Answer:
[tex]\boxed{\sf (C) \ mouse}[/tex]
Explanation:
A networking equipment can share data along a computer network. A mouse is not a networking equipment.
PLEASE HELP!!!! I'll mark Brainliest for whoever is first!!!!
What does this snippet of code do? birds = ["robin", "finch", "grackle", "crow", "wren"] for i in birds: print(i)
It counts the number of birds in the list.
It prints the index and then each bird name.
It prints each bird name on a separate line.
It prints each index number on a separate line.
Answer:
It counts the number of birds in the list.
Explanation:
The snippet of code works in counting the number of birds in the list.
What is a code Snippet?A code snippet is a word that is used in computer programming to inform a little chunk of reclaimable source code, machine code, or text. Some text skilled worker, code skilled worker, and IDEs have a property called Code Snippets. The code in this snippet counts the number of birds in the list.
Therefore, option A is correct.
Learn more about the code Snippet, refer to:
https://brainly.com/question/15003149
#SPJ2
what is network and also how many types of network are there as well
Answer:
Summary:
Type of computer networks can categorize according to their size as well as their purpose
PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant
LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area
WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area
A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region
WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.
SAN is a storage area network is a type of network which allows consolidated, block-level data storage
System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications
POLAN is a networking technology which helps you to integrate into structured cabling
Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home
Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations
Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area
A VPN is a private network which uses a public network to connect remote sites or users together
Explanation:
Answer: Network is what is making you ask these questions.
Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks
Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective
the board if not try a restart a couple more times and we see what happens from there
Give two examples of a large databases that might be used to help members of the public
Answer:
Examples of large database that might be used to help members of the public are;
1) Apple Healthkit, Carekit and Researchkit
2) IBM Deep Thunder
Explanation:
1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records
2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.
How can artificial intelligence be used in learning science?
Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.
Hope that helped!!! k
Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores
Answer:
The correct option is;
d. Average of a series of test scores
Explanation:
Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location
Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.
In python,_______ are used to define the conditions necessary for a while loop to run.
Answer:
Relational Operators
Explanation:
We can make a while loop run only when some variable or whatever is relative to something else.
The valid operators are:
<, >, =, <=, >=, and =!
Hope this helped!
Answer:
sorry not sure
Explanation:
The game begins with the player having 20 POINTS
The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.
If the POINT is a 7 or 11, the player wins his POINT
If the POINT is a 2, 3, or 12, the player loses his POINT
If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until
The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT
The player rolls a 7 and then he loses his POINT.
The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS
After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work
Answer:
Following are the code to this question:
import random#import package for using random method
def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable
dice1 = random.randint(1,6)
dice2 = random.randint(1,6)
return dice1 + dice2
def rolling(): # defining method rolling
n_roll = 0 # defining num variable that initial value that is 0.
p = 20 # defining variable p for looping, that points in between 1 and 59
while p > 0 and p < 60: # defining loop that counts value dice value two times
d = rolling_dice()#defining d variable that hold method value
n_roll+= 1 #defining n_roll that increment n_roll value by 1
if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable
p+= d # use p variable that adds d variable
elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator
p-= d#defining d variable that decreases d variable variable
else: # defining else block
p1 = d # using p1 variable that store d value
while True:# defining loop that calculates values
d = rolling_dice()#defining d variable that holds method values
n_roll += 1 #increment the n_roll value by 1
if d == 7:#defining if block that checks d value equal to 7
p -= p1#subtract the value of p1 in p variable
break # exit loop
elif d == p:#defining elif block to check d value is equal to p
p += p1#adds the value of p1 in p variable
break#using break keyword
if p<= 0:#defining if block that checks p-value is less then equal to 0
print('Player lost')#using print method
elif p>= 60:#defining else block that checks p-value is greater than equal to 60
print('Player won')#using print method to print the value
print('number of dice rolls:', n_roll)#use print method to print n_rolls value
rolling()
Output:
Player lost
number of dice rolls: 38
Explanation:
In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.
In the next step, another method the "rolling" is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.What do you mean by Bandwidth? Pls give full explanation
Answer:
In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.
Explanation:
(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}
Answer:
Following are the code to this question:
RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value
resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value
Explanation:
In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal" is defined, that holds a value that is 0.
In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.please find the attachment of the code file and its output.
State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................
Answer:
parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.
serial communication conveys only a single bit at a time over a communication channel or computer bus.
Order the steps a user needs to follow to preview and then print a document
Answer:
Click file tab, click print tab, preview document, print document.
Answer:
Click file tab, click print tab, preview document, print document.
Explanation:
Click file tab, click print tab, preview document, print document.
When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O
Answer:
last option: When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated.
Explanation:
A function, when it is called, uses the stack to allocate local variables. When it exits, those variables are no longer needed (since they are local), so the stack pointer is reset to the position it had before calling the function.
Does anyone know what happened to Cole Morgen, the actor?
I looked on the internet about him and it turned out that he was 24 years old, but it is the only thing that appears about him.
