Why were most movies from the late 1890s until the early 1930s only filmed in black and white? The film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. There were only a few people who could afford the technology to produce color motion pictures back then. Color films had to be hand-colored, frame by frame. Audiences did not want color motion pictures until later.
Answer:
Color films had to be hand-colored, frame by frame.
Explanation:
Colored films were a rarity during the late 18th and early 19th centuries. Most movies were produced in black and white as the production of colored films was a difficult task as the films have to be hand-colored, frame by frame.
However, things began to change with the development of art and technology. While the dye is used to tint the color of certain scenes before, the new development in the films allows the capture of all scenes in color. But this does not mean that all films are shot in color. Most films continued to be shot in black and white even after the development of colored films.
Answer:
b
Explanation:
Businesses today suceed or fail based on their ability to
Answer:
their ability to Innovate with technology to meet their customers needs
Explanation:
ternary operators of computer
please explain.
Answer:
It's a compact way of doing an if-else statement.
General Format is
<condition> ? <if condition is true> : <else>;
Example:
I could rewrite:
if(a==1) temp = 1;
else temp = 999;
as
temp = (a==1) ? 1 : 999;
how to print the output of "WELCOME" by using python codes with arrays.
Answer:
Following are the code to this question:
arr=['WELCOME']#defining list arr and assign string value
print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes
Output:
WELCOME
Explanation:
The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.
In the above code "arr", that is list is declared, that store a string value.
To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.
are teaching a class on computer hardware to new IT technicians. You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides this functionality
Answer:
The chipset of the motherboard.
Explanation:
The chipset that is on the motherboard handles all the data flow management of the system. This includes all communications that will occur on the motherboard including communication between the CPU and the RAM.
The chipsets themselves are designd by the companies that create the CPUs but are integrated on the motherboards created by third-party vendors.
Hope this helps.
Cheers.
Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?
Answer:
The protocol will drop the packets
The application will automatically re-transmit the packets
Explanation:
Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum
Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.
You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on your network
Answer:
The answer is "Using the Domain Name System(DNS)".
Explanation:
It is the name database whereby web domain names were located or converted into their IP addresses. Its domain name maps its username used by users and finds a site at a user's IP range for the location of a site.
It includes the internet and also has DNS for any time search on the internet if they know this or not. It should recall the IP address of every device to access on the specific web site which you needed, that's why we can say that the DNS is used to implements on the internet.Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
Debug
Document
Error check
Restore
Answer:
Its A
Debug
Explanation:
I took the test
Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement
Answer:
A. Create a custom object tab.
Explanation:
The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization
While the custom object tab is a tab in which the data stored is displayed in the records of the custom object
Therefore according to the given situation, since the sales teams used the mobile app and want to create new insight records by using their phones
So for meeting this we should recommend creating a custom object tab
With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program starts executing. The C declaration (for example, "long sum[1000];") appearing outside any function causes this variable to be stored in _____.
Answer:
The answer is " Uninitialized data segment ".
Explanation:
It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").
If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.
Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien
Answer:
option a
Robonaut 2
Explanation:
it is also known as R2
hope it helped you:)
Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis
Since Ned is trying to decide how he wants to connect the nodes on the network he created, the two options that he has are option b and C:
b. Through hard cabling or wireless radio waves.
c. Through ethernet cables or Bluetooth.
What kind of cable does a computer system typically use to connect to a network?A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.
Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.
Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.
Learn more about ethernet from
https://brainly.com/question/28156384
#SPJ1
Convert
1. 116° to K
2. -39° to K
3. 450K to C°
As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase
Answer:
When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.
Explanation:
Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.
Answer:
The correct option is;
IT refers to everything that involves computers
Explanation:
Information technology (IT) are technology related to computing or computing systems
Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.
What features in Excel are the same as in Word?
What features are differ?
Answer:
Following are the difference and similarity between word and Excel:
Explanation:
The similarity in word and excel:
The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the Spreadsheet (tablet program). In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.The difference in word and excel:
In a word, it includes an application for text processing, and excel would be used for the tablet program. The word is used to create documents like assignments file data files, while excel is being used for the manipulation of numbers by mathematical equations.Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.
Answer:
The statement to this question can be defined as follows:
*strike_Counter =*strike_Counter +22;//adds value 22 in *strike_Counter
Explanation:
In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.
In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.
for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.
I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it was saying this please help...and yeah:( I’ll let give you fifty ..
Answer:
Sometimes phones do this, did you take it to the phone store?
Explanation:
In order to send and receive iMessages to your iPhone.
iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.
Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time
Answer:
See answer below
Explanation:
He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.
In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.
The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.
Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?
Answer:
A wand tool is to do that in an editing software.
Answer: Peter should use the burn tool
Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions
Answer:
To enable VI editor automatically display lines as numbered, the following steps must be taken:
Step 1: Press the Escape key to exit the insert or append mode.
Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.
The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.
Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc
Cheers!
Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()
Answer:
B) Measurable.sum (branchAccounts)
Explanation:
The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.
Write a Java program to compute the sum of the upper-rounded value of the number 4.2 and the square of 25. Display all the three values to the user on different lines, without any assignment operation in the entire program.
please answer.
Answer:
how do expect someone to write an entire java script code for you
Explanation:
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.
Which rule should be followed to stay safe online?
O Keep inappropriate messages private.
O Avoid sharing photos with anyone online.
O Keep screen names private.
Ask an adult for permission to download.
Answer:Avoid sharing photos with anyone online.
Explanation:in other to stay safe on the internet avoid sharing of your pic to strangers most especially pic with inappropriate dressing.... You can be manipulated.....
Answer:
B
Explanation:
Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language
Answer:
A,B,C
Explanation:
Which part of project management involves determining the overall work? Breakdown Incomes Scope Time
Answer:
Incomes
Explanation:
Project management has to do with the process of achieving a set goal with the help of a team within a specified time. Most times, the main problem that comes with project management is completing the project within the available constraints.
No project can start up without funds, which in this case is called income and this is the part of the project that determines the overall work.
Answer:
It's not income I just got it wrong I'm not really sure but I would assume it is breakdown I'm sorry if I'm wrong if I'm right please reward me brain list.
The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by dividing the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.
Answer:
The quicksort pivot is an arbitrary element within the collection that is being sorted. Using the pivot point, the collection of elements is partitioned into two smaller lists of elements. Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point. Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.
Cheers.
The pivot of a quicksort algorithm ought to always be the element in the middle. Some algorithms will choose the item in the center as the pivot, while others will choose the first or last element.
What is quicksort algorithm?Quicksort is a sorting method that operates in-place. It was created by British computer scientist Tony Hoare and is still a widely used sorting algorithm.
When properly implemented, it can be slightly faster than merge sort and two or three times faster than heapsort.
The quicksort pivot can be any element in the collection being sorted. The collection of elements is divided into two smaller lists of elements using the pivot point.
Smaller elements are placed to the left of the pivot point, while larger elements are placed to the right of the pivot point.
To optimize the creation of the two sub-lists into a balanced state, you would prefer your pivot point to be the median of your dataset.
Thus, this way quicksort works.
For more details regarding quicksort algorithm, visit:
https://brainly.com/question/13257594
#SPJ2
How are the waterfall and agile methods of software development similar?
Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.
Both methods focus on development rather than planning, in order for project teams to work more quickly.
Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.
Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.
Answer:
In the question "first and last", that is "option 1 and 4" is correct.
Explanation:
In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be defined as follows:
In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.Payroll deductions are the same for all employees. True False
Answer:
The answer is "False".
Explanation:
The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.
All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.