Answer:
sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.
Explanation:
im just smart lol
Which of the components of the systems model provides information so
the system can adjust its function? *
A. input
B. feedback
C. process
D. output
Answer: Feedback
Explanation:
The input components of the systems model can consist of resources like people, energy, tools, capital, etc.
The feedback components of the systems model provides information so
the system can adjust its function. An example of the feedback mechanism for a system is the progress bar which shows when one is downloading a file on iTunes.
In today's digital world, companies have created software that makes business communication and productivity more efficient and effective. Explain why it is important for you to know how to use business communication tools such as the Microsoft Office Suite (i.e., Word, PowerPoint, Excel, etc.).
Include examples of some scenarios you faced or may face in the future (as both a student and in your career) that will require you to use these business communication tools.
300 + words
Answer:
Business communications tools are widely used and the world is becoming increasingly digital so not having those skills will hinder you.
Explanation:
Many jobs require knowledge of Microsoft tools as a qualification. By not having that expertise, I will be viewed as less qualified for a position and may be passed up for job. In corporate America, presentations are a staple and Microsoft PowerPoint is the primary software. If I deliver a poor presentation due to inexperience, I will make myself look bad and as a result get a bad quarterly review and possibly stunted any future promotions. On the flipside, as a business owner Excel is a handy tool for tracking expenses. Very customizable, quick and easy to understand.
Write 4 types of viruses , explain them briefly.
I can help with two.
Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.
FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.
In what way, if any, are scripting languages different from markup languages?
A) Markup languages tell the computer what content to present, while scripting languages make things run faster.
B) Markup languages tell a single computer what to do, while scripting languages help computers communicate with each other.
C) Scripting languages tell the computer what content to present, while markup languages make things run faster.
D) Scripting languages tell a single computer what to do, while markup languages help computers communicate with each other.
Answer:
Markup languages tell the computer what content to present, while scripting languages make things run faster. A
Answer:
It's most likely A in edge.
Explanation:
My father works in IT, and I am taking a Fundamentals of Dig. Media class. If I remember correctly, the lesson for markup languages said that markup is used for online documents, like Wiki for example. Thus, I believe it is A.
What are the steps for creating a bookmark? 1. Place the insertion point where the bookmark should appear. 2. Click the tab. 3. In the group, click Bookmark. 4. When a dialog box opens, name the bookmark, and click . 5. To see bookmarks within the document, go to Backstage view and click Options. 6. In , select Show Bookmarks to have them appear as a locked cursor within the document.
Answer:
2. Insert
3. Links
4. Add
6. Advanced
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
A website refers to the collective name used to describe series of web pages linked together with the same domain name.
On the other hand, a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).
A bookmark can be defined as a placeholder or saved shortcut for a webpage and for future reference. Thus, it avails an end user the ability to quickly access a bookmarked webpage by automatically directing the web browser to the webpage.
Basically, the steps for creating a bookmark are;
1. The insertion point of the webpage should be placed at the point where the bookmark should appear.
2. Click the "INSERT" tab.
3. In the "LINKS" group, click "Bookmark"
4. When a dialog box opens, the bookmark should be named with a specific title, and then click "ADD"
5. To see bookmarks within the HTML document, you should go to Backstage view and click on "Options"
6. In ADVANCED, select Show Bookmarks to have them appear as a locked cursor within the HTML document.
Which is a true statement about automation?
A)human intervention is needed to control all sequences of operations of a task.
B)human intervention is not needed at anytime in initiating or controlling sequences of operations.
C)using computer to control sequences of operations without human intervention.
D)computers are not needed to initiate or control any sequence of operations of a task.
Answer:
im guessing its a?
Explanation:
como se genera la electricidad con energias no renovables
porfa alguien me ayuda llevo muchas horas buscando la respuesta
doy corona y todos lo puntos que pueda
Answer:
efeiueur eiuube erferve
Explanation:
Answer:
La energia no renovable proviene de fuentes que se agotaran o no se repondran durante miles o incluso millones de años.
