what its the difference between Arduinos and Assembler?

Answers

Answer 1

Answer:

The Arduino boards can be programmed in assembly. All you need is an ICSP Cable (In Circuit Serial Programmer) and the AVR toolchain (free from ATMEL) to write to the board. You then get the advantage of on board debugging.

As you suggested, you can just slap an ATMEL chip on a breadboard and go to town.

Explanation: cause i said so


Related Questions

To connect several computers together, one generally needs to be running a(n) ____ operating system

Answers

Answer:

Local Area Network

Explanation:

In the Information technology it is called Local Area Network.

How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.

Answers

there are ten letters in the word, so for the first position we can choose out of 10 option.

no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.

and 8 for the third place.

...

when we will have used up 9 of 10 letters, there will be only one option for the last place.

the number of possible decision-paths is therefore given by this expression:

10*9*8*7*6*5*4*3*2*1

wich is 3,628,800

there are quite a few ways to rearrange 10 letters

The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.

The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.

So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.

Learn more:

brainly.com/question/17276660

write a program that assigns values to
three variables, assigns the sum (adds
the three values to a variable called
total and prints total.

Answers

Explanation:

10:A program that assigns the sum 20,30,40

20: input 20,30,40

30:sum input

40: print total

End

Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?

Answers

Base to be converted to was not included but we would assume conversion to base 10(decimal)

Answer and Explanation:

The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:

We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.

3 = 0011

D = 1101

F = 1111

We then arrange the binary numbers in order

3DF base 16 = 1111011111 in base 2

We then convert to base 10 =

= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0

= 991 in base 10

Ranges of up addresses that anyone can use for their internal networks are known as

Answers

D. Nonroutable Address Space

What is the future of marketing automation?

Answers

Answer:

give me number I will explain fast I am free now reply bro I am waiting

Answer:

To put it into simple words: the future of marketing automation is customers centric.  

From data collection to lead generation, marketing automation will stay B2B marketers’ favorite in the future.  Based on the current analytics, let’s have a look at how automation is driving lead generation today as well as what’s to come.

It’s going to be all about customersPersonalization will become even more importantMore Jobs and Activities Will Require Marketing AutomationGeneric Content Will Become Almost Non-ExistentMarketers Should Stay Current With Marketing Automation for Maximum ROI

Marketing automation is a dynamic field and it will continue to evolve and transform processes in the future. If you in the marketing frontier, and looking to transform your lead generation processes, don’t be afraid to give marketing automation a shot.

Gray London is a retired race car driver who helped Dale Earnhardt, Jr. get his start. He is writing a book and making a video about the early days or Dale Earnhardt. He is trying to decide whether to market these items directly over the Internet or to use intermediaries. To make this decision, he needs to know the pros and cons of each route. Provide that information and make a recommendation to him.

Answers

Answer:

Explanation:

Marketing your product directly over the internet can lead to much greater profits and there are many options that you can choose from in order to target the correct audience. Unfortunately, doing so does require marketing knowledge and is basically like growing a business. If you were to use intermediaries they already have the knowledge necessary to market your product but will take a percentage of the profits, which will ultimately limit your gains. Since Gray London is a race car driver, I am assumming that he does not have any prior technological expertise or marketing expertise, therefore I would recommend using intermediaries.

Which of the following is a benefit of a digital network?

Security is enhanced.
Multiple devices can be connected.
Users are familiar with the software.
It makes using the internet easier.

Answers

Answer:

Multiple devices can be connected

The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.

What is Digital network?

In order to align the network with business demands, it has markets, data networks, and communications networks.

Digital networks' core are networking components like switches, routers, and access points. These tools are used to link networks to other networks, secure equipment like computers and servers connected to organizational networks, and analyze data being sent across networks.

Through cloud-enabled central administration, digital networks provide end-to-end network services for on-premises and cloud space. All network components are monitored, analyzed, and managed by a central server.

Therefore, The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.

To learn more about Technology, refer to the link:

https://brainly.com/question/9171028

#SPJ2

what is Microsoft word

Answers

Answer:

A software where you can document letters, essays or anything really.

Explanation:

the id selector uses the id attribute of an html element to select a specific element give Example ?​

Answers

Answer:

The id selector selects a particular html element

Explanation:

The id selector is uses the id attribute to select a specific html element. For example, if we have a particular header which is an html element and we want to give it a particular background color, we use the id selector and give it an id attribute in the CSS file. An example of an html header with id = 'blue' is shown below. The style sheet is an internal style sheet.

!doctype html

<html>

<head>

<title>Test</title>

<style>

#blue { background-color: blue;

}

</style>

</head>

<body>

<h1 id = 'blue'>Our holiday</h1>

<p>This is the weekend</p>

</body>

</html>

Answer to this problem

Answers

Answer:

hi..,.................................................

Which devices are managed through device management?

Device management is the process of managing
________devices.

Answers

Answer:

organization

Explanation:

The answer is organization I am thinking.

2. Which tab is used to edit objects on the Slide Master and layouts?
A. View
B. Insert
C. Shape format
D. Design

Answer is not A. View
It’s B. Insert

Answers

Answer:

it is....insert tab..B

Explanation:

insert tab includes editing options

3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking​

Answers

Answer:

C. log

Explanation:

The log is a sequence of log records, recording all the update activities in the database

hope this helps

Answer:

C. Log is the

answer

Explanation:

a sequence of log records recording all update activity in database

List and explain the type of networking​

Answers

Answer:

Used for everything from accessing the internet or printing a document to downloading an attachment from an email, networks are the backbone of business today. They can refer to a small handful of devices within a single room to millions of devices spread across the entire globe, and can be defined based on purpose and/or size.

We put together this handy reference guide to explain the types of networks in use today, and what they’re used for.

 

11 Types of Networks in Use Today

 

1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.

 

2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.

 

Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.

 

3. Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.

 

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.

 

5. Metropolitan Area Network (MAN)

These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).

 

6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.

 

The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.

 

7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.

 

8. System-Area Network (also known as SAN)

This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.

 

9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.

 

10. Enterprise Private Network (EPN)

These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.

 

11. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.

Which tools do you use for LinkedIn automation?

Answers

Explanation:

Automation tools allow applications, businesses, teams or organizations to automate their processes which could be deployment, execution, testing, validation and so on. Automation tools help increase the speed at which processes are being handled with the main aim of reducing human intervention.

Linkedln automation tools are designed to help automate certain processes in Linkedln such as sending broadcast messages, connection requests, page following and other processes with less or no human or manual efforts. Some of these automation tools include;

i. Sales navigator for finding right prospects thereby helping to build and establish trusting relationships with these prospects.

ii. Crystal for providing insights and information about a specified Linkedln profile.

iii. Dripify used by managers for quick onboarding of new team members, assignment of roles and rights and even management of subscription plans.  

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.  

Some other LinkedIn automation tools are;  

   Expandi      Meet Alfred      Phantombuster      WeConnect      LinkedIn Helper  

Hope this helps!

Write a removeDuplicates() method for the LinkedList class we saw in lecture. The method will remove all duplicate elements from the LinkedList by removing the second and subsequent elements. If there is only one copy of an element, it is not removed. The list size should shrink accordingly based on the number of duplicates removed.

Answers

Answer:

removeDuplicates() function:-

//removeDuplicates() function removes duplicate elements form linked list.

   void removeDuplicates() {

     

       //declare 3 ListNode pointers ptr1,ptr2 and duplicate.

       //initially, all points to null.

       ListNode ptr1 = null, ptr2 = null, duplicate = null;

       

       //make ptr1 equals to head.

       ptr1 = head;

        //run while loop till ptr1 points to second last node.

       //pick elements one by one..

       while (ptr1 != null && ptr1.next != null)

       {

               // make ptr2 equals to ptr1.

               //or make ptr2 points to same node as ptr1.

           ptr2 = ptr1;

           //run second while loop to compare all elements with above selected element(ptr1->val).

           while (ptr2.next != null)

           {

              //if element pointed by ptr1 is same as element pointed by ptr2.next.

               //Then, we have found duplicate element.

               //Now , we have to remove this duplicate element.

               if (ptr1.val == ptr2.next.val)

               {

                  //make duplicate pointer points to node where ptr2.next points(duplicate node).

                       duplicate = ptr2.next;

                       //change links to remove duplicate node from linked list.

                       //make ptr2.next points to duplicate.next.

                   ptr2.next = duplicate.next;

               }

               

             //if element pointed by ptr1 is different from element pointed by ptr2.next.

               //then it is not duplicate element.

               //So, move ptr2 = ptr2.next.

               else

               {

                   ptr2 = ptr2.next;

               }

           }

           

           //move ptr1 = ptr1.next, after check duplicate elements for first node.

           //Now, we check duplicacy for second node and so on.

           //so, move ptr1  by one node.

           ptr1 = ptr1.next;

       }

   }

Explanation:

Complete Code:-

//Create Linked List Class.

class LinkedList {

       //Create head pointer.

       static ListNode head;

       //define structure of ListNode.

       //it has int val(data) and pointer to ListNode i.e, next.

   static class ListNode {

       int val;

       ListNode next;

       //constructor to  create and initialize a node.

       ListNode(int d) {

               val = d;

           next = null;

       }

   }

//removeDuplicates() function removes duplicate elements form linked list.

   void removeDuplicates() {

       

       //declare 3 ListNode pointers ptr1,ptr2 and duplicate.

       //initially, all points to null.

       ListNode ptr1 = null, ptr2 = null, duplicate = null;

       

       //make ptr1 equals to head.

       ptr1 = head;

       

       

       //run while loop till ptr1 points to second last node.

       //pick elements one by one..

       while (ptr1 != null && ptr1.next != null)

       {

               // make ptr2 equals to ptr1.

               //or make ptr2 points to same node as ptr1.

           ptr2 = ptr1;

           //run second while loop to compare all elements with above selected element(ptr1->val).

           while (ptr2.next != null)

           {

              //if element pointed by ptr1 is same as element pointed by ptr2.next.

               //Then, we have found duplicate element.

               //Now , we have to remove this duplicate element.

               if (ptr1.val == ptr2.next.val)

               {

                  //make duplicate pointer points to node where ptr2.next points(duplicate node).

                       duplicate = ptr2.next;

                       

                       //change links to remove duplicate node from linked list.

                       //make ptr2.next points to duplicate.next.

                   ptr2.next = duplicate.next;

               }

               

             //if element pointed by ptr1 is different from element pointed by ptr2.next.

               //then it is not duplicate element.

               //So, move ptr2 = ptr2.next.

               else

               {

                   ptr2 = ptr2.next;

               }

           }

           

           //move ptr1 = ptr1.next, after check duplicate elements for first node.

           //Now, we check duplicacy for second node and so on.

           //so, move ptr1  by one node.

           ptr1 = ptr1.next;

       }

   }

   //display() function prints linked list.

   void display(ListNode node)

   {

       //run while loop till last node.

       while (node != null)

       {

               //print node value of current node.

           System.out.print(node.val + " ");

           

           //move node pointer by one node.

           node = node.next;

       }

   }

   public static void main(String[] args) {

       

       //Create object of Linked List class.

       LinkedList list = new LinkedList();

       

       //first we create nodes and connect them to form a linked list.

       //Create Linked List 1-> 2-> 3-> 2-> 4-> 2-> 5-> 2.

       

       //Create a Node having node data = 1 and assign head pointer to it.

       //As head is listNode of static type. so, we call head pointer using class Name instead of object name.

       LinkedList.head = new ListNode(1);

       

       //Create a Node having node data = 2 and assign head.next to it.

       LinkedList.head.next = new ListNode(2);

       LinkedList.head.next.next = new ListNode(3);

       LinkedList.head.next.next.next = new ListNode(2);

       LinkedList.head.next.next.next.next = new ListNode(4);

       LinkedList.head.next.next.next.next.next = new ListNode(2);

       LinkedList.head.next.next.next.next.next.next = new ListNode(5);

       LinkedList.head.next.next.next.next.next.next.next = new ListNode(2);

       //display linked list before Removing duplicates.

       System.out.println("Linked List before removing duplicates : ");

       list.display(head);

       //call removeDuplicates() function to remove duplicates from linked list.

       list.removeDuplicates();

       System.out.println("")

       //display linked list after Removing duplicates.

       System.out.println("Linked List after removing duplicates :  ");

       list.display(head);

   }

}

Output:-

Major findings of evolution of computers

Answers

Answer:

twitt

Explanation:

A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

Answers

Answer:

Job order production

Explanation:

A job order production has the least flexibility and is best suited for mass production.

It also has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

brainleist please..

Answer -------> Transfer line <---------

please click on the picture look at the PICTURE for the correct answer.

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do

Answers

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

The DevOps team is requesting read/write access to a storage bucket in the public cloud that is located in a backup region. What kind of services are they requesting

Answers

Answer:

Authorization

Explanation:

The kind of service that they are requesting is known as Authorization. This is basically when a user, such as the DevOps team in this scenario, is requesting permission to access a certain service or function that is locked. In this scenario, the services being requested are the read/write access which would allow the DevOps team to manipulate the data in the storage bucket. This is usually locked because the data is sensitive and innapropriate changes can cause many errors in the system. Therefore, authorization is needed to make sure that only specific users have access.

Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?

Answers

Answer:

Step Out

Explanation:

In the field of computer science, the control flow or the flow of control is defined as the order where the individual statements, [tex]\text{function calls}[/tex] or instructions of a program are [tex]\text{evaluated or executed. }[/tex]

The Step Out control flow program runs to the [tex]\text{end of the code block}[/tex] and it resumes the [tex]\text{break mode}[/tex] at the statement that it follows.

Write a method printShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline and decare/use loop variable. Example output for numCycles = 2:
1: Lather and rinse.
2: Lather and rinse.
Done.
import java.util.Scanner; 3 public class ShampooBottle 4 5 Your solution goes here / 7 public static void main (String [] args) ShampooBottle trialSize - new ShampooBottle); trialsize.printShampooInstructions (2) 10 Run View your last submission Your solution goes here / public void printShampooInstructions (int numCycles) f if (numCycles 1) System.out.printin("Too few.") else if (numCycles4) System.out.printin("Too many.") else System.out.println("Done."); for (int i = 1; i (z numCycles ; ++i){ System.out . printin (? + ": Lather and rinse.");

Answers

Answer:

if (numCycles < 1){

        System.out.println("Too few.");

     }

     else if (numCycles > 4){

        System.out.println("Too many.");

        }    

  else{

     for(int i = 1; i <= numCycles; i++)

  {

     System.out.println(i + ": Lather and rinse.");

  }

     System.out.println("Done.");

  }

 

Explanation:

Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for loop. Sort the ArrayList using the method Collections.sort. Output the sorted List. Shuffle the list, and output the shuffled list. Note that Collections (with an s) is a class, while Collection is an interface. The Collections class has many useful static methods for processing interfaces, including the sort method. Search for a name in the list that exists; output the location where it was found. Search for a name that is not in the list. What location is reported? Convert the list to an array using toArray. Output the elements of the array. Convert the array back into a list using asList. Output the elements of the list.

Answers

Answer:

---------------------------

Explanation:

12. How many different documents can
you have open at one time?

Answers

Answer:

10 documents ^_^

Explanation:

I can open it at the same time on my laptop ●~●

Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute the ASCII value of each character of the string and sum them up. You will thus need to calculate two sums, one for each string. Then, return true if the first string has a larger ASCII sum compared to the second string, otherwise return false. In your main function, prompt the user to enter two strings with a suitable message and provide the strings to the function during function call. The user may enter multiple words for either string. Then, use the Boolean data returned by the function to inform which string has the higher ASCII sum.

Answers

Answer:

The program in Python is as follows:

def ASCIIsum(str1,str2):

   asciisum1 = 0;    asciisum2 = 0

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

   if asciisum1 > asciisum2:

       return True

   else:

       return False

str1 = input("Enter first string: ")

str2 = input("Enter second string: ")

if ASCIIsum(str1,str2) == True:

   print(str1,"has a higher ASCII value")

else:

   print(str2,"has a higher ASCII value")

Explanation:

This defines the function

def ASCIIsum(str1,str2):

This initializes the ascii sum of both strings to 0

   asciisum1 = 0;    asciisum2 = 0

This iterates through the characters of str1 and add up the ascii values of each character

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

This iterates through the characters of str2 and add up the ascii values of each character

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

This returns true if the first string has a greater ascii value

   if asciisum1 > asciisum2:

       return True

This returns false if the second string has a greater ascii value

   else:

       return False

The main begins here

This gets input for first string

str1 = input("Enter first string: ")

This gets input for second string

str2 = input("Enter second string: ")

If the returned value is True

if ASCIIsum(str1,str2) == True:

Then str1 has a greater ascii value

   print(str1,"has a higher ASCII value")

If otherwise

else:

Then str2 has a greater ascii value

   print(str2,"has a higher ASCII value")

write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, remind users about the mistake.

Answers

Answer and Explanation:

Using Javascript programming language, to write this script we define a function that checks for empty variables with if...else statements and then uses a for loop to loop through all arguments passed to the function's parameters and print them out to the console.

function Check_Arguments(a,b,c){

var ourArguments= [];

if(a){

ourArguments.push(a);}

else( console.log("no argument for a"); )

if(b){

ourArguments.push(b);}

else( console.log("no argument for b"); )

if(c){

ourArguments.push(c);}

else( console.log("no argument for c"); )

for(var i=0; i<ourArguments.length; i++){

Console.log(ourArguments[i]);

}

}

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses, it does determine which systems are active on the network and what services they offer or what ports are available

Answers

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

Illustrate why Sally's slide meets or does not meet professional expectations?
Describe all the things Sally can improve on one of her slides?
Suggest some ways Sally can learn more PowerPoint skills.

Answers

The correct answer to this open question is the following.

Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.

However, trying to be of help, we can comment on the following general terms.

When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.

What Sally can improve about her slides is the following.

She can design a better structure for the presentation to have more congruence.

Sally has to clearly establish the goal or goals for her presentation.

She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.

If she can use more vivid colors instead of pale or dark ones, that would be best.

No paragraphs unless necessary. She better uses bullet points.

Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.

Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks

Answers

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

E. can solve many updating headaches for network managers who have large, growing, changing networks
Other Questions
Cross out three digits in the number 51489704 so that the resulting number is divisible by 45. What number is left? 8. A saturated solution of Ag Croq has a silver-ion concentration of 1.3 x 10-4M. Which is the Ksp of Ag CrO 4?O 1.3 x 10-4O 3.9 x 10-12O 6.5 x 10-5O 1.1 x 10-12 Please help me. Thank you HELP ME PLEASEEEEEE. !!! A football is punted so that its path is described by the function h(t) = -4.9(t - 3.5)2 + 15 where h(t) is the height of the football, in meters at time t, in seconds. What time in seconds does it take for the football to reach its maximum height? Round your answer to the nearest tenth. what is chemical reaction? Assume that different groups of couples use a particular method of gender selection and each couple gives birth to one baby. This method is designed to increase the likelihood that each baby will be a girl, but assume that the method has no effect, so the probability of a girl is 0.5. Assume that the groups consist of 40 couples. Complete parts (a) through (c) below. a. Find the mean and the standard deviation for the numbers of girls in groups of 40 births. The value of the mean is Na + Cl2 2NaClThe equation is because the number of atoms is on both sides of the arrow. Why is NAFTA considered harmful by some For any three rational numbers a, b, & c, we have a + (b+c) = (a+b)+c , this property is called A government is trying to promote industrialization. It is concerning because the country has few banks able to finance expensive industrial enterprises. It reaches out to wealthy foreign banks and encourages them to fund new factories and railroads within its borders. Which factor of production is the government described in this passage attempting to develop?A. Land B. CapitalC.Entrepreneurship D. Labor PLS HELP ASAP HOW DOES THIS= THISf(x)=2x^3-9x^2+11x-20....look at photo. true or false On planet Ghaap, two Gheeps are worth three Ghiips, two Ghiips are worth five Ghoops, and three Ghoops are worth two Ghuups. How many Ghuups are seven Gheeps worth? 100 POINTS!!!!!Directions: Respond to this question to demonstrate your understanding of the topic/content. Be sure to provide adequate and relevant details learned in the module to support your response. Pay close attention to organizing your response so it makes sense and uses correct grammar. Your response should be at least 5-7 sentences at a minimum. Question: Given answer the questions that follow.a. Your friend claims the graph of f(x)=2x increases at a faster rate than the graph of g(x)=x2 when x 0. Is your friend correct? Explain your reasoning.b. How are the 2 functions different? Find the volume of the triangular prism."14 fth=3A6 ft What is the area of a cross section that is parallel to face BFGC? help plsss1/2x^2 =2If x1 and x2 are the solutions to the equation above,what is the value of x1 + x2?A) 0B) 1C) 2D) 4 On June 5, Staley Electronics purchases 100 units of inventory on account for $10 each. After closer examination, Staley determines 20 units are defective and returns them to its supplier for full credit on June 9. All remaining inventory is sold on account on June 16 for $15 each.Required:Record transactions for the purchase, return, and sale of inventory. how to determine proofs A graph has time (years) on the x-axis and height (inches) on the y-axis. A line goes through points (2, 5) and (4, 10).The graph shows the height of a tree over time. What can you deduce the rate of change to be from 2 years to 4 years ?2 inch per year2.5 inches per year5 inches per year10 inches per year