PLZ HELP I WILL GIVE BRAINLYEST

PLZ HELP I WILL GIVE BRAINLYEST

Answers

Answer 1
system and application
Answer 2

Answer:

software program and application software

in that order


Related Questions

How is advertising using social media different from using traditional advertising?

Answers

Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.

When people become more dependent on digital technology in their lives, the potential for data misuse will grow.

Explain the above sentence in your opinion.




Answer and I will give you brainiliest ​

Answers

Answer:

abbjiaj

zzz

Explanation:

uuwuwahsbsbsssiaaivab njw

Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B​

Answers

Answer:

technician A if you use the net it still saves the hair than letting it long and exposed

What is one still image in a film or video called?
unit
frame
stand
selection

Answers

Answer:

frame

Explanation:

the answer is frame ;)

Answer:

Frame

A still frame is a single static image taken from a film or video, which are kinetic (moving) images. Still frames are also called freeze frame, video prompt, preview or misleadingly thumbnail, keyframe, poster frame, or screen shot/grab/capture/dump

Explanation:

Pls mark as brainliest

How can i watch the Loud house FREE with a fire stick ? will mark brainliest :3

Answers

Answer:

cinema you'll have to download it

As of 2007, how many concentrated solar power plants did the United States have?

Answers

Answer:

12,718

Explanation:

Hope this helps! Let me know! :)

Mikayla is listening to music while she completes research for a school assignment. The input and output devices are able to communicate with each other because the computer has

central processing memory
a central processing unit
random access memory
read-only memory

Answers

Answer:

A central processing unit (CPU)

Hiding text in a picture is known as?

Answers

Answer:streganography

Explanation: it allows you to hide text in an image without anyone knowing

did y’all enjoyed project next phase 3 and The 4 revamped heroes

Answers

Answer:

it was good i liked it

Explanation very good

Using a vue-cli initiated project, make a ticker that will keep track of the number of attendees in a space

Answers

Number of attendees

what is the full form of MHz​

Answers

Answer:

megahertz

Explanation:

The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz). The megahertz is commonly used to express microprocessor clock speed.

OSI layer for HDLC??​

Answers

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

What are the difference generation of computer system?

Answers

Answer:

5 generations

Explanation:

1st generation 1940's to 1950's vacuum tube based.

2nd generation 1950's to 1960's transistor based.

3rd generation 1960's to 1970's integrated circuit based.

4th generation 1970's to 1980's microprocessor based.

5th generation present and future artificial intelligence based.

Match each term to its definition.

parameter
return value
function

a value that can be passed from a function back to the calling part of a program.

a value that can be passed to a function

a group of instructions that can be used to organize a program or perform a repeated task

Answers

Answer:

Parameter - A value that can be passed to a function

Return Value - A value that can be passed form a function back to the calling part of a program

Function - A group of instructions that can be used to organize a program or perform a reapeated task.

Write a program that reads numbers from the user until a blank line is entered. Your
program should display the average of all of the values entered by the user. Then
the program should display all of the below average values, followed by all of the
average values (if any), followed by all of the above average values. An appropriate
label should be displayed before each list of values.

Answers

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

SOME PLEASE DO THIS ASAPP!!

Answers

Answer: I think it’s really cool. You don’t have to find someone g m ai l and then write a subject and whatever else. You can just send it like a m ess age. I love how it has the call option because it means that you don’t have to have a nu m ber to call your friends or family. And you can do business em ai l while me s saging whoever you need to instead of going back and forth.  

You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have g m ails and it’s fairly simple to just add your friend and te xt them.  

It might be hard to figure out at first. But when you get used to it its fairly simple. It can also shut down do to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your gm a i l and read all of your information. (there is a few words i spaced out bc it wouldnt let me send)

Explanation:

Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.

Answers

Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.

What are the research paper's impacts on cyberbullying?

The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.

Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.

To know more about the Cyber Bullying visit;

https://brainly.com/question/1460915

#SPJ1

3. Find the best.

Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.

Do this with beginner c programming.

Example output:

Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1

Average Score = 5.3333, best = 10

Answers

Answer:

1. is the answer

Explanation:

mark me as brainlest

Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value for hours worked in a day. The program calculates the hours worked in a five-day week and the hours worked in a 252-day work year. The program outputs all the results.

Answers

Answer:

i think its 2131

Explanation:

c

Choose the comparison operator that will create a true statement in scratch

Answers

Answer:

the first one

Explanation:

think about it. 60 equals 60! this is true!

Answer:

A is correct

Explanation:

i took this same test

Question 3 of 15
Which term describes a computer program's ability to run, receive feedback to
rewrite, and improve its own algorithms for the future?
A. Machine learning
B. Operator with variables
C. Algorithmic bias
D. If-then programming

Answers

A. Machine learning

Machine learning is the study of computer algorithms that can be automatically modified for improvement through experience and the use of data.

Someone help me please i need to finish this

Answers

Answer:

My digital life is like a adventure because there is so much to discover.

Hope this help please give the brainliest award.

arithmetic test is given twice within a few days to a student. The highest possible score is 40. He receives a score of 35 the first time and a score of 18 the second time. If similarly varying results are obtained from other students, the test result is probably unreliable in the idea o

Answers

Similar varying results obtained as scores from other students indicates that the test is; Unreliable.

This is about test reliability and it is based on consistent results. This implies that it is a measure of how well a characteristic of a test is measured dependably or consistently.

With reference to the above on test reliability, applying it to our question. If the student took the test twice and got a similar result the two times, then the test is said to measure the score reliably but if the two scores are not similar but vary widely from each other, then the test is said not to measure the score consistently and is said to be unreliable.

In our question, since varying results scores are continually obtained for two same tests of same students, then we can say the test does not measure the scores reliably and we can conclude that the test is unreliable.

Read more at; https://brainly.com/question/15136257

What is the difference between cipher block chaining mode and electronic code book mode?

Answers

ECB (Electronic Codebook) is essentially the first generation of the AES. It is the most basic form of block cipher encryption. CBC (Cipher Blocker Chaining) is an advanced form of block cipher encryption. With CBC mode encryption, each ciphertext block is dependent on all plaintext blocks processed up to that point.

Answer:

ECB (Electronic Codebook) is essentially the first generation of the AES. It is the most basic form of block cipher encryption.

CBC (Cipher Blocker Chaining) is an advanced form of block cipher encryption. With CBC mode encryption, each ciphertext block is dependent on all plaintext blocks processed up to that point.


Name the five automated information systems - The Vendors

Answers

Answer:

The computer age introduced a new element to businesses, universities, and a multitude of other organizations: a set of components called the information system, which deals with collecting and organizing data and information.

An information system is described as having five components.

1- Computer hardware. This is the physical technology that works with information.

2- Computer software. The hardware needs to know what to do, and that is the role of software.

3- Telecommunications.

4- Databases and data warehouses.

5- Human resources and procedures.

Explanation:

Computer hardware

This is the physical technology that works with information. Hardware can be as small as a smartphone that fits in a pocket or as large as a supercomputer that fills a building. Hardware also includes the peripheral devices that work with computers, such as keyboards, external disk drives, and routers. With the rise of the Internet of things, in which anything from home appliances to cars to clothes will be able to receive and transmit data, sensors that interact with computers are permeating the human environment.

Computer software

The hardware needs to know what to do, and that is the role of software. Software can be divided into two types: system software and application software. The primary piece of system software is the operating system, such as Windows or iOS, which manages the hardware’s operation. Application software is designed for specific tasks, such as handling a spreadsheet, creating a document, or designing a Web page.

Telecommunications

This component connects the hardware together to form a network. Connections can be through wires, such as Ethernet cables or fibre optics, or wireless, such as through Wi-Fi. A network can be designed to tie together computers in a specific area, such as an office or a school, through a local area network (LAN). If computers are more dispersed, the network is called a wide area network (WAN). The Internet itself can be considered a network of networks.

Databases and data warehouses

This component is where the “material” that the other components work with resides. A database is a place where data is collected and from which it can be retrieved by querying it using one or more specific criteria. A data warehouse contains all of the data in whatever form that an organization needs. Databases and data warehouses have assumed even greater importance in information systems with the emergence of “big data,” a term for the truly massive amounts of data that can be collected and analyzed.

Human resources and procedures

The final, and possibly most important, component of information systems is the human element: the people that are needed to run the system and the procedures they follow so that the knowledge in the huge databases and data warehouses can be turned into learning that can interpret what has happened in the past and guide future action.

name of the people associated with the development of computer briefly explain thier contribute

Answers

Snsnsnnsnsnsnsjsmsns

Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!

Answers

Answer:

5=5

Explanation:

2+2 is 4

Below is the required Python code for the program.

Python

Program code:

# Starting the code

# Defining a function

def same_ends(lst, n):

   # Starting a loop

   if lst[:n] == lst[-n:]:

       return True

   else:

       return False

# Testing the function

lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]

# Printing the values

print(same_ends(lst,4))

print(same_ends(lst,3))

Explanation:

Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.

Output:

Find below the attachment of the code output.

Find out more information about python here:

https://brainly.com/question/26497128

What the three factors that AI is using for information gathering



Answer and I will give you brainiliest ​

Answers

Answer:

AI uses accelerometers, infrared, magnetic and other electronic sensors to gather data

Python 3.12 LAB: Input and formatted output: Right-facing arrow Given input characters for an arrowhead and arrow body, print a right-facing arrow. Ex: If the input is: * # Then the output is: # ******## ******### ******## #

Answers

The code below prints the required shape using the string manipulations in Python.

In Python, if we multiply a character with a number, we get that character side by side that number of times.

For example: 6 * '#' would give us → ######

Also, we can use + sign to concatenate the strings.

For example: 'hi' + ' there' would give us → hi there

We use this approaches to print the required shape line by line.

Comments are used to explain each line.

The output is attached as an image.

#get the characters from the user

base_char = input()

head_char = input()

#set first row with 6 spaces and 1 head_char

row1 = 6 * ' ' + head_char

#set second row with 6 base_chars and 2 head_chars

row2 = 6 * base_char + 2 * head_char

#set third row with row2 and 1 head_char

row3 = row2 + head_char

#print the rows to draw the shape

print(row1)

print(row2)

print(row3)

print(row2)

print(row1)

You may see another question at:

https://brainly.com/question/22101725

which is NOT a basic human sense used in collecting collecting data?

Answers

Answer:

Explanation:This section outlines some of the key considerations that may arise during various steps in the data collection process. There is no requirement that these steps be followed or pursued in the order that they are written. The model presented is offered as a reference tool. How data is gathered and analyzed depends on many factors, including the context, the issue that needs to be monitored, the purpose of the data collection, and the nature and size of the organization.

Other Questions
Can someone help me with this I'm confused What would be the range of possible whole number values (x) for a 3rd side of the triangle with two sides of 5 in. and 8 in.? Math?? anybody somebody please help100 points worth how long should you wait to dye your hair after bleaching Question 21 of 25 In the triangle below, what is the length of the side opposite the 30 angle? 30 60 A. 34/3 B. 3/2C. SQR ROOT of 3D. 2-3 NEED HELP PLZZWhat do you think our society should do about those technologies? Please help me w this The most powerful anticancer drugs come from this flower in the rainforest:Marigold Periwinkle Orchids Hibiscus Based on the situation between Gortsby and the young man, what is a theme of Passage 4? what would be the measure of Lead-lined protective equipment works because: The Students on each team who drew the greatest number will be the captain of that team. Place the players of the Lions team in order from Least to Greatest.Who was the captain of the Lions Team? Two fifth of pupils in a standard 7 class were girls.There were 27 boys in the class. ( a) how many girls were there. (b) how many peoples were there in the standard 7 class Pls answer :What are two ways that the adoption of the U.S Constitution affected nations economy? I give u 100 points pls answer Young artists can show their works at a(n) .organized by the town hall. A. festival B. event C. exhibition D. costume It takes Tanmy 45 Min To ride her bike 5 miles, At this rate, How long will it take her to ride 8 miles?1) 0.89 hour2)1.125 hours3) 48 Min4) 72 Min Convierte las oraciones pasivas a activas What is matter? Anything that has mass and takes up space Something that has volume and takes up space Things that have energy and take up space Things that take up space but don't have mass The Moon's mass is lower than that of Earth, thus its gravity is ____ Earths gravity.This is 5th grade btw Who can check your credit score?