also have a good day people !!

Answers

Answer 1

Answer:

Thx u2!!

Explanation:

Everyone have a good day!

Answer 2

Answer:

You too and thank you for 50 points!!

Explanation:


Related Questions

Is a dot matrix printer an impact or non-impact printer

Answers

i think a non impact printer

Answer:

Impact

Explanation:

Who is Carl Thompson?

Answers

Carl Thompson was a well know Jazz player back in the mid 1900s

Which option should have the strongest influence on your choice of system software for your computer?

compatibility of applications software
aesthetics
your friends' opinions
popularity

Answers

Software hope This helps :)

What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?

Answers

so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.

-scav

what are the answers for Quiz 7 answers computer science principles

Answers

Answer:

unknown

Explanation:

this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this

another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence

that and people are more willing to answer one question at a time then a whole quiz lol

not saying what you are doing is bad, its just impractical and not an easy way to go about this

hope you find the answers you need, have a great day/night mate :D

Write a Python code to take input of age of three people by user and determine youngest people among them

Answers

Answer:

# Take Ages

person1 = eval(input("Enter age of person 1 : "))

person2 = eval(input("Enter age of person 2 : "))

person3 = eval(input("Enter age of person 3 : "))

# check youngest

if person1 < person2 and person1 < person3:

print("Person 1 is youngest")

elif person2 < person1 and person2 < person3:

print("Person 2 is youngest")

elif person3 < person1 and person3 < person2:

print("Person 3 is youngest")

plzzz help i need this today :(

Answers

Answer:

C

Explanation:

Complete the sentence with the correct response.

If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.

Answers

Answer:

You would use the Android operating system.

Explanation:

Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.

Which command tells the for loop what to count by?
a. step
b. range
c. count
b. variable​

Answers

step is the answer. or option A

Answer:

A) Step

Explanation:

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. What could you do to add an additional layer of security to this organization

Answers

The answer is Train the receptionist to keep her ipod in a locked drawer when not in use. Disable the network jacks in the reception area

Train the receptionist to keep her ipod in a locked drawer when not in use.

What is ipod?

Apple Inc. created and marketed the iPod line of portable media players and multifunctional mobile gadgets, which has since been discontinued.  On October 23, 2001, the initial version of iTunes was made available, almost 8 and a half months after the Macintosh version.

As of 2022, Apple is anticipated to have sold 450 million iPod products. On May 10, 2022, Apple stopped producing the iPod range of products. The iPod brand was abandoned by Apple the longest, after more than 20 years.

Some versions of the iPod can act as external data storage devices, just like other digital music players. Before macOS 10.15, users could transfer contacts, e-mail settings, calendars, music, photographs, movies, games, and other content to devices that supported the iTunes program from Apple.

Therefore, Train the receptionist to keep her ipod in a locked drawer when not in use.

To learn more about ipod, refer to the link:

https://brainly.com/question/119195

#SPJ5

Consider the following code segment.
int[][] multi = new int[4][4];

for (int rows = 0; rows < 4; rows++)

{

for (int cols = 0; cols < 4; cols++)

{

if (cols == 0)

{

multi[rows][cols] = 0;

}

else if (cols == 1)

{

multi[rows][cols] = 1;

}

else if (cols == 2)

{

multi[rows][cols] = 2;

}

if ((rows % 2 == 0) && (cols % 2 == 0))

{

if ((rows >= 2) && (cols <= 2))

{

multi[rows][cols] = 9;

}

}

}

}

As a result of executing the code segment, how many elements in the two-dimensional (2D) array multi will store the value 9 ?


A) 0
B)1
C)2
D)4
E)6

Answers

Answer:

C

Explanation:

C.10 15 20 35

30 35 40 45

50 55 60 65

As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

How the elements in the array can be calculated?

Given the array

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

Therefore, As a result of executing the code segment, 2 elements in the two-dimensional (2D) array multi will store the value 9. Thus, option C is correct.

Learn more about array on:

https://brainly.com/question/13107940

#SPJ2

A man-in-the-middle attack or impersonation are likely to result in problems with

data availability.

data confidentiality.

data integrity.

data mining.

Answers

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.

What is a  man-in-the-middle attack?

A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.

Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.

Therefore, option B is the correct option.

Learn more about man-in-the-middle attack, here:

https://brainly.com/question/13014110

#SPJ6

One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.

Answers

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!

___________ helps businesses conduct interactive meetings online, including conferences, training, support sessions, and client presentations.

Answers

Answer: Web Conferencing

Explanation:  I was gonna say technology but that's super broad. It could also be collaborative tools but I think this is the correct answer.

in ICT what is the difference between Save and Save As

Answers

Choosing "Save" simply saves your work by updating the last saved version of the file to match the current version you see on your screen.

Choosing "Save As..." brings up a prompt to save your work as a file with a different name. For example, you might choose to save a document called "Paper - rev. 3" as "Paper - rev. 4". This way, you can save you file at different stages and keep multiple versions on your hard drive.

Choosing "Save" and then "Save As..." is also a good way to make a backup of your file. Just be sure to rename the file something new when you choose "Save As..." or you will overwrite the current saved version, just like choosing the "Save" command would do.

Answer:

Save updates the files that are already created.