Los combustibles fósiles se queman para generar energía y electricidad. Por ejemplo, carbón.
Which tab is used to create a
new e-mail?
O File
O View
O Folder
O Home
Please help!!!!!!!!!!!!!
Answer:
Mail tab
Explanation:
Please mark as brainliest answer as it will also give you 3 points
spam and i report
Maurice wants to create a variable to store the name of the second-best taco place. Maurice writes the line of code as 2ndtaco = "Tio Dan's" but gets an error message. What is the problem with Maurice’s code?
A.
There can’t be an apostrophe ' in a variable name.
B.
The equals sign should be a dash.
C.
The type of variable wasn’t specified.
D.
A variable name can’t begin with a number.
Answer:
option d is the correct answer
Answer:
For your other question I think it's true
Explanation:
There are eight primitive data types in Java. If the the size of 4 different datatype sizes are as follows then what is maximum value they can store? Show using the chart as in our example.
Answer and Explanation:
The eight primitive data types in Java include:
byte , short , int , long , float , double , boolean and char.
By size of datatype we mean the amount of memory the data type occupies. For a 32-bit processor/CPU,
The size of int data type(with whole numbers from -2,147,483,648 to 2,147,483,647) in Java is 4 bytes
The size of byte data type is 1 byte
The size of short data type is 2 bytes
The size of long data type is 8 bytes
What will the Document search option search through?
Answer:
hi
Explanation:
nynttnynybynynynumkol0
Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9
Answer:
(a) [tex]\bar x_1 = 43.7[/tex] [tex]\bar x_2 = 30.25[/tex]
(b) [tex]\sigma_1 = 16.93[/tex] [tex]\sigma_2 = 7.14[/tex]
(c) Smoking increases the time to fall asleep
Explanation:
Solving (a): The sample mean of each group
Mean is calculated as:
[tex]\bar x = \frac{\sum x}{n}[/tex]
So, we have:
Smokers
[tex]n_1= 12[/tex] and
[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]
[tex]\bar x_1 = \frac{524.4}{12}[/tex]
[tex]\bar x_1 = 43.7[/tex]
Non Smokers
[tex]n_2 = 15[/tex] and
[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]
[tex]\bar x_2 = \frac{453.8}{15}[/tex]
[tex]\bar x_2 = 30.25[/tex]
Solving (b): The standard deviation of each group
This is calculated as:
[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
For smokers
[tex]n_1= 12[/tex]
So:
[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]
[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]
[tex]\sigma_1 = \sqrt{286.5491}[/tex]
[tex]\sigma_1 = 16.93[/tex]
For non-smokers
[tex]n_2 = 15[/tex]
So:
[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]
[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]
[tex]\sigma_2 = \sqrt{50.9469}[/tex]
[tex]\sigma_2 = 7.14[/tex]
Solving (c): Impact of smoking on time to sleep
In (b), we have:
[tex]\sigma_1 = 16.93[/tex] --- smokers
[tex]\sigma_2 = 7.14[/tex] --- non-smokers
Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.
Select three advantages of using Cascading Style Sheets.
A) They make it possible to give specific tags specific rules.
B) They make it simple to design web pages if you do not know HTML.
C) They make it easy to edit multiple parts of the document at once.
D) They provide information about changes made to websites.
E) They cut down on the amount of code needed.
Answer:
They make it easy to edit multiple parts of the document at once., They cut down on the amount of code needed., They make it possible to give specific tags specific rules.
what is meant by versatility in terms of features of computer?
Answer:
Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.
Explanation:
thank me later
Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.
What is versatility in computer?Computer is known to be a machine that is said to be versatile machine as it is made up of a lot of field and also involves in Multi-tasking.
Therefore, Versatility refers to the effort or ability of a computer to carry out different kinds of works and it is done that is done on the same level of accuracy and efficiency.
