Answer:
C. high-top sneakers
When much of her work was automated with a new computerized system, louisa became unsure of her ability to do her job. Nisa, her boss, has been mentoring her to improve her.
Answer:
self-efficacy
Explanation:
Nisa, her boss, has been mentoring her to improve her self-efficacy.
What is Computerized system?DNA polymerases create a complementary DNA strand to the initial template strand during DNA replication, which is the process at its most fundamental level.
To produce a replication fork with two single-stranded templates, DNA helicases unwind double-stranded DNA before polymerases do. By using replication techniques, a single DNA double helix can be transformed into two DNA helices, which are subsequently split into daughter cells during mitosis.
The main enzymatic processes that take place at the replication fork are well conserved between prokaryotes and eukaryotes.
Therefore, Nisa, her boss, has been mentoring her to improve her self-efficacy.
To learn more about Self efficacy, refer to the link:
https://brainly.com/question/28215515
#SPJ6
I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)
Answer:
I mean if your talking about games then just try Cool math I will give link in comments
Explanation:
Answer:
I have 4.
Explanation:
DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.
DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.
INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.
INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.
Have a great day!
#EquestrianLion
How could the following line of code be shortened?
average = average + 1
Group of answer choices:
1.average + a
2.average += 1
3.average = + 1
4.average = 1 + average
Answer:
2
Explanation:
The second option is the only one that will work. The last would work but doesn't make the code any shorter.
Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.
What role of line of code if shortened?It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.
By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.
Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.
Therefore, The second option is the only one that will work.
Learn more about line of code here:
https://brainly.com/question/18844544
#SPJ2
Which directory stores the cron configuration file?.
The directory stores the cron configuration file is /etc/.
What is the cron configuration file?Crontab file is known to be a very simple text file that is said to be composed of some list of commands that are known to be executed at a particular times.
It is best to use crontab command in order to be able to access and update crontab files that are found in /var/spool/cron/crontabs. Crontab is the phrase that signifies for "cron table".
Learn more about directory from
https://brainly.com/question/14364696
Does single quote and double quote work same in javascript
Answer:
yes!
Explanation:
the only difference is that some companies prefer one over the other as a standard
https://stackoverflow.com/questions/242813/when-should-i-use-double-or-single-quotes-in-javascript
but they work the same
30 POINTS!!!! HELPPPPP!!! in computer science, what does the term inference mean?
a. the wiring connection between the computer and all of its hardware devices
b. an internal switch inside the monitor that dims the screen's brightness at sunset
c. a device or program that allows a user to communicate with a computer
d. a sensor that turns the computer fan on when the computer gets too hot
Answer:
A. The act or process of reaching a conclusion about something from known facts
Hope this helps you!
Please Mark me Brainlest!!
Answer: c. a device or program that allows a user to communicate with a computer
Explanation:
Which of the following best describes your sequence of actions when developing a web page?
Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file
Answer:
I think D
Explanation:
Answer:
B
Explanation:
Saving it, then editing it wouldn't load the new changes
but editing it than saving it, would load the new Changes
Fill in the blanks to explain another memory Grandpa shares with
Amara
The answers to the fill in of blanks to explain another memory Grandpa shares with Amara are
Young RecentlyOnly moments agoWhat is blank statement?A blank statement is known to be a kind of empty statement where some information are said to be missing.
In the text above, . "Even though her Grandfather had passed away when Gina was little young" and Recently, her memories of him are still as fresh as the bakers bread."
Learn more about blanks from
https://brainly.com/question/25573309
How to creatte a react app without a git hub repository
Answer:
You needn't be on Github. You just need to have the software, like visual code installed on your computer.
If you've got all these things sorted, then you'll be able to make apps without github.
Katie wants to use VLOOKUP for a column in a table. Which value of the mode perimeter should she use to look for an exact match of the searched data?
Answer:
The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data
Explanation:
The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.
Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.
To achieve this, select a cell in your Excel worksheet
Type =VLOOKUP in the type bar of the Excel sheet
Select the value to look up and then select the data range
Type the column number that you want to search and then type FALSE
Press enter
You have received an update package for a critical application you are running on a virtual machine. You have been told to install the update package and that you cannot very little downtime. What should you do first?
The first thing to do install the package without having downtime is; Virtualization.
What is virtualization?Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.
Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.
Since there should be no down time, then it is advisable to first carry out virtualization.
Read more about virtualization at; https://brainly.com/question/26462832
Which of the following "friction" material settings is most likely to be used for an icy surface?
a
0
b
1
c
100
d
-1
The type of friction that is most likely to be used for an icy surface is a static friction.
What is friction?It should be noted that friction simply means a force that exist between two surfaces that are sliding across each other.
In this case, the type of friction that is most likely to be used for an icy surface is a static friction. Here, a little friction is offered.
Learn more about friction on:
https://brainly.com/question/1424758
Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and quantity sold how should she maintain the data
Answer:
store quantity in stock and quantity sold in a single cell
Explanation:
starting a computer after it has been turned off is term as
Answer:
Booting
Explanation:
how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}
Answer:
scanf(" %c" ,&op); //entering operators such as + - \ *
Explanation:
put space before %c
Binary is represented by two digits, write out each and describe what each means:
Answer:
binary is represented by 1 and 0
Explanation:
the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.
I hope this helps you :D
In binary, the 0s and 1s signify OFF and ON, respectively.
What do the binary numbers 1 and 0 represent?In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.
Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.
Learn more about binary numbers here:
https://brainly.com/question/13371877
#SPJ4
A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean
A structure which can execute a set of statements only under certain circumstances is: C. decision.
What is a decision structure?A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.
This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.
Read more on decision structure here: https://brainly.com/question/13297323
If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?
Answer:
I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps
Shelly uses Fac3book to interact with friends and family online. When is she most likely to express a positive mood on social media?
a.
Sundays
b.
Wednesdays
c.
Fridays
d.
Thursdays
Answer:
Fridays
Explanation:
On record, Fridays are preffered
The correct option is c. Fridays.
What is Social media?Social media refers to the means of relations among people in which they create, share, and/or interact with information and ideas in virtual societies and networks. In today's civilization, the use of social media has evolved into a necessary daily exercise. Social media is commonly used for social relations and credentials to news and information, and determination making. It is a valuable contact tool with others locally and worldwide, as well as to communicate, create, and spread announcements.To learn more about Social media, refer to:
https://brainly.com/question/1163631
#SPJ2
Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face
Answer:
yes
Explanation:
because the people will be lazy to go and talk to that person instead They will call each other and discuss
PLS HELP MEE it's due in 2 minutes
The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.
A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. wide personal local gateway
A personal area network is a type of wireless network that works within your immediate surroundings.
What is a personal area network?A personal area network (PAN) is known to be a kind of computer network that has been made to function as an interconnecting electronic devices that is also found within an person's own workspace.
Note that a PAN is one that gives or helps in data transmission among devices such as computers, smartphones, etc.
Learn more about personal area network from
https://brainly.com/question/1167985
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode
Answer:
Network Sniffing
Explanation:
Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.
Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.
How is packet sniffing done?Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.
Packet sniffing tools such as WireShark and SmartSniff are examples.
Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.
For further details about Packet Sniffing click here:
https://brainly.com/question/14417640
#SPJ4
3) Write the example of LAN.
Networking at home, Networking in an office, networking between two computers.
The state of a cpu register's content is 10001.10001 in fixed point representation. what are its content if it is represents a positive real number
The fixed point representation of the state of the cpu register is a binary number
The positive real number of the state of the cpu register is 17.53125
How to determine the positive real number?The state of the cpu register is given as:
State = 10001.10001 in binary
To convert the number to a positive real number, we make use of the following product rule
State = 1 * 2^4 + 0 * 2^3 + 0 * 2^2 + 0 * 2^1 + 1 * 2^0 + 1 * 2^-1 + 0 * 2^-2 + 0 * 2^-3 + 0 * 2^-4 + 1 * 2^-5
Evaluate the products
State = 16 + 0 + 0 + 0 + 1 + 0.5 + 0 + 0+ 0 + 0.03125
Evaluate the sum
State = 17.53125
Hence, the positive real number of the state of the cpu register is 17.53125
Read more about fixed point representation at:
https://brainly.com/question/16612919
What element allows text to be displayed in italics, which means the words are slanted to the right?
a
The < crooked > element
b
The < italic > element
c
The < em > element
d
The < slant > element
Answer:
the answer is the italic element
This is an example of what type of formula?
=(D1+D17)
The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function
What are functions in excel?There are different ypes of formula functions in excel such as;
SUMCOUNTCOUNTAIFTRIMMAX & MINNow, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.
Read more about Excel Functions at; https://brainly.com/question/14042837
What is a critical consideration on using cloud-based file sharing and storage applications.
Answer:
Determine if the software or service is authorized
Explanation:
:)
if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?
Answer:
I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.
Explanation:
I think that's what should happen but I'm not sure though.
45 POINTS
PLS HURRY
An issue with the automated collection of personal information is _____. Select 2 options.
it does not yet collect data efficiently
it does not yet collect data efficiently
it processes highly sensitive data
it processes highly sensitive data
that people do not trust it enough
that people do not trust it enough
it may lead to inaccurate decisions
it may lead to inaccurate decisions
it uses robust security solutions
it uses robust security solutions
Answer:
2 - It processes highly sensetive data
4- it may lead to inaccurate decisions
Explanation:
It processes highly sensitive data and it may lead to inaccurate decisions.
What is automated collection?The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.
There are two options:
It handles highly sensitive information.It may result in poor decisions.Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.
Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.
Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.
For more details regarding automated collection, visit:
https://brainly.com/question/14680064
#SPJ3