Answer:
i think that the student should NOT have to redo work, especially if it was the teacher's fault for losing the assignment(s).
I hope you get credit for your work tho, and the teacher is reasonable and understanding
Explanation:
Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face
Answer:
yes
Explanation:
because the people will be lazy to go and talk to that person instead They will call each other and discuss
You have received an update package for a critical application you are running on a virtual machine. You have been told to install the update package and that you cannot very little downtime. What should you do first?
The first thing to do install the package without having downtime is; Virtualization.
What is virtualization?Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.
Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.
Since there should be no down time, then it is advisable to first carry out virtualization.
Read more about virtualization at; https://brainly.com/question/26462832
How have you improved the technology function to provide the right services at the right price and right level of quality?
Website where customers can ask check the ,services and products, Using e-mail to improve customer service and respond to specific needs and More advanced data-gathering techniques, such as customer relationship management software.
How can technology help in customer retention?Deals can be sent via mobile. Customers would profit from promotions and coupons supplied to their mobile devices.
This behavior is growing more sophisticated and focused. You can send promos on products or services you know a consumer enjoys based on their purchase history.
Thus, Website, E-mail and software can improve the service quality.
For further details about technology, click here:
https://brainly.com/question/16877197
#SPJ4
A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean
A structure which can execute a set of statements only under certain circumstances is: C. decision.
What is a decision structure?A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.
This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.
Read more on decision structure here: https://brainly.com/question/13297323
How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object
Answer:
as an object in the hierachy panel
Katie wants to use VLOOKUP for a column in a table. Which value of the mode perimeter should she use to look for an exact match of the searched data?
Answer:
The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data
Explanation:
The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.
Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.
To achieve this, select a cell in your Excel worksheet
Type =VLOOKUP in the type bar of the Excel sheet
Select the value to look up and then select the data range
Type the column number that you want to search and then type FALSE
Press enter
Does single quote and double quote work same in javascript
Answer:
yes!
Explanation:
the only difference is that some companies prefer one over the other as a standard
https://stackoverflow.com/questions/242813/when-should-i-use-double-or-single-quotes-in-javascript
but they work the same
If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?
Answer:
I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps
Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
what should chris do to ensure that he can see others’ comments?
a. select show all comments on the review tab.
b. select show no comments on the review tab.
c. select add comment on the review tab.
d select track changes on the review tab.
Answer:
a. select show all comments on the review tab
Explanation:
Please mark me brainliest if correct
Answer:
A
Explanation:
What element allows text to be displayed in italics, which means the words are slanted to the right?
a
The < crooked > element
b
The < italic > element
c
The < em > element
d
The < slant > element
Answer:
the answer is the italic element
how does computer science help in dance
Do not troll, I will be writing you up.
What is a critical consideration on using cloud-based file sharing and storage applications.
Answer:
Determine if the software or service is authorized
Explanation:
:)
starting a computer after it has been turned off is term as
Answer:
Booting
Explanation:
This is an example of what type of formula?
=(D1+D17)
The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function
What are functions in excel?There are different ypes of formula functions in excel such as;
SUMCOUNTCOUNTAIFTRIMMAX & MINNow, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.
Read more about Excel Functions at; https://brainly.com/question/14042837
What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and Folder
The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.
Answer: view and send/recieve
Explanation:
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode
Answer:
Network Sniffing
Explanation:
Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.
Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.
How is packet sniffing done?Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.
Packet sniffing tools such as WireShark and SmartSniff are examples.
Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.
For further details about Packet Sniffing click here:
https://brainly.com/question/14417640
#SPJ4
Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive average the geometric average the common average
Answer:
"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."
Explanation:
5. 16 LAB: Brute force equation solver
Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.
How do I write this in python?
Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .
How to find the solution of an equation in python?To make it simpler the code is described as:
def brute_force_two_equations(first_values, second_values,
max_range=10, min_range=-10):
for x in range(-10, 10, 1):
for y in range(-10, 10, 1):
if a * x + b * y == c and d * x + e * y == f:
print(x, y)
else:
print('No solution')
def equation(const1, const2, x, y):
return const1 * x + const2 * y
def get_three_integers():
inputs = []
for i in range(0, 3):
inputs.append(int(input("Please enter a value: ")))
return inputs
if __name__ == "__main__":
print("== First Equation ==")
first_equation_values = get_three_integers()
print("== Second Equation ==")
second_equation_values = get_three_integers()
solution = brute_force_two_equations(first_equation_values,
second_equation_values)
if solution:
print(f"(x, y) {solution}")
else:
print("No Solution found")
See more about python atbrainly.com/question/22841107
75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware
Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
How to creatte a react app without a git hub repository
Answer:
You needn't be on Github. You just need to have the software, like visual code installed on your computer.
If you've got all these things sorted, then you'll be able to make apps without github.
What does a black box represent in the system input/output model?.
Answer:
es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.
Explanation:
You make me the happiest person on earth
i feel joy when i see your face
when i am depressed all i have to do is to think about you and it puts me in a good mood.
do i need to add more to thut
Answer:
Fixed
Explanation:
I feel joy when I see your face
When I'm depressed all I have to do is to think about you, and it puts me in a good mood.
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
There are different kinds of applications. Control objects control the flow of the application.
What works the flow of control in a program?In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.
They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.
Learn more about application from
https://brainly.com/question/23275071
45 POINTS
PLS HURRY
An issue with the automated collection of personal information is _____. Select 2 options.
it does not yet collect data efficiently
it does not yet collect data efficiently
it processes highly sensitive data
it processes highly sensitive data
that people do not trust it enough
that people do not trust it enough
it may lead to inaccurate decisions
it may lead to inaccurate decisions
it uses robust security solutions
it uses robust security solutions
Answer:
2 - It processes highly sensetive data
4- it may lead to inaccurate decisions
Explanation:
It processes highly sensitive data and it may lead to inaccurate decisions.
What is automated collection?The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.
There are two options:
It handles highly sensitive information.It may result in poor decisions.Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.
Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.
Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.
For more details regarding automated collection, visit:
https://brainly.com/question/14680064
#SPJ3
PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?
Answer:
a
Explanation:
Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.
For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:
So the answer is a.
The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:
Prefix function:To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.
The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.
Please find the attached file for the complete solution.
Find out more bout the prefix function here:
brainly.com/question/14912735
Which of the following best describes your sequence of actions when developing a web page?
Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file
Answer:
I think D
Explanation:
Answer:
B
Explanation:
Saving it, then editing it wouldn't load the new changes
but editing it than saving it, would load the new Changes
data in ai uses what >
Answer:
Explanation:
artificial intelligence describes the ability of computers to act like humans
if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?
Answer:
I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.
Explanation:
I think that's what should happen but I'm not sure though.
How could the following line of code be shortened?
average = average + 1
Group of answer choices:
1.average + a
2.average += 1
3.average = + 1
4.average = 1 + average
Answer:
2
Explanation:
The second option is the only one that will work. The last would work but doesn't make the code any shorter.
Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.
What role of line of code if shortened?It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.
By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.
Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.
Therefore, The second option is the only one that will work.
Learn more about line of code here:
https://brainly.com/question/18844544
#SPJ2
3) Write the example of LAN.
Networking at home, Networking in an office, networking between two computers.