Learn more about Versatility from
https://brainly.com/question/26285269
#SPJ2
An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
Answer:
D. Operating system
Explanation:
A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.
Answer:
option A
Explanation:
Computer hardware is the physical parts or components of a computer, such as the monitor, mouse, keyboard.
Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Emails designed to trick users into sharing private information.
Answer:
Emails designed to trick users into sharing private information.
Explanation:
if that is a multiple choice question and the other sentences is the answer choices.
Given a string, an integer position, and a character, all on separate lines, find the character of the string in that position and replace it with the character read. Then, output the result.
Ex: If the input is:
warn
0
e
the output is:
earn
Note: Using a pre-defined string function, the solution can be just one line of code.
Answer:
The program in Python is as follows:
myStr = input()
pos = int(input())
chrr = input()
myList=[]
myList[:0]=myStr
myList[pos] = chrr
myStr =""
for i in myList:
myStr+=i
print(myStr)
Explanation:
This gets input for the string
myStr = input()
This gets input for the character position
pos = int(input())
This gets input for the incoming character
chrr = input()
Create an empty list
myList=[]
Convert the string to a list
myList[:0]=myStr
Replace the character
myList[pos] = chrr
Empty the string
myStr =""
Get the new string
for i in myList:
myStr+=i
Print the new string
print(myStr)
Following are the C++ program to replace the first index value of the string.
Program Explanation:
Defining header file.Defining the main method.Inside the main method three variable "Sval, Spos, Subchar" is declared in which "string, int, and char".After input variable value a string variable is declared with the at (method), which replaces the first index value with the character value.After replacing the first index value that is "0" use the prints method that prints its value.Program:
#include <iostream>//header file
#include <string>//header file
using namespace std;
int main() //main method
{
string Sval;//defining string variable
int Spos;//defining integer variable
char Subchar;//defining char variable
cin>>Sval>>Spos>> Schar;//input value
Sval.at(Spos) = Subchar; //using string variable that replaces the first index value with the character value
cout << Sval << endl;//printing the replaced value
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/24494143
An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance department files. Xander, a security analyst, confirms the files are corrupted. Xander is aware the Director possesses privileged access but not the security knowledge to understand what really happened. What does Xander believe happened
Answer: Malware infected the Director's machine and used his privileges
Explanation:
Malware simply means malicious software variants, which consists of spyware, viruses, ransomware etc. These can be used by cyberattackers to cause damage to data or in order to have access to a network.
With regards to the question, Xander believed that malware infected the Director's machine and used his privileges which results in the corrupt of the files.
What is the organizational management practices on planning during a pandemic like corona virus.
Answer:
wear a mask use hand sanitizer dont get in contact with anyone between 6 feet
Explanation:
What is the primary function of RAM?
What is the basic unit of measurement for RAM specs?
A computer with sufficient RAM will be able to
with greater ease.
What can you do if a computer is running slowly and you suspect it is because you have insufficient
RAM?
How many bits are in one computer byte?
those questions have a drop-down box.
Answer :
1 . Stores Information temporarily
2 . byte
3 . switch between applications
4 . upgrade the RAM
5 . 8
JUST DID IT (Edge 2021)
Write a program that takes as input: - the current hour - the number of hours to add and outputs the new hour. For example, if the inputs are 2 (as the current hour) and 51 (as the number of hours to add), your program should output the answer from part (a) of this problem. Note that your program should always output an integer between 1 and 12. We will get you started with this program with the two lines that gather the input from the user. You'll need to write the rest.
