Answer:
Yahoo Messenger is an example of a service on the Internet.
PLEASE HELP! (NO LINKS)
The US Copyright Act gives computer programs the same status as what kinds of work?
Answer:
C.
Explanation:
In image below.
Have a wonderful day and mark brainliest if I helped,
starkitty052010 of Brainly
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate the user is referred to as
Answer:
Identity Theft. i hope this helps :D
Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do
Answer:
bobo
Explanation:
In object-oriented programming, a data member plays the role of _________. a. an attribute b. a behavior c. either a or b d. neither a nor b
In object-oriented programming, the object consist of both the data and the functions that operate on the data. In object-oriented programming, a data member plays the role of neither A nor B.
Objects are the product of abstract data types that has inside of it both data and function altogether.A data member often has different classes. They can be private or public.
Object-oriented programming (OOP) is simply known as a computer programming model that put together software design around data, or objects.
Learn more from
https://brainly.com/question/12342989
jelaskan tiga kemungkinan sebab pengasah pensil itu tidak dapat berfungsi secara tiba-tiba (translate: explain three possible reasons why the pencil sharpener may not work suddenly) pls help me
Explanation:
Internal gear wear must be significant (visually obvious) to be the cause of off-center sharpening. Cutter carrier is rotating but the pencil is not sharpening (doesn't feel like the cutter is engaging the pencil) This is usually caused by a foreign object (e.g., an eraser or broken pencil lead) inside the pencil bore.
Select the correct text in the passage.
Which three phrases describe a wireframe?
Tracy uses a (pictorial summary of an entire website) in her team meeting. It is a (two-dimensional illustration) of how (each web page on a website will look.) Known as a workflow diagram, this (explains how pages in a website connect to one another.) It is a (design tool), and it (shows the overall framework of a website.) It is a (visual representation of how much space each element on a page should take.)
Answer:
A B D
Explanation:
Consider the following instance variables and method from a class: private String descriptor; public String makeSentence(int quant, boolean sign) { String s = "Object is "; if (!sign) { s += "not "; } for (int i = 0; i < quant; i++) { s += "very "; } return s + descriptor; } Suppose an object of this class is initialized so the value of descriptor is "regular". What would be returned by the call makeSentence(3, false) made on this object?
The call makeSentence(3, false) will return
"Object is not very very very regular"
The program fragment is:
///////////////////////////////////////////////////////////////////////////////////////////////////////////////
private String descriptor;
public String makeSentence(int quant, boolean sign) {
String s = "Object is ";
if (! sign) {
s += "not ";
}
for (int i = 0; i < quant; i++) {
s += "very ";
}
return s + descriptor;
}
///////////////////////////////////////////////////////////////////////////////////////////////////////////////
descriptor is an instance field of the class. When makeSentence(3, false) is called, it does the following;
Initializes a local variable s with "Object is "
s now contains "Object is "
Since sign== false, the if block executes
s now contains "Object is not "
The for loop will execute 3 times to append "very " to s
s now contains "Object is not very very very "
Finally the return statement returns a concatenation of the contents of descriptor (descriptor=="regular") and s
s now contains "Object is not very very very regular"
Learn more about programs here: https://brainly.com/question/19625875
How to remove link color and underline in html.
Answer:
To remove the underline from all hyperlinks on a page, follow these steps:
Open the page that you want to modify.
Click the Codetab.
Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>
Click the Designtab. Your hyperlinks no longer contain underlines.
What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place
Answer:
I think it's a for loop.
A for loop looks like:
for (starting statement; condition that is true; condition applied to iteration)
Explanation:
In a complex formula, how does excel determine which calculation to perform first?.
In a complex formula, the way excel determines which calculation to perform first is that; It follows the order of operations.
When carrying out calculations in excel, if we don't bracket certain operations, excel will use the order of operation called BODMAS to determine which operation to carry out first.
For example, if excel wants to solve 3 × 4 + 7 - 2;
The acronyms in BODMAS stand for;
B - Brackets
O - Orders (powers/indices or roots)
D - Division
M - Multiplication
A - Addition
S - Subtraction
Now, it means that the first action it will perform is Bracket while the last will be subtraction.
In our example, excel will first use the multiplication sign to get;
(3 * 4) = 12
Then addition; 12 + 7 = 19
Then subtraction; 19 - 2 = 17
Read more on BODMAS at; https://brainly.com/question/16788360
we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.
Answer:
is this a sim chip card replacement card for Electronics ?
Explanation:
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.
Answer:
D. The method for retrieval is dependent on the specific app or device’s operating system.
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage
The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.
System design involves the process of determining an overall system architecture, which typically comprises the following:
Hardware.End users.Physical processing components.Software.Communication channel.Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:
1. Planning.
2. Analysis.
3. Design.
4. Development.
5. Testing.
6. Implementation.
7. Maintenance.
From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.
During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.
Read more: https://brainly.com/question/20813142
I need help with this question.
Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____
Vhat is the result when you run the following program?
rint(2 + 7)
rint("3+ 1")
4
O an error statement
2+7
o
4
0
9
3 + 1
Answer:
4
Explanation:
How to square a number in java.
Answer:
num**2
Explanation:
To square a number in Java, you just take the number and use two asterisks (**) to denote an exponent, and then connect a 2 to it.
For example, if your number is 5:
5**2 in Java means 5^2, which is 25.
Just like how 5**3 in Java means 5^3.
Hope this helps.
Would my phone still work if I snapped it in half?
Depends on if you wanna get it repaired or not
1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint
Answer:
a. Word
Explanation:
Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.
Answer: a) Word
Explanation: Microsoft Word is the most widely used word processing software.
what do you think is the reason why there are two kinds of transmission mode in computer networking?
Answer: Transmission mode or communication mode is referred to as transmission of data between two devices using a communication channel that includes an optical fiber, copper wires, wireless channels, and various storage media. The data that gets transmitted is in the form of electromagnetic waves. There are various ways of data transmission where the message that is passed is in the sequence of pulses using digital modulation. The transmission mode of data was first introduced in a computer networking system during the 1940s in modems, then in LANs, WANs, repeaters, and other networking system
is this what u are looking for?
________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership
Answer:
a) reverse engineering
We use the keyboard to point, click, and select menus and icons, and for onscreen navigation. True or False
Answer:
False.
Explanation:
Hope I could help. Hey, have a nice study time.
Answer:
false
Explanation:
we use our keyboard to type not click icons or point.
What are web protocols.
Answer:
Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.
Answer:
The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.
Explanation: i hope this helps
RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall
Answer:
Firewall
Explanation:
The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.
________ software consists of operating systems, utilities, device drivers, and language translators.
Answer:
"System"
Explanation:
System software consists of operating systems, utilities, device drivers, and language translators.
(not much explanation as it was a fill in the blank which explains itself haha)
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?
rules
feedback
tasks
algotithms
Answer:
A. Rules
Explanation:
Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player
Why do
ve need to add movies in our slide?
Answer:
movies are awesome! LOL but i dont understand your question...sadly.
Explanation:
What color object would reflect more light?
O Red
O Black
O Blue
o White
Answer:
White
Explanation:
Red absorbs all light except red light, which it reflects
Black absorbs all light
Blue absorbs all light except blue light, which it reflects
White reflects all light because it has all colors except black.
Hope you do well!
3 out of 5 citizens were eligible to vote 180 actually voted
Answer:
What is the question.
Explanation:
Answers:
Either 108/180
or 180/300
Depending on question since I dont know what ur asking
_______________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.
Answer:
______HUMAN- COMPUTER INTERACTION_________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.
Explanation:
HOPE ITS HELP