Answer:
c). act as brain.
Explanation:
brain thinks and learns, so it covers a and d
[tex].[/tex]
When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?
a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used
what is web browser give answerwh
at is web browser
Answer:
A software application used to access information on the World Wide Web is called a Web Browser.
Explanation:
When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.
List the resulting array after each call of the merge method. Indicate the number of character-to-character comparisons made for each call to merge (line 22 of the merge method at the end of the assignment). Sort the following array of characters into alphabetical order: C Q S A X B T.
01 public static void mergesort (char[] a, int i, int r){
02
03 if (1 >= r) {
04 return;
05 }
06 int middle = (1+r)/2;
07 mergesort(a, l, middle);
08 mergesort(a, middle+1, r);
09 merge(a, l, middle, r);
10 }
11
12 public static void merge (char[] a, int i, int m, int r){
13
14 //copy lower half of the array into b
15 char [] b = new char[m-1+1];
16 for (int i = 0; i <= m-1; i++ ) {
17 b[i] = a (1+i);
18 }
19
20 int i = 0, j m+1, k = 1;
21 while (i <= m-1 && j <= r ) {
22 if (a[j] < b[i]) {
23 a[j];
24 k += 1;
25 j += 1;
26 } else {
27 a[k] b[i];
28 k += 1;
29 i += 1;
30 }
31 }
32 while (i <= m-1) {
33 a[k] b[i];
34 k += 1;
35 i += 1;
36 }
37 while ( j <= r ) {
38 a[k] a[j];
39 k += 1;
40 j += 1;
41 }
42 }
Answer:
40j
Explanation:
the no. divided by one is that no.
Consider the following program written in C syntax:
void swap(int a, int b) {
int temp;
temp = a;
a = b;
b = temp;
}
void main() {
int value = 2, list[5] = {1, 3, 5, 7, 9};
swap(value, list[0]);
swap(list[0], list[1]);
swap(value, list[value]);
}
. Passed by value-result
Answer:
5=swap 0
Explanation:
becouse it is invalid
Type two statements. The first reads user input into person_name. The second reads user input into person_age. Use the int() function to convert person_age into an integer.
Answer:
brainliest
Explanation:
Which unit of the computer works as the input
Answer:
Center Processing Unit ....
What method is known as a class's constructor, because it is run automatically when a user instantiates the class
A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. ... Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.
explain the working system of a computer with an example
Answer:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
Hoped it helps you.Answer:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
Explanation:
A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.
what do these two parts of the lift do?
Answer:
The Big Bang Theory is our best guess about how the universe began. A 2013 map of the background radiation left over from the Big Bang, taken by the ESA's Planck spacecraft, captured the oldest light in the universe. This information helps astronomers determine the age of the universe. ... The "Big Bang Theory" TV show.
1.1 The Android smart watch as presented in Figure 4 could be regarded as a computer. Is this statement true or false? Provide a detailed motivation of your answer.
Answer:
false a watch and laptop are completely different.
Explanation:
help me to solve this
Answer:
Hello!
Mouse-points and selects gui objects
Printer-it produces hard copy output
Alu- performs mathematical calculations
Rom-the instructions stored in it cannot be changed by the user
pendrive- can be considered as a small external hard disk
P.S. please follow me and also mark me as the brainliest ;)
Answer:
the answer is :
1-4
2-5
3-1
4-3
5-2
What are the things you needed to create a bootable USB Windows Installera
Answer:
RUFUS
Explanation:
Try installing rufus software and burn the ISO file on your USB by choosing appropriate partition scheme MBR or GBT. Usually MBR works for all computers but GPT is for new systems with latest technology.
Need help coding this it uses input and I need to use the words good and morning
Answer:
x = input ("Enter a word: ")
y = input ("Enter a word: ")
print ( x, " ", y)
Explanation:
This is the simplest way to write it using Python.
How do you keep a class running after you use a class function once in Python 3.
Answer: Primitive data structures—like numbers, strings, and lists—are designed to represent simple pieces of information, such as the cost of an apple, the name of a poem, or your favorite colors, respectively. What if you want to represent something more complex?
For example, let’s say you want to track employees in an organization. You need to store some basic information about each employee, such as their name, age, position, and the year they started working.
Original IPv6 Address
Oe56:1102:0e75:8d23:3528:7e0d:419b:bdce
Compress
I
e56:11c2:e75:8d23:3528:7e0d:419b:bdce
4. What is an Abacus?
Explanation:
an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.
What is the correct clases for this drugs
Compazine
heelp me please
Answer:
making sense of medication classification
Explanation:
i think helping
What device is used to perform a loopback testing on a NIC
Answer:
A loopback cable is also known as loopback plug or loopback adapter, which is a plug used to test physical ports to identify network issue. It provides system test engineers a simple but effective way of testing the transmission capability and receiver sensitivity of network equipment. In a word, it is a connection device that is plugged into a port to perform a loopback test.
Explanation:
Mark me as brainliest please
Why were Daguerreotype cameras not intended for the general public?
Answer:
The exposure time was vastly too long to be intended for practical use by photographers.