Answer:
Cole Morgen has been on stage acting in theatre and dance since the age of 4.He has been a part of many local theatre productions. His first professional play was "Dead End" starring Jeremy Sisto and directed by Nicholas Martin at the Ahmanson Theatre followed by and a part in the Arthur Miller's play "All My Sons" directed by Randall Arney at the famous Geffen Playhouse.
Cole was cast in his first feature film as Kevin James's son Eric in the current Adam Sandler film "I Now Pronounce You Chuck and Larry" directed by Dennis Dugan.Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.Besides acting, Cole loves tap dancing and is always looking to improve his skills. He won the national tap competition last summer taking the title of Mr. Junior Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.
When developing a new software package, logically, the software must be designed before the code is written, and the code must be written before it is tested. These activities are dependent on each other by _________ constraints.
Answer: Technical
Explanation: When making decisions, we may have to follow a certain pattern or order due to restrictions brought about by circumstances rules or conditions. These restrictions or limitations are regarded to as constraints. Technicality may be explained as the knowledge, expertise or initiative required for an operation, production or design. Therfore, we may view technical constraint as limitations or restrictions brought about by the technical guidelines or expertise required for a certain products. From a technical perspective, before a software package can be built, the engineer must know why and what he wants the software to be capable of doing, then he writes the code then tests the code. It is a sequence, a test cannot be performed without a written code and code cannot be written without a planned design.
Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
Answer:
The answer is "TLS and the DBMS".
Explanation:
In given- question there are two questions were included, which can be defined as follows:
The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of SSL, and by encrypting information and data transfer.
The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.
Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that tells the computer how to execute commands. A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet. A computer system is a collection of hardware and software components that work together to meet the needs of the user. A computer system is a group of hardware devices that work together.
Answer:
I believe it's A computer system consists of the operating system that tells the computer how to execute commands.
Explanation:
An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential
Answer:
d . commercial potential
Explanation:
The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.
This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.
can anyone please help me with this
Answer:
This should do it. I assume the alignment of the numbers is not important?
<!DOCTYPE html>
<html>
<head>
<style>
table {
border-collapse: collapse;
font: 15px Verdana;
font-weight: bold;
}
table, td {
border: 1px solid black;
}
td {
width: 80px;
height: 80px;
text-align: center;
}
</style>
</head>
<body>
<table>
<tr>
<td>1</td>
<td>2</td>
<td>3</td>
<td>4</td>
</tr>
<tr>
<td colspan="2">5</td>
<td>6</td>
<td rowspan="2">7</td>
</tr>
<tr>
<td>8</td>
<td>9</td>
<td>10</td>
</tr>
</table>
</body>
</html>
what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST.
Answer:
Hey mate, here is your answer. Hope it helps you.
Explanation:
Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.
1. On the File tab select New.
2. Click on Blank database.
3. In the File Name box, type a name for your database.
4. Click on the browse button to the right of the File name box to browse for a location for your
database.
5. Click on Create.
A new database will be created with a new default Table.
6. Click on Design View to start working with this Table.
You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.
Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive
Answer:
negative
Explanation:
this is because not many people have the skills to operate the machines. In short not everyone is able to operate them
What is computer Network?
Answer:
[tex]\boxed{\sf {view \: explanation}}[/tex]
Explanation:
A computer network is a network of computers that can share data among the computers.
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering
Answer:
c. Mobile hotspot
Explanation:
A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection
Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal
So the mobile hotspot should be used to provide internet service to the group.
Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer demand B. rates of unemployment and inflation C. consumer behavior and preferences D. national income and its sourcesics?
Answer:
The correct answer is C. Consumer behavior and preferences.
Explanation:
hope it will help :)
Answer: the answer is C consumers behavior and preferences.
Explanation: just took the test please add thanks and brainliest
You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge
Answer:
The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".
Explanation:
The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.
In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.Help me what is that my phone I will mark brainslist
Answer:
Following are the ways to resolve this error:
Explanation:
To solve this error there two methods, that is available, which can be defined as follows:
The First way by the turn off screen time:
To turn off screen time goto the setting app on your iPad, iPhone, or other devices.In this, there is a screen time option in which we click on turn off the screen time, and confirm it.After that, go to the apps store and download the app.The Second way by the re-login on apple id:
To re-login on apple id first, we log out it and for logout go to setting inside this go to iTunes & app store.After open this option click apple id after the click, this click in the sign-out option after sign out re-login in by your id and password. To install the app first delete the app by a tap on the app this provides the option to delete the app, then go to the apps store. In this go to the purchase option then select the option that not in the device then download the file.Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the hard drive activity light is staying on. You discover that the hard drive is nearing its maximum capacity. The computer contains a single 150 GB hard drive. What should you do
Answer:
Delete unnecessary apps
Explanation:
If you don't need it and its installed it's just using up memory the system could be using for something else
You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?
Answer:
The answer is "Between the website tags immediately after the global site tag".
Explanation:
The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.
These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.state the function of font group in the home tab
Explanation:
This group provides access to all the Character Formatting commands.
what are the uses of mobile phones?
Answer:
We use mobile phones to:
1. communicate with our friends and family
2. looking for the information/news in the world
3. looking for the material for study
and many others
may it helps^_^
Answer:
Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.
Explanation:
Plz mark me as brainiest