Answer:
This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.
Explanation:
did someone hang themself on the set of wizard of oz
No - it was a rumour that started when the film was having its 50th anniversary in 1989
!!HELP!!
I need to know what the code is!!
HELP HELP HELP HELP HELP HELP PLEASE GUYS
Answer:
word
Explanation:
what are the parts of a file?
Answer:
A computer file is made up of three elements: characters, fields and records.
Explanation:
Hope this helps! :D
did someone hang themselves on set of wizard of oz
No - its a rumour that has been going around since the films 50th anniversary in 1989.
Why do we collect feedback on the code we write?
Answer:
to improve our code
Explanation:
"To improve our code" we collect feedback on the code we write.
Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.
Thus the above answer i.e., "option a" is correct.
Learn more about feedback here:
https://brainly.com/question/1603365
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.
Learn more from
https://brainly.com/question/17956104
2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.
Answer:
ok.... ..............
how to generate random numbers in excel without duplicates
Answer:
Generate Random Number List With No Duplicates in Excel:1. Select cell B3 and click on it.
2. Insert the formula: =RANDBETWEEN(10,30)
3. Press enter.
4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
what is the answer ?????
Answer:
1) Driver or option D
2) Kindle or option C
2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:
Answer:
1 false
2 false
3 false
4 true
5 false
Explanation:
Answer:
False, True, True, True, False
Explanation:
1. False, it is a calculation device not electronic device.
2. True
3. True, Header appear at the top and Footer appear at the bottom.
4. True
5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.
________ is the use of information technology to support the sharing of content among networks of users.
Answer:
The social media is the use of IT to support the sharing of content among network of users.
Describe the type of gameplay seen during early video games
Answer:
2d?
Explanation:
It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.
Answer: Arcade Machines
The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
1. A means of giving credit to a source when their information is used.
A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi
3. A device that translates analog carrier signals to encode and decode digital information.
A) USB
B) Computer Virus
C) Intranet
D) Modem
4. A virus or Trojan horse designed to cause harm to computer or device.
A) Hardware
B) Malware
C) Modem
D) Antivirus Application
5. Software that is used to detect and eliminate computer viruses.
A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser
6. Transmits data through a cable television network as a means to connect a computer to the internet.
A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB
7. An application used to access websites on the internet.
A) Malware
B) Internet
C) Proprietary
D) Browser
8. Communication that does not happen in real time.
A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware
9. A network of computers that provides access to information on the web.
A) Phishing
B) Internet
C) Antivirus Application
D) Modem
10. The cable used to connect computers in a network.
A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware
Easy Peasy Lemon Squeezy
1. A means of giving credit to a source when their information is used.
A.) Citation
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
B.) Phishing
3. A device that translates analog carrier signals to encode and decode digital information.
D.) Modem
4. A virus or Trojan horse designed to cause harm to computer or device
B.) Malware
5. Software that is used to detect and eliminate computer viruses.
C.) Antivirus Application
6. Transmits data through a cable television network as a means to connect a computer to the internet.
B.) Cable Internet
7. An application used to access websites on the internet.
D.) Browser
8. Communication that does not happen in real time.
A.) Asynchronous Communication
9. A network of computers that provides access to information on the web.
B.) Internet
10. The cable used to connect computers in a network.
B) Ethernet Cable
Answer:
your mom
Explanation:
which type of broadband internet offers connections nearing the speed of light?
Answer:
FiberOptic connections
Explanation
One of the fastest data transfer methods for computers.
The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.
What is fiber-optic?Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.
Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.
Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.
Therefore, the correct option is c. fiber-optic.
To learn more about fiber-optic, refer to the link:
https://brainly.com/question/10062531
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Cable.
DSL.
fiber-optic.
satellite.
The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA 23
the fast speed of _______ available today enable computers to work very fast
Answer:
main hardware components such as:
1. CPU
2. RAM
3. Motherboard (bus speed)
4. Hard drive
5. Video Card
6. Cache
7. Latest operating system (Windows XP, Windows 10, etc.)
what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
Answer:
Proprietary Software
Explanation:
a falsh movies consist of how many frame?
most file managers include a way to create a folder through the save dialog box. true or false?
Answer:
false because most of the file managers just keep Everything organized by dates, years, and everything like that
Explanation:
Easy Question I will make you brainless Just answer this 10 question!!
Answer:
B
Sc
B
Sc
B
B
Sc
B
Sc
Sc
Explanation:
Not positive sorry if its not 100% correct
lauren wants to write short articles and post them online. if she has an internet connection, what software can help her do her work?
Lauren could accomplish her aim if she has an internet connection by making use of Zoho writer.
Zoho writer provides Lauren with a platform to write and post her documents as long as she has internet connection because zoho writer is cloud based. The fact that Zoho writer ls cloud based, it means that only internet connection is required as the platform is equipped with a word processing tools and a clean user interface, which provides all the tools required to write a good document.Therefore, zoho writer software could be adopted by Lauren once she has internet connection.
Learn more :https://brainly.com/question/24978746
A color image is made up of red green and blue color combinations 8 bits are used to represent each of the color components how many possible variations of red are there?
Answer: The three RGB colors are each 8-bits (possible values [0..255], 2 8 = 256) of each of Red, Green, and Blue. The three 8-bit RGB components can create up to 256×256×256 = 16.7 million possible RGB color combinations, called 24-bit "color". Of course, any one real photo image will not use most of these possible colors.
There is possible is the variation of the red color. The RGB is a combination of color. The 8 bit are the division of the 256 are equal to the 16 million.
What is color?
The term “color” refers to the element of light. Color is part of communication. There are different colors that have different meanings, such as red, which represents love and danger. Colors are divided into different categories such as primary, secondary, and tertiary.
The color is the combination of the RGB colors. The letters R, G, and B stand for Red, Green, and Blue, respectively. The 8 bits for 256 shades of the RGB This means R = 256, G = 256, and B = 256 (256 × 256 × 256) are producing the 16 million colors. The variation of the red is possible to achieve an equal color.
As a result, the variation of the red color are possible are 256.
Learn more about on color, here:
https://brainly.com/question/19580247
#SPJ2
3.5.7: Rectangle, Part 2 its python coding
The program which calculates the area of a rectangle written in python 3 is given thus :
def calc_area_rectangle(length, width):
#initialize a function named calc_area_rectangle which takes in two arguments
area= length * width
#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area
return round(area, 2)
#the function returns the value of area rounded to 2 decimal places.
print(calc_area_rectangle(10, 20))
#sample run of the program
Learn more :https://brainly.com/question/25162828
Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2
Answer:
import java.io.*;
public class Main {
public static void main(String[] args) throws IOException {
BufferedReader in = new BufferedReader(new InputStreamReader(System.in));
String s;
while ((s = in.readLine()) != null) {
int total = 0;
for (char character : s.toCharArray()) {
if (s.charAt(0) == character) {
total++;
}
}
System.out.println(total - 1);
}
}
}
Explanation:
We start the program by using the BufferedReader which will allow input from the user.
Then, we create a variable String that will take the input from the user.
Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.
For this, I initialized an integer variable total, that takes count every time the character is found.
Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.
If the condition is true, then the total will increment by one.
But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.
Without specifying total - 1, "n Monday" will output 2 since there are two total "n".
There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.
For that, before the for each statement, simply add s = s.toLowerCase();
Help Digital photo class
Answer: i think the answer is c
Explanation:
Answer:
Here’s your answer!
Explanation:
I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.
Hope this helped
Brainliest please?
Dont forget to smash that heart at the bottom <3
Have a great day,you’re amazing!
why do cyber attackers commonly use social engineering attacks?
Answer:
Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.
Hope this help please give the brainliest award.
Answer:
Attackers can gain what they want while bypassing most technical security controls
Explanation:
.
explain on what you did and give on how problems as such can be avoid inthe future
import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()
Answer:
Export ariana grande fort nite skin
Answer:
I M P O R T P I C K L E
Explanation: