Answer:
Byte, the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1. The string of bits making up a byte is processed as a unit by a computer; bytes are the smallest operable units of storage in computer technology.
Explanation:
Can I be brainliest? TYSMMMMMM
BRAINLIEST
When using design templates, these elements will be determined for you.
bullets
background
color scheme
content
title
font
Answer:
background
color scheme
font
I think thats all
Explanation:
Please give me Brainly
When using design templates, the elements that will be determined for you are color scheme and background. The correct options are b and c.
What is designing a template?The template is creating a document that has a copy of itself. Design templates are ready-made layouts and written materials that can be altered. For example, if you have a template of office content, then you can use it for another word document. You don't have to start from scratch.
In order to maintain consistency among users and media, templates are frequently created to adhere to certain rules or specifications. You can make new templates for later use, or utilize pre-designed templates from template libraries and websites.
Therefore, the correct options are b, background, and c, color scheme.
To learn more about template, refer to the link:
https://brainly.com/question/28193778
#SPJ2
Anyone have an answer for 4.9 lesson code practice
Answer:
loop
Explanation:
Answer:count
Explanation:
Why can the internet keep growing as more devices are added without decrease in performance?
Answer:
Explanation:
There may be many reasons why your internet speed is slow. Internet use requires a reliable connection between your device and the destination, which may be a server that is physically located on the other side of the world.Your connection to that server could pass through hundreds of devices on its journey. Each one of these is a potential failure, or weak point. If one point along this path isn’t functioning optimally, this can significantly affect your internet experience.
look at the picture lol
Answer:
Zoom in more please and than i can help
Explanation:
Answer:
I would go with the first blue highlighted one... but i could be wrong
i hope i helped
if i didn't... i am sorry, i tried.
Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I really need a quick and correct response. Pls support.
Answer:
i think its 3337
Explanation:
_________ is the primary measurement used to gauge your typing ability
Answer:
Words per minute
Explanation:
What is the difference between soft copy output devices and hard copy output devices
the output printed on the paper is called hardcopy output. some examples are printer and plotter.
the output produced on display screen and audio sound is called soft copy output. some examples are moniter and speaker.
Which of the following is NOT a correct variable assignment?
O test = 98
Oname = "Ada"
O x = x + 1
O 5+ y = x
Variables are simply the names given to memory location.
The incorrect variable assignment is (d) 5 + y = x
To assign a value to a variable, we make use of the following syntax:
variable = expression/value
The above syntax means that:
The variable will be on the left-hand side, while the values or the expressions will be on the right-hand side
Using the above highlights as a guide, we can conclude that:
(d) 5 + y = x is not a correct variable assignment
This is so because, it does not conform to the syntax of variable assignment
Read more about variable assignments at:
https://brainly.com/question/18522561
What are possible challenges of cyberbullying
Answer:
so,e challenges of cyber bullying is that,it could be a random person bullying u and u won't know who it is,another challenge of cyber bullying is that they can blackmail u or pretend to be u or threaten u
Answer:
Possible challenges of cyberbullying have to do with nonbelievers, or people who do not think cyberbullying is a real problem. Technology makes it hard to stop bullies, and some people do not want to take responsibility.
Rayna wants to create an organizational chart in her document. Which of the following commands should she click in the Illustrations group?
Chart
Media
Screenshot
SmartArt
Answer: Your real answer is SmartArt
Explanation:
Which of this isn't one of the three types of cryptograph?
A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing
Answer:
A. Vegenere
Explanation:
I think it's spelled Vigenère, I might be wrong.
The three types of cryptograph are:
Symmetric Key Cryptography (Private/Secret Key Cryptography)
Asymmetric Key Cryptography (Public Key Cryptography)
Hash Function
Which of the following You tubers uses the word "flip" as a curse word
A. Unspeakable
B.09Sharkboy
C. Moosecraft
D. All of the above
First correct answer get brainiest!
What can you do to prevent damage to a computer? Check all of the boxes that apply.
Keep your computer in a temperature- controlled room.
Tie cords in knots so they are shorter.
Dust your computer only when you see a buildup of dust.
Use surge protectors when you are away from home or school.
Answer:
temperature-controlled room and surge protectors
Explanation:
Answer:
Keep your computer in a temperature- controlled room
Dust your computer only when you see a buildup of dust
Use surge protectors when you are away from home or school
Explanation:
just good
PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you would utilize to adjust your driving and lower your risk??
Collisions occur when one output is mapped to two inputs.
A. True
B. False
Answer:
true very true very true
Answer:
False
Explanation:
I honestly just guess ngl
but i believe it's right ;0
HELP ASPDrag the tiles to the correct boxes to complete the pairs.
