Answer:
Adware
Explanation:
Adware is software designed to display advertisements on your screen, most often within a web browser.
Hope that helps.
A software that used to track a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase is: A. Adware.
An adware is also referred to as an advertisement-supported software and it can be defined as a software application (program) that is designed and developed to automatically display advertising materials such as banners or pop-up adverts (ads) on the graphical user-interface (GUI) of a user's computer system or mobile device.
The main purpose for the development of an adware is to automatically display popup banner adverts (ads), in order to lure or convince an end user into making purchase of the advertised product or service.
In conclusion, an adware is a software that is typically used to track and gather information about a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase.
Read more on adware here: https://brainly.com/question/9692296
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
Which of the following statements are true regarding Moore’s Law?
states that storage capabilities will triple every two years
is a purely abstract concept that does not clearly apply to the computing industry
was described by Gordon Moore in the early 2000s to predict growth in the fiber optic industry
relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The question is about Moore's Law.
The given options in this question are:
states that storage capabilities will triple every two years is a purely abstract concept that does not clearly apply to the computing industry was described by Gordon Moore in the early 2000s to predict growth in the fiber optic industry relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965The correct option to this question is 4. i.e:
Moore's Law related to increases in the processing power of computers and has been quite accurate since it was introduced in 1965. This law was based on a prediction and made by American engineer Gordon Moore in 1965. And it states that the number of transistors per silicon chip doubles every year.
While the other options are not correct because:
It does not state the storage capabilities that will triple every two years, but this law state that computing power and transistors on chips become double every year. It is not a purely abstract concept but it is applied in computing and this law become more famous due to its value. This law was presented in 1965.
relates to increases in processing power of computers and has been quite accurate since it was introduced in 1965
The meaning of docile can be determined by the... context clue. synonym atonym or explanation
Answer:
Synonym
Explanation:
I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.
Answer:
it is explanation
Explanation:
trust me
Someone plz im begging for ur help plzz??
Answer:
woah what subject is this-
Explanation:
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?
A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.
Answer:
its b
Explanation:
on edg
Answer:
b
Explanation:
Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?
Answer:
A .psd file
Explanation:
Adobe photoshop files are always going to be same and there is no compression. Even better .ai files are saved into equations so you can't alter or dumb it down.
In most places of work, how long should it take someone to respond to an e-mail?
no obligation to respond
one hour
twenty-four hours
one week
Answer:
24 Hours
Explanation:
Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.
Answer: 24 hours
Explanation: It's correct
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)
Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
PLEASE HURRY
In binary, an individual 0 or 1 is called a bit O True O False
the answer is true !
Answer:
true
Explanation:
true
What sorts of changes have you been observing in your society in your society in comparison in last 3 years
who invite computer ?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer", he conceptualized and invented the first mechanical computer in the early 19th century.
Python Project Worksheet
Print | Save
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.
Write your pseudocode here:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.
Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.
Print | Save
Answer:
I will do it and send it in a pic
Explanation:
give me a sec
Four common types of distractions are
Question 1 (10 points)
When using MLA format your font type and font size should be what?
Question 1 options:
Rockwell 12
Calisto 11
Times New Roman 11
Times New Roman 12
Question 2 (10 points)
What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:
Insert
Design
View
References
Question 3 (10 points)
What tab do you go to to put a header on your paper
Question 3 options:
References
Insert
Layout
Home
Question 4 (10 points)
When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:
Synonym
Homonym
Antonym
Metronym
Question 5 (10 points)
In Word you can force a page break
Question 5 options:
By positioning your cursor at the appropriate place and pressing the F1 key
By hitting the enter key twice really fast
By clicking the Insert Tab and selecting Page Break in the ribbon
By changing the font size of your document
Question 6 (10 points)
In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:
First Line Indent
Hanging Indent
Tab
Left Indent
Question 7 (10 points)
Which would you choose to save a document with a new name?
Question 7 options:
Press Ctrl+S
Click File, Save
Click Tools, Options, Save
Click File, Save As
Question 8 (10 points)
To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:
Insert
References
Design
View
Question 9 (10 points)
User can use ______ commands to search for and correct words in a document
Question 9 options:
Copy and Paste
Find and Replace
Header and Footer
Print and Print preview
Question 10 (10 points)
What tab do you go to for the spelling and grammar check?
Question 10 options:
Home
Review
Insert
File
Answer:
Find and replace header and footer
While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False
Answer:
f
Explanation:
How has technology effected the way we communicate?
Indeed it has.
Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.
Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.
Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.
Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.
