Answer:
I would say
1) Weather Station
2) (word missing)
3) Robot perihen devices
4) Bit
5) Primary Key
6) Algorithim
7) Flow Chart
8) Table Wizard
9) Design View
10) SIMS
Answer:
i think it would be 1) Weather Station
2) (word missing)
3) Robot perihen devices
4) Bit
5) Primary Key
6) Algorithim
7) Flow Chart
8) Table Wizard
9) Design View
10) SIMS
Explanation:
I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it was saying this please help...and yeah:( I’ll let give you fifty ..
Answer:
Sometimes phones do this, did you take it to the phone store?
Explanation:
In order to send and receive iMessages to your iPhone.
iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.
Which rule should be followed to stay safe online?
O Keep inappropriate messages private.
O Avoid sharing photos with anyone online.
O Keep screen names private.
Ask an adult for permission to download.
Answer:Avoid sharing photos with anyone online.
Explanation:in other to stay safe on the internet avoid sharing of your pic to strangers most especially pic with inappropriate dressing.... You can be manipulated.....
Answer:
B
Explanation:
Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement
Answer:
A. Create a custom object tab.
Explanation:
The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization
While the custom object tab is a tab in which the data stored is displayed in the records of the custom object
Therefore according to the given situation, since the sales teams used the mobile app and want to create new insight records by using their phones
So for meeting this we should recommend creating a custom object tab
Why were most movies from the late 1890s until the early 1930s only filmed in black and white? The film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. There were only a few people who could afford the technology to produce color motion pictures back then. Color films had to be hand-colored, frame by frame. Audiences did not want color motion pictures until later.
Answer:
Color films had to be hand-colored, frame by frame.
Explanation:
Colored films were a rarity during the late 18th and early 19th centuries. Most movies were produced in black and white as the production of colored films was a difficult task as the films have to be hand-colored, frame by frame.
However, things began to change with the development of art and technology. While the dye is used to tint the color of certain scenes before, the new development in the films allows the capture of all scenes in color. But this does not mean that all films are shot in color. Most films continued to be shot in black and white even after the development of colored films.
Answer:
b
Explanation:
ternary operators of computer
please explain.
Answer:
It's a compact way of doing an if-else statement.
General Format is
<condition> ? <if condition is true> : <else>;
Example:
I could rewrite:
if(a==1) temp = 1;
else temp = 999;
as
temp = (a==1) ? 1 : 999;
Convert
1. 116° to K
2. -39° to K
3. 450K to C°
Write a Java program to compute the sum of the upper-rounded value of the number 4.2 and the square of 25. Display all the three values to the user on different lines, without any assignment operation in the entire program.
please answer.
Answer:
how do expect someone to write an entire java script code for you
Explanation:
Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
Debug
Document
Error check
Restore
Answer:
Its A
Debug
Explanation:
I took the test
What features in Excel are the same as in Word?
What features are differ?
Answer:
Following are the difference and similarity between word and Excel:
Explanation:
The similarity in word and excel:
The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the Spreadsheet (tablet program). In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.The difference in word and excel:
In a word, it includes an application for text processing, and excel would be used for the tablet program. The word is used to create documents like assignments file data files, while excel is being used for the manipulation of numbers by mathematical equations.Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time
Answer:
See answer below
Explanation:
He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.
In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.
The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.
Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information
Answer:
B. Ahmad is installing new software to improve the ease of accessing the database.
C. Shania is creating a printed handbook of company policies for new employees.
D. Ian is making updates to the company website to include the latest product information
Explanation:
Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,
1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.
Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language
Answer:
A,B,C
Explanation:
Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.
Answer:
The correct option is;
IT refers to everything that involves computers
Explanation:
Information technology (IT) are technology related to computing or computing systems
Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.
With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program starts executing. The C declaration (for example, "long sum[1000];") appearing outside any function causes this variable to be stored in _____.
Answer:
The answer is " Uninitialized data segment ".
Explanation:
It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").
If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.
how to delete audio from powerpoint
Answer:
To delete an audio clip, select the audio icon on the slide and press Delete.
