Answer:
your anwser is B
Explanation:
What is the "online disinhibition effect"?
Answer:
Online disinhibition is the lack of restraint one feels when communicating online in comparison to communicating in-person.
Difference between switch case and if else statement.
Answer:
SWITCH CASE:☆ STATEMENT WILL BE EXECUTED IS DECIDED BY USER.
☆ SWITCH STATEMENT EVALUATES ONLY CHARACTER 《OR 》INTEGER VALUE.
☆ IT USING SINGLE EXPRESSION FOR MULTIPLE CHOICES.
IF - ELSE STATEMENT.☆ STATEMENT WILL BE EXECUTED DEPEND UPON THE OUTPUT OF THE EXPRESSION INSIDE.
☆ IF THE STATEMENT EVALUATES INTEGER, CHARACTER, POINTER《 OR 》FLOATING- POINT TYPE 《 OR 》BOOLEAN TYPE.
☆ IF USING MULTIPLE STATEMENT FOR MULTIPLE CHOICES.
HOPE IT HELP....
In a response of approximately 50 words, explain why it would be essential for the successful A/V technician to participate in additional coursework, presentations and seminars offered by equipment manufacturers as well as annual conferences attended by colleagues in the industry.
Answer:
The A/V technician should participate in the additions coursework, seminars and presentations offered by the equipment manufacturers because it would give him more knowledge about the various products launched by the manufacturers, after the coursework it would be easier for him to repair the new range of products. It is important for the technicians to stay updated with the latest technical changes in the industry.
can we draw a formula triangle for velocity?
Answer:
Yes we can actually draw a formula triangle for velocity
Explanation:
I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity
Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
Answer:
FOR i% = 1 TO 100
IF ((i%\3) = i%/3) AND ((i%\7) = i%/7) THEN
PRINT i%
END IF
NEXT i%
Explanation:
Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.
The program outputs:
21
42
63
84
in object oriented programming what is a constructor?
a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object
Answer:
The answer is A.
Answer:
A. the attributes that allow a programmer to imagine a new object
Explanation:
Got the answer right on the test!
What can you use on the Internet to look for information?
Answer:
I use Wikipedia to know anything
1. Here is a program segment to find the quantity base . Both base and exp are entered at the keyboard. System.out.println("Enter base and exponent: "); double base = IO.readDouble();// read user input double exp = IO.readDouble(); // read user input /* code to find power, which equals baseexp */ System.out.print(base + " raised to the power " + exp); System.out.println(" equals " + power); Which code is a correct replacement for /* code to find power, which equals baseexp */ ?
Answer:
The correct code to this question can be de4fined as follows:
double power;
power = Math.pow(base, exp);
Explanation:
In the given question the choices were missing, that's why we defined the correct code only.
In the given code a two double variable "base and exp" is declared, that input the value from the user-side, and store its value into there respective variables. In the next step, "power", that is a double variable is declared, which uses the "Math.pow" function that calculates given values power and prints its value.please find the attachment of the full code.
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.a) trueb) false
Answer:
The answer is "Option a".
Explanation:
In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.
Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.
which of the following is not a selection tool in Adobe photoshop
a) Rectangular marquee tool
b) Single row marquee tool
c) Double row marquee tool
d) Single column marquee tool
The one that is not a selection tool in Adobe Photoshop is the single-row marquee tool. The correct option is b.
What is Adobe Photoshop?When working with pixel-based graphics created for print, the web, and mobile apps, Photoshop is your go-to program. With the help of robust editing tools, you can adjust exposure and color balance, crop and align photographs, change the colors in your shot, erase imperfections from a portrait, and integrate numerous images into a single scene.
Photoshop is still one of the greatest photo editing programs for beginners to learn, despite the fact that you can feel intimidated by it as a novice photographer. Adobe Photoshop is an editing program that works with layers, which can take some getting accustomed to but is worthwhile.
Therefore, the correct option is b) Single row marquee tool.
To learn more about Adobe Photoshop, refer to the link:
https://brainly.com/question/17356292
#SPJ6
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?
Options:
A Infrastructure mode
B Ad hoc mode
C a wireless access point
D static IP addresses
E APIPA
Answer:
A. Infrastructure mode
C. a wireless access point
Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).
Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.
Answer:
Following are the declaration of the array:
int westboundHollandTunnelTraffic [10] [52] [7] [24]; //defining an integer array that holds days, week, hour, and year value
Explanation:
In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.
In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.
Identify characteristics of structured programming design. Choose all that apply.
The code is easy to test and debug.
It creates a program made of modules that can be called when needed.
The code is difficult to modify due to the use of modules.
It uses logic flow.
The code is easier to follow.
The code is easier to modify.
Answer:
The correct options are;
The code is easy to test and debug
It creates programs made of modules that can be called when needed
It uses logic flow
The code is easier to follow
The code is easier to modify
Explanation:
The approach of structural programming is one such that the problem is well understood and the solution is economical
Features of structural programming includes;
Error debugging are facilitated by structural programs and as such testing to debugStructural program creates program modules that are reusableStructural programs can be easily modified hence maintainedStructural program emphasizes on logicThe structural program code is easily read and understood, and therefore, it is easier to followAnswer:
A.B.D.E.F.
Explanation:
pretty much everything except C.
:)
"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"
Answer:
The answer is "Five years (Two years)".
Explanation:
It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.
Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office. It also allows the phasing for the current map, that has been accepted.How do a router and switch differ when handling a message? Both a router and a switch use the message’s destination address to select the line to route the incoming message to. The switch will purposefully drop messages if message traffic exceeds its capacity. The router will purposefully drop messages if message traffic exceeds its capacity. There is no difference in how a router and a switch handle messages.
Answer:
The router will purposefully drop messages if message traffic exceeds its capacity.
Explanation:
As we know that the router and the switch are the connecting devices. The router works at the network layer and used for determining the shortest path
On the other hand the switch work is to connected many devices that are available in the network.
Therefore the correct option is second as the router also depicts when there is the purpose of the messaged drop[ed if the traffic of message exceeds than its capacity
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices
Complete Question:
You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?
Group of answer choices
A. ARP
B. SMTP
C. SNMP
D. Telnet
Answer:
C. SNMP.
Explanation:
In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.
SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).
Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.
A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function
Answer:
"Transport" is the correct answer.
Explanation:
Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.So that the above would be the correct approach.
Design a webpage on Artificial Intelligence/augmented reality
Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR
Explanation:
Question 13 (6.67 points)
Which of the following is NOT a benefit of a word processing application?
Provides automatic online backup
Offers professional document appearance
Allows easy sharing and collaboration
Saves time and increases efficiency
Answer:Offers professional document appearance
Explanation:
1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt
Answer:
D)
Explanation:
Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]
The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.
(Rocks Mineral
When limestone undergoes several changes, it forms
2
(marblelse
PA
For
the
are underground natural resources.
3. Metals are extracted from their
4. Molten rock inside the earth is called
5.
is used in making glass.
L
(magmalla
(Limestone/Sla
Yo
# Science-5
Answer:
TENDRIAS QUE PONER LA PREGUNTA MEJOR
Explanation:
how can development in ICT be utilized to speed up the development and integration efforts
Answer:
Explanation:
1. Sustainability and scale
2. Lack of knowledge
3. Pace of change
4. Funding
5. Changing roles and norms
You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?
Answer:
Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.
Explanation:
How a student can use computer to improve academic performance?
Answer:
k Nishant
Explanation:
he can learn many things internet by using computer he change his self by learning about many things
Answer:
A student can use it by searching up things with his/her computer.
Browse for different new things everyday that gives knowledge.
Ask questions.
Do new things everyday.
A computer can easily input grades and send data.
Explanation:
Okay.
100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate
Answer:
The two factors are:
The default gateway The routersExplanation:
Default gateway:
The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.The routers:
A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.The website allrecipes is a clearinghouse for recipes of all kinds, with users being able to post new ones as well as try and comment on the recipes of others. Members can get personalized recommendations and find ways to use ingredients they already have on hand. The allrecipes website would be considered
Answer:
The right answer is "web community ".
Explanation:
A digital community, commonly known as a social community as well as a web community, seems to be a virtual environment where representatives predominantly communicate over the internet. They become web-based community centers for stakeholders, specialists, collaborators, and many others to resolve issues, post feedback, including communicate with someone on the goods, services, and reputation of an organization. For several internet platforms, a "gang of silly superstitions" can feel most comfortable.Why is access to equipment so important to the education of an A/V technician? (Select all that apply).
A. A/V technicians have to learn how to use many different types of devices.
B. A/V technicians must become familiar with many different software programs.
C. A/V technicians for large companies often have to buy their own equipment.
D. A/V technicians are not always provided the equipment they need by their employers.
Answer:
The correct option is;
A. A/V technicians have to learn how to use many different types of devices
Explanation:
Sound recording, mixing boards, video monitors, projectors, speakers, and microphone equipment are set up and operated by audiovisual (A/V) technicians during concerts, live sport games, business meetings and conventions, TV and radio outdoors shoots and for on location assignments as well as equipment maintenance for universities and other organization. As such A/V it is essential for A/V technicians to develop manual dexterity on a wide variety of audiovisual equipment.
Answer:
For this one it is A: A/V Technicians have to learn how to use many different types of devices
but it may be worded differently, and if so its:
D:They need to learn how to use a wide variety of different types of equipment.
Explanation:
edg2021
Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.
Answer:
First two statements: yes. Last two: not so much.
But many of the better ones do have advanced degrees, but some don't.
The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.
It should be noted that statements are true about software engineers are;
They are responsible for writing programming code. They are usually strong problem-solvers.Software engineering can be regarded as branch of computer science which is responsible for the development as well as the building of computer softwares, these could be applications software or system software.
The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.
We can conclude that software engineers are strong problem-solvers.
Learn more about software engineer at:https://brainly.com/question/25757629
What purpose does the underlined portion of this excerpt
serve in the argument that Americans should agree to pay
more taxes to raise money for entering the war?
Answer:
The below mentioned portion is missing from the question
A part of the sacrifice means the payment of more money in taxes. In my Budget Message I shall recommend that a greater portion of this great defense program be paid for from taxation than we are paying today. No person should try, or be allowed, to get rich out of this program; and the principle of tax payments in accordance with ability to pay should be constantly before our eyes to guide our legislation.
The passage provides the reason why extra taxes must be collected should America decide to join the war or it introduces the claim that patriotic Americans should be willing to sacrifice and pay extra taxes.
50 POINTS TO WHOEVER CAN HELP ME! When your friend Sarah turns on his computer, she hears four beeps. The computer won’t fully boot. Sarah has a Dell computer with a quad-core processor and has recently upgraded her RAM. Apply the troubleshooting methodology to help her understand and resolve this problem; I have them listed below: Identify the Problem Internet Research Establish a Theory of Probable Cause Test the Theory Establish a Plan of Action Implement the Solution or Escalate Verify Full System Functionality Document Findings
Answer:
Unplug everything
unscrew and remove side panel
pop-out each memory card, blow on them and pop them back in (be sure the tabs lock back down)
Explanation:
Somehow one of the memory cards must have jiggled lose, even though they looked fine at first
Answer:
this is a memory card fail this could mean many different things like dust, but it ussualy isn't that serious if she has a new RAM, and if there is a problem she should have a warranty on her new RAM card