Save as creates a new file or store the existing file in a new location.

write any two reasons why files are stored in folders​

Answers

Answer:

Explanation:

The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.

Answer:

Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.

I hope this was helpful! =)

A restaurant is interested in learning about the food preferences of people living nearby to the restaurant and intends to use survey data to help decide which new items to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?

a. Cleaning a data visualization to remove unwanted patterns.
b. Iteratively creating visualizations to ask and answer new questions.
c. Cleaning data to remove inconsistencies.
d. Filtering the data to look at the responses from only certain groups.

Answers

Answer:

answer is d

Explanation:

i got it right in code.org

Answer:

A. Cleaning a data visualization to remove unwanted patterns.

Explanation:

While cleaning data in its raw format can be an important part of the Data Analysis Process, the visualizations are not cleaned and/or altered but rather they are interpreted to discover what patterns exist in the data.

*If one is in search of a pattern, why would one clean or alter the pattern they have been provided, self-sabotage.*

Complete the sentence with the correct response.

When choosing a new computer to buy, you need to be aware of what operating it uses.

Answers

Answer:

When choosing a new computer to buy, you need to be aware of what operating system it uses.

Explanation:

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.

Match the characteristics to the mobile operating system that it describes.

1. simple, user-friendly design Apple iOS
2. preferences personalized Microsoft
3. limited number of available apps Android

Answers

Answer:

1. is Apple's iOS

2. is Android

3. is Microsoft

Write down a scratch program which:
performs the following tasks 5 times:
1. asks the user to input numbers
2. add the numbers in total variable
3. outputs the result

Answers

What computer language?

A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C

Please select the best answer from the choices provided
A
B
C
D

Answers

I think the answer is D

Answer:

D

Explanation:

concept of green computing​

Answers

Answer:

Reducing Environmental Impact of Technology

Explanation:

The main concept of green computing is to reduce the environmental impact that technology has. This revolves around everything that has to do with technology and computing. Including using technology and software to create solutions to better the environment, while also using computing resources as efficiently as possible. Then when the physical devices are obsolete, recycle as much as possible in order to reduce the physical waste that technology has on the environment.

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do

Answers

Answer:

Have them try again. If it still is wrong then maybe dont let them use the internet!

Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important

Answers

Answer:

1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.

2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.

3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.

why you think they are important

1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.

2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.

3. Any weakness in communication skills could affect the project generally.

True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.

Answers

Answer:

true

Explanation:

true true true true true

Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
a
Create drones
b
Make 3-D prosthetics
оо оо
с
Plant agriculture
d
Use 4-D special effects

Answers

3-D prosthetics would most likely be the answer, also, don’t copy links it’s most likely not the answer anyways.

The healthcare industry uses computer programming will be Make 3-D prosthetics. Then the correct option is B.

What is the healthcare industry?

The healthcare business, also known as the medicinal industry or the medicine economy, is an amalgamation and combination of economic segments that offer products and services for the treatment of patients in the curative, preventative, rehabilitative, and pastoral care categories.

Uses of the healthcare industry are given below.

Apps with medical databases or references.Applications for tracking chronic diseases.Applications for diagnosis with a focus on prevention.Applications for people's health.Apps for better health.Apps for psychological health.

Thus, Computer programming is used in the healthcare sector to create three-dimensional prostheses. Then the correct option is B.

More about the healthcare industry link is given below.

https://brainly.com/question/14379549

#SPJ2

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.

Answers

i think it is technology

so I believe that the word you are looking for is technology

Hope this helps

-scav

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

Other Questions
You read an article about someone who leaves USB sticks in college libraries so that people will pick them up, insert them into their laptops, and download malware. This is an example of:phishing.eavesdropping.wiretapping.social engineering. Please help need this to pass! Help Please help me DAVID PLZ HELP LAST ONE Please help Ill mark brainliest 6. Yogurty's sells 63 gallons of ice cream and yogurt a week. One-third of that is chocolate flavored.a) How many gallons of chocolate flavor do they sell a week? _b) How many gallons are other flavors? _ Chloroplasts contain ____, a green pigment that absorbs light energy.A. an ovuleB. photosynthesisC. a cuticleD. chlorophyll Which of tge following is NOT typically edentified as a cool color??A.redB.greenC.blueD.purple someone check my answer please y = 3x + 88x + 4y = 12 I need help I will mark you if you get it right What is the cost with sales tax for the phone? Assume that the sales tax is 6%, or 0.06 times the price. Keisha took out a loan for 10,500 and was charged simple interest at an annual rate of 8.8%. The total interest she paid on the loan was $462. How long was the loan for, in months? how does walters description of bravery develop the theme of the story? Explain how to find the slope of a line that passes through (-2, -4) and (7, -3) Find the volume of the cylinder to thenearest hundredth. Use 3.14 for A. HHEEELLPPP!!!!! The probability of the spinner landing on an even number or a multiple of 3 is . The probability of the spinner landing on an odd number or a number between 4 and 15 (both numbers excluded) is . can u guys plz help me with these questions Which of the following are true of fables? Choose all that apply.Fables are based on true eventsFables are short storiesFables are about animals with human characteristicsFables teach a lesson There plz help me can you do this fast well not really because the police is gonna come like I told you Sonilophe