a theme is applied to a presentation, the right corner of the Design tab displays variations of the selected theme.
Variants are different versions or designs of the currently selected theme Variations give your presentation a different look.
Why do we need theme variant?
Themes provide a quick and easy way to change the design of your presentation. They determine the basic color palette, basic fonts, slide layout and other important elements All elements of the theme work well together, meaning you spend less time formatting your presentation
To know more about theme visit:
https://brainly.com/question/20004132
#SPJ1
an employee complains that a windows pc cannot connect to the internet. a network technician issues the ipconfig command on the pc and is shown an ip address of 169.254.10.3. which two conclusions can be drawn? (choose two.)
The PC is not receiving a valid IP address from the network's DHCP server and that it is using an automatic private IP addressing (APIPA) address.
What is IP address?Each device connected to a computer network that uses the Internet Protocol is given a unique numerical label known as an IP address. In most networks, IP addresses are assigned to devices dynamically by a DHCP (Dynamic Host Configuration Protocol) server, which assigns a unique IP address to each device on the network.If a device is unable to obtain a valid IP address from the DHCP server, it may use an APIPA address instead. APIPA addresses are reserved for use in situations where a device is unable to obtain a valid IP address from the DHCP server, and are in the range of 169.254.0.0 to 169.254.255.255. When a device uses an APIPA address, it means that it is unable to communicate with the DHCP server and may not be able to access the internet or other resources on the network.To learn more about IP address refer :
https://brainly.com/question/14219853
#SPJ4
Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?
A.
alongside the development of the app
B.
after the app has been developed
C.
during the testing phase
D.
during the design phase
Answer:
C option
Explanation:
Because in testing phase the game has been developed and test for errors in game.
Jack is a forensic specialist who wants to examine a network router for potential evidence in a case. What is the first step he should take to safely examine the router
The step that can be carried by Jack for the safe examination of the router as the case evidence is connecting the router to the network.
What is a network router?The network router is given as the connection between the two networks that mediate the delivery of the packed information.
The safety of the router in the forensic evidence is important as the incorrect connection resulting in corruption and deletes all the data.
Being the specialist, to check the router, the first step to be followed by Jack was connecting the router to the network.
Learn more about routers, here:
https://brainly.com/question/15851772
#SPJ1
what is crowd sourcing
Answer:
The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
Explanation:
Just search on the internet
The DESCRIBE TABLE command defines a SQL table's structure by listing its columns, data types, and column lengths. true or false
True, the DESCRIBE TABLE command in SQL defines a table's structure by listing its columns, data types, and column lengths.
The DESCRIBE or DESC command in SQL is used to display the structure of a table. When you run the DESCRIBE command on a table, it will list the columns of the table along with their data types, column lengths, and any constraints that have been defined on the columns. This information can be helpful in understanding the structure of the table and the types of data it contains.
For example, to describe the structure of a table named employees, you would use the following command:
DESCRIBE employees;
This command will display the column names, data types, and lengths of the columns in the employees table. The output of the command will vary depending on the database management system being used.
To know more about database management system (DBMS) visit:
https://brainly.com/question/13266483
#SPJ11
supposed that, your computer is a part of a company domain, and if there is a malicious connection in this device that you saw in the netstat results, what would your recommendation be for effective incident response in a company domain? how would you handle this case in the whole company network?
If there is a malicious connection on a computer that is part of a company domain, it is important to take immediate action to prevent further damage.
Here are the steps I would recommend for effective incident response:
1. Disconnect the affected computer from the network: This will prevent the malicious connection from spreading to other devices on the network.
2. Notify the IT department: The IT department should be notified immediately so that they can begin investigating the incident and taking appropriate action.
3. Run a malware scan: Use a reputable malware scanner to scan the affected computer and remove any malicious software that is found.
4. Change all passwords: It is important to change all passwords associated with the affected computer and any other accounts that may have been compromised.
5. Conduct a thorough investigation: The IT department should conduct a thorough investigation to determine the source of the malicious connection and take steps to prevent similar incidents from occurring in the future.
6. Implement additional security measures: This may include updating software and security protocols, implementing additional firewalls, and providing employee training on cybersecurity best practices.
By taking these steps, you can effectively respond to a malicious connection in a company domain and prevent further damage to the network.
Learn more about company domain:
https://brainly.com/question/16381617
#SPJ11
Choose the correct term to complete the sentence.
______ uses objects that represent classes to manage, manipulate, and store data.
•Object-defined programming
•Object-oriented programming
•Oriented programming
Answer:
Object-oriented programming
Explanation:
When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).
Answer: Object-oriented programming
Explanation: got it right on edgen
Complete the Car class by creating an attribute purchase_price (type int) and the method print_info that outputs the car's information. Ex: If the input is:
2011
18000
2018
where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs: Car's information: Model year: 2011 Purchase price: $18000
Current value: $5770
Note: print_infol should use two spaces for indentation. LAB: Car value (classes) \\ ACTIVITY & \end{tabular} main.py Load default template... 1 class Car: 2. def__init__(self): 3. self.model year=0
4. self. purchase_price=0
5. self.current_value=0
6
7. def calc_current_value(self, current_year): 8. self.current_value=round(self.purchase_price∗(1−0.15)∗∗(current_year - self.model_year)) 9. 10. def print_info(self): 11. print("(ar's information:") 12. print(" Model year:", self.model_year) 13. print(" Purchase price: \$", self.purchase_price) 14. print(" Current value: \$", self.current_value)
Answer:
class Car:
def __init__(self):
self.model_year = 0
self.purchase_price = 0
self.current_value = 0
def calc_current_value(self, current_year):
self.current_value = round(self.purchase_price * (1 - 0.15) ** (current_year - self.model_year))
def print_info(self):
print("Car's information:")
print(" Model year:", self.model_year)
print(" Purchase price: ${:,}".format(self.purchase_price))
print(" Current value: ${:,}".format(self.current_value))
Explanation:
The purchase_price attribute has been added to the init() method and that the print_info() method now formats the purchase price and current value with commas using the format() function.
do u see abs??????????
Answer
of course, y u askin tho, im pretty sure every person who doesnt have a sight disability can see her abs as well
Explanation:
in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4
Answer:
c)4
Explanation:
Hope it could helps you