Answer:
The program in Python is as follows:
cTime = int(input("Current Hour: "))
while(cTime <1 ):
cTime = int(input("Current Hour: "))
aTime = int(input("Additional Hours: "))
while(aTime <0):
aTime = int(input("Current Hour: "))
tTime = cTime + aTime
tTime%=12
print("New:",tTime,"hours")
Explanation:
This gets input for current time
cTime = int(input("Current Hour: "))
The following ensures that the user enters a time greater than 0
while(cTime <1 ):
cTime = int(input("Current Hour: "))
This gets input for additional time
aTime = int(input("Additional Hours: "))
The following ensures that the user enters a positive time
while(aTime <0):
aTime = int(input("Current Hour: "))
This calculate the new hours
tTime = cTime + aTime
This gets the hour equivalent between 1 and 12
tTime%=12
This prints the new hour
print("New:",tTime,"hours")
in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle
Scientists have put genes into potato plants to make vaccines against cholera and hepatitis B.This type of research is called
Answer:
Edible vaccines
Explanation:
In the recent years, biotechnologist have developed a new concept known as the edible vaccines. The Edible vaccines are a subunit vaccines. Here the selected genes are first introduced into the plants and then the transgenic plant is induced to make the encoded protein. Foods like potato, corn, banana, soybean, lettuce, legumes and rice are used for these applications.
These edible vaccines can reduce diseases like the cholera, Hepatitis-B, diarrhea and other disease.
Need an answer as soon as possible please!
The lesson discusses ten "best practices" for digital recordings. Identify three of them and explain why they are important for ensuring a quality product.
(For a Digital Media Course)
Solution :
Digital recording may be defined as the preservation of an audio or some visual signals like the series of a binary numbers which can be stored on a magnetic tape or on an optical disc or some other digital storage media.
Some of the best practices for doing digital recording are :
1. We should always take permission from those who are being recorded. It is not right to shoot others without their permission. It is against the right to privacy.
2. We should record audio at about 44.1 kHz/16 bit in an uncompressed wave format.
3. A High quality MP3 (192 kbps or higher) is often accepted due to the limitations of a recorder or for a storage space.
The MP3 recordings are considered as the best option for certain recorders and when the storage space is severely limited. It produces a good quality recording.
Select three advantages to using digital video.
A) Digital video appears to have more depth.
B) Digital video can capture a greater range of brightness.
C) Digital video is much less expensive than film.
D) Digital video be easily edited and shared.
E) Digital video can be viewed in real time where it was taken.
Answer:
Digital video be easily edited and shared., Digital video is much less expensive than film., Digital video can be viewed in real time where it was taken.
Explanation:
What is the explanation of line 21-25
Answer:
The code is checking if a word in the word list matches a certain length and the first letter matches a certain letter... the for loop is what increments through the word list checking each word one by one for the specified conditions. If the word meets the conditions it is added to an array called filteredWordList.
Explanation:
Identify the correct way to cite the Occupational Outlook Handbook's "How to Become a Dentist" web page.
A.Occupational Outlook Handbook. "How to Become a Dentist." Bureau of Labor Statistics and US Department of Labor, 2012.
B."Occupational Outlook Handbook." How to Become a Dentist. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
C."How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
D.How to Become a Dentist, Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 2012. Web. 1 May 2013.
Answer:
C."How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
Explanation:
When citing an online publication without a known author, the title of the article is first stated and encapsulated in italics. This is then followed by the name of the website or book. The organization responsible for the write-up is indicated. A comma separates the name of the organization and the date when the article was written. 'Web' is written to show that the material was obtained online. Finally, the date that tells when the article was retrieved is noted.
This guideline applies to both the Modern Language Association and the American Psychological Association citation styles.
Answer:
Identify the correct way to cite the Occupational Outlook Handbook's "How to Become a Dentist" web page. awser:C Explanation: How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.
Five uses of the start button
Starting something
Possibly turning it off
Making something work
Fixing the Start Button
Beginning something
how much video does a 10gb video hold i will give brainliest for first correct answer
Answer:
2,000 songs
Explanation:
What information is automatically generated from the company identifier and product name?
A.
project name
B.
class prefix
C.
bundle identifier
D.
organization name