Answer:
False
Explanation:
Hope this helps!
Approximately how many tweets are posted on Twitter each day? 500 500 thousand 500 million 500 billion
Answer:
around 500 million
Explanation:
navy use sonar method to locate the position of submarine under water .the waves used in sonar are
4.8 Code Practice: Question 2 I need help on this one python
Answer:
for y in range(88, 43, -4):
print(y, end=" "
Explanation:
yw
Binary to Denary
11101111=
1111111=
Answer:
1110111= 239
1111111=127
Explanation:
The method is 1 ,2 ,4 ,8 16, 32 ,64 let me know if this helped g
Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is
this?
А. NIC
В. hub
C. modem
D. switch
E. bridge
17. What is something an employer might look for in person when hiring? (3
points)
A. Someone with a positive attitude
B. Someone with positive qualities such as honesty, tolerance, and
patience
C. Someone easy to work with
D. All of the above
WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also change to tell more of the what?
Group of answer choices
game creation process
instructions
game story
animation
Answer:
Game story
Explanation:
Answer:
Game Story
Explanation:
What is the base of a number system?
A.
the minimum number of digits needed to represent a number in that system
B.
the place value of the leftmost digit in numbers written in that system
C.
the place value of the rightmost digit in numbers written in that system
D.
the number of symbols used to represent numbers in that system
Answer:
A
the minimum number of digits needed to represent a number in that system
On December 9, 1698, computer inventor Douglas Engelbart demonstrated many new computing technologies, including the computer mouse. His demonstration was so important that it became known as “The Mother of All Demos”. It would be at least two decades before some of the technologies he demonstrated saw widespread use, but all of them are used by people today. Here is a list fo some of Engelbart’s technologies. Which ones do you use today? The computer mouse, video conferencing hypertext links, word processing, or collaborative real-time editing
Answer:
all of them
Explanation:
Answer: All trust guy above
Explanation:
.
Your ____ should always be bigger than your gutters
Help me please. I'LL MARK BRAINIEST
Answer:
A and B
Explanation:
yes
In the human digestive system, which mechanism is responsible for cutting and grinding food?
A) organ
B) stomach
C) teeth
D)
intestines
Answer:
teeth
Explanation:
Where do the projection lines converge in a perspective sketch?
Answer:
Option B, Vanishing point
Explanation:
The complete question is
Where do the projection lines converge in a perspective sketch?
A. the ground line
B. the vanishing line
C. the eye point
D. the horizon line
Solution
A point lying on the image of a perspective drawing where the drawings ( two-dimensional perspective projections) of two parallel line meet in three dimensional space is known as Vanishing point
What can we do to positive interaction online?
Answer:
We can help eachother out with things.
Explanation:
Eg. Schoolwork and homework because our stress level will decrease.
is this very epik or not?
Answer:
e p i k ༼ つ ◕_◕ ༽つ
Answer:
much epic
Explanation:
Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
After skimming a message, you can mark it as
if you want to come back to it later.
Categories are color coded and can be renamed and sorted in the
pane.
The Outlook command for “flagging” a message is called
.
Flagged messages can be viewed in the
and can be customized for name, due date, and reminders.
Answer:
unread
message
follow up
to-do bar
Explanation:
what is the mass of a cookbook
Answer:
it varies on the size of the cookbook
Explanation:
Which pair of devices have the same input motion and different outputs?
scissors and adjustable wrench
nutcracker and can opener
musical instrument and adjustable wrench
salad tongs and nutcracker
Answer:
nutcracker and can opener
Explanation:
When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС
Answer:
c,becauses she is helping
Explanation:
thank me later
Answer:
A
Explanation:
i got a 100
Write a program to generate the following series using nested loop.
1
2
12345
22
1234
12
222
123
123
1234
2222
12
12345
22222
1
Answer:
12 3456 2.2 12 .222 234 806 227 6697
Answeete
Explanation:
Answers are 1-11, 3 is wrong
Answer:is the python
Explanation:
Use repl .it
Rebecca's school has planned an excursion to the nearest TV production studio. Rebecca noticed cameras on stands that send signals directly to
the production control room for collaboration with other cameras. Which camera is the production house using for recording?
OA
prosumer camera
OB
studio camera
OC.
DSLR camera
OD
Glidecam
what is a password attack?
Answer:
A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.
Answer:
A hacker trying to hack into your accounts/systems by cracking your password.
Search online for the various configuration processors available. Mention the brand names that are widely used.
Answer:
Some of the configuration processors that are available are:
Phenom X4: Phenom X4 is the first quad-core microprocessor family that depends on K10 microarchitecture. Phenom X4 CPUs make use of four-digit model numbers that begin with 9. The remaining three digits in the model number show relative processor performance.