Explanation:
"The very first daguerreotype cameras could not be used for portraiture, as the exposure time required would have been too long. The cameras were fitted with Chevalier lenses which were 'slow' (about f/14). They projected a sharp and undistorted but dim image onto the plate."
Write a for loop that is going to check whether the values in data_list are even or odd. Use a for loop with a conditional to do this. For each value, it should add True to a new list is_even if the value is even, and False to is_even if the value is odd.
Answer:
Jsjshshusuaijwiwueheue
What is the most helpful way to adopt the practice of design thinking, regardless of which framework is your favorite?
Answer:
Defining, framing and solving problems from users' perspectives
Explanation:
Stretching, walking, and meditation because stretching allows everything to be loosened or not as firm walking is part of everyday life and meditation is sitting in a calm comfortable position typically with calm music as well to clear your mind.
Why these are considered as very complex?These are all very complex because they require strength in your body and some people can't do these. Some have bad kneens so lunges can seriously hurt them others have weak arms so they can't push or hold their body wait for long periods of time and squats are difficult to do in the correct position because we can't typically do that without an actual chair
My most favorite are jumping jacks and meditation. Jumping jacks because it gets your adrenaline pumping and meditation because you can only hold so much in your mind before you get tired out. My least favorite are squats and planks. Squats are very difficult to do because you are litteraly sitting down with your back straight and the same dip of a chair but without it actually there do it's very complex.
Therefore, Stretching, walking, and meditation because stretching allows everything to be loosened or not as firm walking is part of everyday life and meditation
Learn more about Stretching on:
https://brainly.com/question/1171877
#SPJ2
Four differences between general and special purpose conputer in points.......
( don't spam please )
Explanation:
hope this helps to uhh...
give 5 examples for software
Answer:
Adobe Photoshop.Picasa.VLC Media Player.Windows Media Player.Windows Movie Makerhow can information technology transform the way business processes in an organization
Answer:
1. Through cooperation.
2. Understanding the market and the organization.
Explanation:
Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.
An information Technologist can change the way business process if he or her understand the maker of the company and the company.
The major point is this:
1. The company must cooperate.
2. Everybody must accept change for it to grow higher.
3. Understand the market of the company and
4. understand the company and how they operate and then change and replace the parts that need replacement.
A folder is a collection of related of data is true or false
Answer:
false
Explanation:
may this answer is helpful for you
1. Explain all the types of computer virus
Answer:
1.File infecting virus
A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.
2. Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.
4. Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.
5. Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.
6. Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
7. Resident Virus
A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.
Explanation:
hope its help
thank you
What is the value of total returned by the call secret(3) ? int secret int num) { int total= 10; switch(num) { case 1: case 2: total=5. break case 3. total= 10: case 4: total=total+3: case 8: total=total+6. break default: total=total+ 4. break} return total; }
Answer:
19
Explanation:
Without break; statements, the switch "falls through" to the next case. So the code is directed to case 3, which sets total to 10. Then another 3 gets added and another 6, because cases 4 and 8 are also executed. That brings the total to 19.
So, always use a compile rule or code checker that checks your code for missing breaks, because it is hardly ever what you want on purpose.
True or False
1. Files are the container to store folders =
2. You can change name of file by using delete option
3.Recycle bin allows us to delete the flies permanently.
4. MSDOS is GUI based operating system
Answer:
1. False
2. False
3. True
4. False
Explanation:
1. Folders are the containers to store files
2. The delete option deletes the file
3. Files are moved to recycle bin after being deleted, and can be permanently deleted from recycle bin
4. "MS-DOS was the main operating system for IBM PC compatible personal computers during the 1980s, from which point it was gradually superseded by operating systems offering a graphical user interface (GUI), in various generations of the graphical Microsoft Windows operating system."
source for #4: Wikipedia
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer.
Sample output for inputs: 1 2 4
Average owls per zoo: 2
Answer:
I'm going to add a python program for this example, step by step:
We declare 4 variables for our zoo, zoo quantity, and the average.
We make the operation for the average where sum the zoo and divide with the quantity
In the last step, we print the variable avg_owls.
num_owls_zoo1 = 1
num_owls_zoo2 = 2
num_owls_zoo3 = 3
num_owls_zoo4 = 4
zoos = 4
avg_owls = 0.0
avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos
print('Average owls per zoo:', int(avg_owls))
Explanation:
The coding of the print avg_owls as an integer is written above.
What is coding?We connect with computers through coding, often known as computer programming. Coding is similar to writing a set of instructions because it instructs a machine on what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.
We make the operation for the average, where sum the zoo and divide by the quantity.
In the last step, we print the variable avg_owls.
num_owls_zoo1 = 1
num_owls_zoo2 = 2
num_owls_zoo3 = 3
num_owls_zoo4 = 4
zoos = 4
avg_owls = 0.0
avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos
print('Average owls per zoo:', int(avg_owls))
Therefore, the coding is written above.
To learn more about coding, visit here:
https://brainly.com/question/1603398
#SPJ2
what's the function of a cyclebin
Answer:
In Windows, the Recycle Bin is a folder or directory where deleted items are temporarily stored. Deleted files are not permanently removed from the hard drive but are sent instead to the Recycle Bin, unless they are too large.