-Astolfo
4.5 code practice edhesive
Answer:
n= input("Please enter the next word: ")
x=1
while(n != "STOP"):
print("#" + str(x) + ": You entered " + n)
x=x+1
n= input("Please enter the next word: ")
print("All done. " + str(x-1) + " words entered.")
Explanation:
a.
Define a computer with its proper meaning.
Answer:
Computer
Explanation:
a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.
Answer:
computer
Explanation:
An electronic machine that processes, stores data, and does calculations.
ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3
Answer:
ABC PLEASE
Explanation:
Answer:
ABC i have mega owl and neon cow and mega frost <3
What is GIGO ?
plz answer me
Answer:
Garbage in, garbage out
Explanation:
In computer science, garbage in, garbage out is the concept that flawed, or nonsense input data produces nonsense output or garbage
What number will be output by the console.log command on line 7? *
2 points
Captionless Image
Answer:
The output is 100
Explanation:
See attachment for complete question
I'll be making reference to the attachment time to time.
On line 1 of the attachment, variable fizz was declared
On line 2, variable bop was declared
Variable bop was initialised to 10 on line 3
Variable fizz was initialised to 20 on line 4
On line 5, 100 was assigned to bop
On line 6, 200 was assigned to fix
The value of bop was printed on line 7.
Note that, the current value of bop is not 100 (as updated on line 5).
Hence, the output of the program at line 7 is 100
Based on the program command displayed in the console, the output displayed by the console.log command would be 100.
The variable bop is assigned a value of 10 based on the command in line 3 In line 5 however, an update has been made to the bop variable, and the variable has been update to 100.The newly assigned varibale value on line 5 would be the value of the bop variable unless updated again.Hence, the output would be 100.
Learn more : https://brainly.com/question/20304083
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
Problems that are undecidable and algorithms that are unreasonable both touch on the limits of the kinds of computing
that a computer can accomplish. In your own words, explain the difference between undecidable problems and
unreasonable time algorithms.
Answer:
An unsolvable problem is one for which no algorithm can ever be written to find the solution. An undecidable problem is one for which no algorithm can ever be written that will always give a correct true/false decision for every input value.
Undecidable problems simply describes problems which do not have the algorithm to produce the required 'yes' or 'no' solution while unreasonable time algorithm are those problems which run time grows exponentially.
A problem is tagged as Undecidable if no algorithm exists to allow such problem produce a 'yes' or 'no' solution. Hence, undecidable problems would sometimes run infinitely or give a wrong output in some cases. Unreasonable time algorithm describes problems whose run time increases in an exponential nature. Such programs increases in run time very quickly due to the nature of the of the computation. Example ; 10^n.., where n is a range of values.Therefore, both undecided and unreasonable time algorithm affects the limits of computing attainable by different computer systems.
Learn more :https://brainly.com/question/21242780?referrer=searchResults
Select the correct answer. Which sign or symbol will you use to lock cells for absolute cell reference?
A.
ampersand
B.
asterisk
C.
dollar sign
D.
exclamation mark
Answer:
A. ampersand
Explanation:
Answer:
C. Dollar Sign
Explanation:
After adding an image to her flyer, Danica played around to see which layout would look the best. At one point, her text was on top of her image. Which features can Danica use to fix the issue? Check all that apply. Position feature Wrap text feature Picture dialog box Insert tab Picture tools
Answer:
Position feature
Wrap text feature
Picture tools
Explanation:
Answer:
A.) Position Feature
B.)Wrap text feature
E.)Picture tools
Explanation:
Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon
Answer:
To access the the junk email options in Outlook 2016, follow the following steps.
1. Click the Junk Button
This will take you to the Junk messages that you have.
2. Select a message
Select a junk message from the list.
3. Locate the Delete group on the ribbon
The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.
4. Select Junk Email Options
Click on the Junk email options button and a popup window will appear.
5. Choose one of the protection levels
Select the protection level you want from the various options listed including low, high, automatic etc.
Answer:
select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.
Explanation:
Which kind of a person will you be if you prove to be accountable for your actions?
Answer: You would be a person of integrity.
Explanation: Look up Integrity for details.
what important advice to include about spyware, viruses and other types of malware
Answer:
You should probably include the fact that most of these things will disguise themselves as fake downloads and that will most of the time claim to allow you to download something that costs money for free.
Explanation:
thats all i could come up with
The best antivirus that you need to stay safe from viruses, malware, and spyware is just common sense. Don't click suspicious links to places you don't know. Get a good antivirus. Don't click links with weird names at the end like .co or .it unless you are sure it is a safe website. Don't download weird stuff. Common sense my guys!
What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)
Answer:
Syntax error.
Explanation:
There are many typing mistakes in this source code.
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!