Athlon: Athlon is a seventh generation x86 processor. Athlon dynamically buffers internal microinstructions at runtime. These microinstructions result from parallel x86 instruction decoding.
Sempron: The first Sempron CPUs depended on the Athlon XP architecture using the Thoroughbred or Thorton core. These models were equipped with the Socket A interface, 256 KiB L2 cache, and 166 MHz front-side bus (FSB 333). These models use different technologies and CPU socket formats.
Opteron: Opteron is AMD's x86 server and workstation processor line. It was the foremost processor to support the AMD64 instruction set architecture. The Opteron processor has an integrated memory controller that supports DDR SDRAM, DDR2 SDRAM, or DDR3 SDRAM (depending on the processor generation). This both decreases the latency penalty for accessing the main RAM and does not require a separate northbridge chip.
The brand names widely used are Intel and AMD.
The configuration processors available are
Phenom X4AthlonSempronOpteronIntel and AMD are the two most commonly utilized brand names.
What are configuration processors?The path through a business process or operation is represented by a processor. By selecting the Configure option with the right mouse click, you can configure a processor. A processor's type and name are automatically the same.
The computer needs both processing power and instructions, which the processor delivers. The clock speed of a processor should be your first consideration. Your computer will run faster if the clock speed is higher.
Different architectures are used to build the various CPU kinds. Processors with one, two, four, six, eight, or twelve cores are the most common types of CPUs.
Learn more about configuration processors, here:
https://brainly.com/question/10710240
#SPJ5
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Answer and explanation:
There are many benefits of writing functions that use parameters and return. Some of them are:
1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.
public void showName(String name){
System.out.println("Your name is " + name);
}
To call this method (function), the programmer could use various values for the name parameter used in the function like so:
showName("John");
showName("Doe");
If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.
2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.
For example:
public String getDouble(int x){
int y = x * 2
return y;
}
The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.
Select the correct answer.
Which of these factors can be created as a physical model?
OA
a next-generation car
OB.
software code
OC. website address
OD.
conversion of energy
O E knowledge of a product
A. a next generation car
Which of the following types of information can be stored in an electronic database?
-Text
-Alphanumeric
-Date
-All of the above
The types of information that can be stored in an electronic database is text, alphanumeric, and also date. The correct option is D.
What is a database?A database is a structured collection of information or data that is typically stored electronically in a computer system. A database management system is usually in charge of a database (DBMS).
Any collection of data or information that has been specially organized for rapid search and retrieval by a computer is referred to as a database.
Databases are designed to make it easy to store, retrieve, modify, and delete data in conjunction with various data-processing operations.
Text, alphanumeric, and date information are all examples of information that can be stored in an electronic database. A database's five major components are hardware, software, data, procedures, and database access language.
Thus, the correct option is D.
For more details regarding a database, visit:
https://brainly.com/question/6447559
#SPJ3
How does using list make a program easier to develop and maintain
Answer:
Kindly check explanation
Explanation:
List is a built in data type used in programming languages, it consists of data enclosed in square brackets []. A llust has different functionality most of which makes development and maintenance of programs easier. Some of the core usefulness of a list include its ability to incorporate different types of data such as strings, int, floats and so on in just a single list. Lists also be created in a list (called list of lists). Deletion of list elements, searching through elements in a list, replacement of values in the list and appending new data values to an already existing list. Lists also provides an easy way to loop through elements embedded in them and list operations can be carried out simultaneously.
Lists are simply data types that can hold multiple values of different data types using one variable.
Usefulness
As its definition implies, it is used to hold different values.Take, for instance:
num1 = 5
num2 = 10
The above statements can be combined into a list as follows:
num[] = [5,10]
The data types of the values in the list may not be the same.The following is another correct definition of a list
person_details = ["Kaitlyntoohey",29,45.6]
The above list contains a string, an integer and a float datatype.
Lastly, a list can also contain a list.Read more about lists at:
https://brainly.com/question/14284563
Ugh these are hard questions
PLEASE I REALLY NEED HELP
I have an hp laptop and it is FROZEN!! I cannot press x out of any of my tabs and the whole thing is frozen but I can pull up my settings and I can move my mouse. Shutting it off/down didn't work and it's still frozen please tell me what to do. also, will restarting it log me out of my whole account(s)? I NEED HELP PLEASEE
First try shutting down your computer for 5 minutes.
Turn it on if tabs are still open, try to right click it and press delete if you have that.
if you have none of your acounts try to make anew accounts the add a account to the new account you just made. still having peroblems, let me know?
Answer:
wait to it dies or hold the shut down button till it turns off
Explanation: