Answer:
A
the minimum number of digits needed to represent a number in that system
Zareen used a school computer to create a fake
website where she posted pictures and rude
comments about her former friend.
What consequences could she face from school
officials for her actions? Check all that apply.
She could have her technology privileges taken
away.
She could face a severe financial penalty.
She could spend time in a juvenile detention facility.
She could face detention or suspension.
O She could be forbidden from attending school social
events.
She could be denied access to certain websites.
Answer: She could have her technology privileges taken away, She could face detention or suspension, She could be forbidden from attending school social events, She could be denied access to certain websites.
Explanation: ADEF on Edge 2021
The consequences could Zareen face from school are-
She could have her technology privileges taken away.She could be denied access to certain websites.She could face detention or suspension.What is a computer?A computer is referred to as an electronic device that is used to perform arithmetic and logical operations quickly and accurately without causing any error in the result.
In the given case, it is explained that A girl named Zareen used a school computer to post comments inappropriate and rude comments about her former friend by creating a fake website.
This shows that Zareen has violated someone's personal privacy which can result in severe actions against her so the school may restrict her to use this kind of website.
As she disturbs someone's personal or social image it can cause her with suspension from school. The school may restrict her to use any kind of technology due to her immature and rude behavior.
Learn more about computers, here:
https://brainly.com/question/1380748
#SPJ5
WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also change to tell more of the what?
Group of answer choices
game creation process
instructions
game story
animation
Answer:
Game story
Explanation:
Answer:
Game Story
Explanation:
Write a program to generate the following series using nested loop.
1
2
12345
22
1234
12
222
123
123
1234
2222
12
12345
22222
1
Answer:
12 3456 2.2 12 .222 234 806 227 6697
Answeete
Explanation:
Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is
this?
А. NIC
В. hub
C. modem
D. switch
E. bridge
Your ____ should always be bigger than your gutters
How do you find the Layout dialog box for changing the layout options of an image in a Word document? Use the
drop-down menus to complete the steps.
1
2. Click the
3. Click
4. Click
at the bottom of the pop-up menu.
Answer:
1. Select the image
2. Format tab
3. the position button
4. more layout options
Explanation:
Answer:
How do you find the Layout dialog box for changing the layout options of an image in a Word document? Use the drop-down menus to complete the steps.
1. ✔ Select the image (C)
2. Click the ✔ Format tab (B)
3. Click ✔ the Position button (B)
4. Click ✔ More Layout Options (A) at the bottom of the pop-up menu.
Explanation:
Doing it on EDG right now!
Good luck and have a good day :)
Binary to Denary
11101111=
1111111=
Answer:
1110111= 239
1111111=127
Explanation:
The method is 1 ,2 ,4 ,8 16, 32 ,64 let me know if this helped g
Select the correct answer.
Which of these factors can be created as a physical model?
OA
a next-generation car
OB.
software code
OC. website address
OD.
conversion of energy
O E knowledge of a product
A. a next generation car
PLEASE I REALLY NEED HELP
I have an hp laptop and it is FROZEN!! I cannot press x out of any of my tabs and the whole thing is frozen but I can pull up my settings and I can move my mouse. Shutting it off/down didn't work and it's still frozen please tell me what to do. also, will restarting it log me out of my whole account(s)? I NEED HELP PLEASEE
First try shutting down your computer for 5 minutes.
Turn it on if tabs are still open, try to right click it and press delete if you have that.
if you have none of your acounts try to make anew accounts the add a account to the new account you just made. still having peroblems, let me know?
Answer:
wait to it dies or hold the shut down button till it turns off
Explanation:
Answers are 1-11, 3 is wrong
Answer:is the python
Explanation:
Use repl .it
Rebecca's school has planned an excursion to the nearest TV production studio. Rebecca noticed cameras on stands that send signals directly to
the production control room for collaboration with other cameras. Which camera is the production house using for recording?
OA
prosumer camera
OB
studio camera
OC.
DSLR camera
OD
Glidecam
Search online for the various configuration processors available. Mention the brand names that are widely used.
Answer:
Some of the configuration processors that are available are:
Phenom X4: Phenom X4 is the first quad-core microprocessor family that depends on K10 microarchitecture. Phenom X4 CPUs make use of four-digit model numbers that begin with 9. The remaining three digits in the model number show relative processor performance.
Athlon: Athlon is a seventh generation x86 processor. Athlon dynamically buffers internal microinstructions at runtime. These microinstructions result from parallel x86 instruction decoding.
Sempron: The first Sempron CPUs depended on the Athlon XP architecture using the Thoroughbred or Thorton core. These models were equipped with the Socket A interface, 256 KiB L2 cache, and 166 MHz front-side bus (FSB 333). These models use different technologies and CPU socket formats.
Opteron: Opteron is AMD's x86 server and workstation processor line. It was the foremost processor to support the AMD64 instruction set architecture. The Opteron processor has an integrated memory controller that supports DDR SDRAM, DDR2 SDRAM, or DDR3 SDRAM (depending on the processor generation). This both decreases the latency penalty for accessing the main RAM and does not require a separate northbridge chip.
The brand names widely used are Intel and AMD.
The configuration processors available are
Phenom X4AthlonSempronOpteronIntel and AMD are the two most commonly utilized brand names.
What are configuration processors?The path through a business process or operation is represented by a processor. By selecting the Configure option with the right mouse click, you can configure a processor. A processor's type and name are automatically the same.
The computer needs both processing power and instructions, which the processor delivers. The clock speed of a processor should be your first consideration. Your computer will run faster if the clock speed is higher.
Different architectures are used to build the various CPU kinds. Processors with one, two, four, six, eight, or twelve cores are the most common types of CPUs.
Learn more about configuration processors, here:
https://brainly.com/question/10710240
#SPJ5
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Answer and explanation:
There are many benefits of writing functions that use parameters and return. Some of them are:
1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.
public void showName(String name){
System.out.println("Your name is " + name);
}
To call this method (function), the programmer could use various values for the name parameter used in the function like so:
showName("John");
showName("Doe");
If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.
2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.
For example:
public String getDouble(int x){
int y = x * 2
return y;
}
The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.
The image shows a bar graph.
A bar graph shows a series of 4 vertical bars along an x and y axis.
In which scenarios would using this graph be best for a presentation? Check all that apply.
showing change in a community’s average median age over a century
comparing the percentages of the types of pets owned in a community
showing how the world’s shark population has changed over 50 years
comparing the number of men and women who earned engineering degrees in a decade
showing the percentages of the various religions practiced in Indonesia
Answer:
showing change in a community’s average median age over a century
showing how the world’s shark population has changed over 50 years.
comparing the number of men and women who earned engineering degrees in a decade
Explanation:
In the human digestive system, which mechanism is responsible for cutting and grinding food?
A) organ
B) stomach
C) teeth
D)
intestines
Answer:
teeth
Explanation:
Ugh these are hard questions
What can we do to positive interaction online?
Answer:
We can help eachother out with things.
Explanation:
Eg. Schoolwork and homework because our stress level will decrease.
17. What is something an employer might look for in person when hiring? (3
points)
A. Someone with a positive attitude
B. Someone with positive qualities such as honesty, tolerance, and
patience
C. Someone easy to work with
D. All of the above
When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС
Answer:
c,becauses she is helping
Explanation:
thank me later
Answer:
A
Explanation:
i got a 100
what is a password attack?
Answer:
A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.
Answer:
A hacker trying to hack into your accounts/systems by cracking your password.
Erin would like to add a photo to a presentation. However, she only has the printed copy of the photo. She does not have a digital copy. What should Erin do?
Answer:
Erin should scan the photo.
Took it on Edge <3
Answer:
Erin should scan the photo.
Explanation:
That´s what I thought :)
Provides an array of buttons for quick access to commonly used commands and tools
A. scroll bar
B. tool bar
C. status bar
D. menu bar
Answer:Tool bar
Explanation:
The toolbar is said to provide an array of buttons for quick access to commonly used commands and tools. Through the toolbar, one can easily access the commands that are commonly used.
We can see the toolbar in several software like the graphics editor, office suites, and browsers.
is this very epik or not?
Answer:
e p i k ༼ つ ◕_◕ ༽つ
Answer:
much epic
Explanation:
On December 9, 1698, computer inventor Douglas Engelbart demonstrated many new computing technologies, including the computer mouse. His demonstration was so important that it became known as “The Mother of All Demos”. It would be at least two decades before some of the technologies he demonstrated saw widespread use, but all of them are used by people today. Here is a list fo some of Engelbart’s technologies. Which ones do you use today? The computer mouse, video conferencing hypertext links, word processing, or collaborative real-time editing
Answer:
all of them
Explanation:
Answer: All trust guy above
Explanation:
.
Which of the following types of information can be stored in an electronic database?
-Text
-Alphanumeric
-Date
-All of the above
The types of information that can be stored in an electronic database is text, alphanumeric, and also date. The correct option is D.
What is a database?A database is a structured collection of information or data that is typically stored electronically in a computer system. A database management system is usually in charge of a database (DBMS).
Any collection of data or information that has been specially organized for rapid search and retrieval by a computer is referred to as a database.
Databases are designed to make it easy to store, retrieve, modify, and delete data in conjunction with various data-processing operations.
Text, alphanumeric, and date information are all examples of information that can be stored in an electronic database. A database's five major components are hardware, software, data, procedures, and database access language.
Thus, the correct option is D.
For more details regarding a database, visit:
https://brainly.com/question/6447559
#SPJ3
Approximately how many tweets are posted on Twitter each day? 500 500 thousand 500 million 500 billion
Answer:
around 500 million
Explanation:
What is the purpose of a Post Mortem Review? (5 points)
Answer:
The interpretation of the discussion is characterized throughout the explanation portion below.
Explanation:
A post-mortem investigation, as well widely recognized as the autopsy, has become a post-mortem assessment of that same body. This same goal of some kind of post-mortem should be to investigate what happened. Post-mortems have been performed by pathologists (Physicians specializing in considering the mechanisms as well as tends to cause including its illness).
Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
After skimming a message, you can mark it as
if you want to come back to it later.
Categories are color coded and can be renamed and sorted in the
pane.
The Outlook command for “flagging” a message is called
.
Flagged messages can be viewed in the
and can be customized for name, due date, and reminders.
Answer:
unread
message
follow up
to-do bar
Explanation:
Where do the projection lines converge in a perspective sketch?
Answer:
Option B, Vanishing point
Explanation:
The complete question is
Where do the projection lines converge in a perspective sketch?
A. the ground line
B. the vanishing line
C. the eye point
D. the horizon line
Solution
A point lying on the image of a perspective drawing where the drawings ( two-dimensional perspective projections) of two parallel line meet in three dimensional space is known as Vanishing point
Help me please. I'LL MARK BRAINIEST
Answer:
A and B
Explanation:
yes