Hope it helps!!!!
As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase
Answer:
When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.
Explanation:
Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()
Answer:
B) Measurable.sum (branchAccounts)
Explanation:
The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.
Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien
Answer:
option a
Robonaut 2
Explanation:
it is also known as R2
hope it helped you:)
Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?
Answer:
The protocol will drop the packets
The application will automatically re-transmit the packets
Explanation:
Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum
Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.
Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions
Answer:
To enable VI editor automatically display lines as numbered, the following steps must be taken:
Step 1: Press the Escape key to exit the insert or append mode.
Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.
The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.
Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc
Cheers!
Question 19 :A user needs the video capability in his computer upgraded to support a new graphics application. The computer includes an onboard video card. You install a new video card in the computer. You need to disable the onboard video card. Where should this card be disabled
Answer:
The onboard video card should be disabled in the BIOS. After you disable the onboard video card in the BIOS, it will no longer function.
Explanation:
Since in the question a user wants to upgrade for new graphics application and also the computer involves the onboard video card and a new video card is installed in the computer now you want to disabled it
So this can be done in the BIOS i.e basic input output system which is to be used for rebooting the computer system
And after disabled it, you cannot used.
Businesses today suceed or fail based on their ability to
Answer:
their ability to Innovate with technology to meet their customers needs
Explanation:
Which part of project management involves determining the overall work? Breakdown Incomes Scope Time
Answer:
Incomes
Explanation:
Project management has to do with the process of achieving a set goal with the help of a team within a specified time. Most times, the main problem that comes with project management is completing the project within the available constraints.
No project can start up without funds, which in this case is called income and this is the part of the project that determines the overall work.
Answer:
It's not income I just got it wrong I'm not really sure but I would assume it is breakdown I'm sorry if I'm wrong if I'm right please reward me brain list.
are teaching a class on computer hardware to new IT technicians. You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides this functionality
Answer:
The chipset of the motherboard.
Explanation:
The chipset that is on the motherboard handles all the data flow management of the system. This includes all communications that will occur on the motherboard including communication between the CPU and the RAM.
The chipsets themselves are designd by the companies that create the CPUs but are integrated on the motherboards created by third-party vendors.
Hope this helps.
Cheers.
Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.
Answer:
The statement to this question can be defined as follows:
*strike_Counter =*strike_Counter +22;//adds value 22 in *strike_Counter
Explanation:
In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.
In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.
for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.
The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by dividing the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.
Answer:
The quicksort pivot is an arbitrary element within the collection that is being sorted. Using the pivot point, the collection of elements is partitioned into two smaller lists of elements. Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point. Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.
Cheers.
The pivot of a quicksort algorithm ought to always be the element in the middle. Some algorithms will choose the item in the center as the pivot, while others will choose the first or last element.
What is quicksort algorithm?Quicksort is a sorting method that operates in-place. It was created by British computer scientist Tony Hoare and is still a widely used sorting algorithm.
When properly implemented, it can be slightly faster than merge sort and two or three times faster than heapsort.
The quicksort pivot can be any element in the collection being sorted. The collection of elements is divided into two smaller lists of elements using the pivot point.
Smaller elements are placed to the left of the pivot point, while larger elements are placed to the right of the pivot point.
To optimize the creation of the two sub-lists into a balanced state, you would prefer your pivot point to be the median of your dataset.
Thus, this way quicksort works.
For more details regarding quicksort algorithm, visit:
https://brainly.com/question/13257594
#SPJ2
Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?
Answer:
A wand tool is to do that in an editing software.
Answer: Peter should use the burn tool
Payroll deductions are the same for all employees. True False
Answer:
The answer is "False".
Explanation:
The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.
All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.
how to print the output of "WELCOME" by using python codes with arrays.
Answer:
Following are the code to this question:
arr=['WELCOME']#defining list arr and assign string value
print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes
Output:
WELCOME
Explanation:
The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.
In the above code "arr", that is list is declared, that store a string value.
To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.