Match the items with their respective descriptions.
organizes files
make files easily searchable
keeps track of file creation and modification dates
makes files easily accessible
file system on the computer
a list of sub-folders
a central location
The arrangement that comes first based on the table are:
make files easily searchable.organizes files. makes files easily accessible.keeps track of file creation and modification dates.What is File Management?A file is known to be the storage unit that can be seen in a computer. It saves all of the information, data, as well as others.
Note that in Organizing Files, one need to arrange files, folders, and sub-folders in a logical manner.
To make sure that there is easy accessibility of all files and folders, do choose a central location to organize all the files.
Therefore, The arrangement that comes first based on the table are:
make files easily searchable.organizes files. makes files easily accessible.keeps track of file creation and modification dates.Learn more about File Management from
https://brainly.com/question/12736385
#SPJ1
Answer:
The arrangement that comes first based on the table are:
make files easily searchable.
organizes files.
makes files easily accessible.
keeps track of file creation and modification dates.
What is File Management?
A file is known to be the storage unit that can be seen in a computer. It saves all of the information, data, as well as others.
Note that in Organizing Files, one need to arrange files, folders, and sub-folders in a logical manner.
To make sure that there is easy accessibility of all files and folders, do choose a central location to organize all the files.
Therefore, The arrangement that comes first based on the table are:
make files easily searchable.
organizes files.
makes files easily accessible.
keeps track of file creation and modification dates.
Explanation:
What action demonstrates unethical behavior?
A.
working overtime
B.
completing your work ahead of time
C.
taking credit for another person’s work
D.
keeping a tab on your organization’s carbon footprint
E.
leaving office on time
Answer:
taking credit for another person’s work
Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
What is Unethical behavior?When a person, a professional, or an industry acts in a way that is deemed unethical because it goes against social norms, that behavior is referred to as unethical behavior.
Politicians, businesses, professions, and individuals all have the potential to act unethically.
There are other instances of deliberate deception, but they serve as illustrations of how damaging deception can be when it is used to violate someone's rights or security.
Therefore, Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
To learn more about Unethical, refer to the link:
https://brainly.com/question/10174825
#SPJ2
not sure what this means.
Answer:
should be text effects............
Which of these is a rule for creating variable names?
Must start with a capital letter
Must start with a lowercase letter
Cannot include numbers
Cannot use an underscore to separate words
Answer:
Must start with a lower case letters
Which statement is true? Select 3 options.
A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.
Answer:
A,C, AND E
Explanation:
i got it wrong for the anwser
The statements that are true are as follows:
A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.Thus, the correct options for this question are A, C, and E.
What is Function?A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.
Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.
Therefore, the correct options for this question are A, C, and E.
To learn more about Functions, refer to the link:
https://brainly.com/question/22340031
#SPJ2
Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; today, we still learn through stories.
true
false
Answer:
first civilizations emerged around 3000 BC in the river valleys of Mesopotamia, Minoan, India, China, and Egypt.
Answer:
true
Explanation:
I just did the test
What are the steps to open the Custom AutoFilter dialog box?
Answer:
data, sort and filter, text filters
Explanation:
ed 2020
Answer:
data, sort and filter, text filters
Explanation:
URGENT!!!!15POINTS AND BRAINLIEST
Type the correct answer in the box. Spell all words correctly.
In a hydraulic jack, the pipe below the load has an area of 5 m2, and the pipe through which the input force transmits has an area of 1 m2. Calculate the force required.
kN of input force is necessary to balance a load of 10,000 N.
Answer:
0.2kN
Explanation:
An hydraulic jack works by the principle that pressure applied to one part in an enclosed liquid is transmitted equally in all parts of the liquid. this is in accordance with Pascal's principle.
Pressure= Force/Area
P=F/A
Pressure due to the load= Pressure due to input force for the system to be in balance.
Let force due to load be F₁, input force be F₂, Area at the load piston be A₁ and the area of the pipe through which the input force transmits be A₂, then,
F₁/A₁=F₂/A₂
10000N/5m²=F₂/1m²
F₂=(1000N×1m²)/5m²
F₂=200N
=0.2kN
How can I get coding with no experience?
With "no" experience? With help, yes! Although with nothing, it would be almost impossible.
Select the protocol data units.
1. Bit
2. Segment
3. Frame
4. Data
5. Spoof
6. Pin
7. Packet
Answer: 4. Data 2. segment 7.packet 3.frame 1.bit
Explanation:
Answer:
segmet bit packet frame data
Explanation:
Part B
How would you classify a network formed by connecting two MANs together?
В І у хх Font Sizes А • А
Match the interface element with the corresponding examples. You will use the elements more than once.
Question 1 options:
List Boxes
Message Boxes
Accordion
Modal Windows
Search Field
Notifications
Buttons
Checkboxes
Tooltips
1.
Input Controls
2.
Navigational Components
3.
Informational Components
4.
Containers
(place each one of them under the 1.2.3.4 categories)
Answer:I’m nit sure sorry
Explanation:
..
____ a British mathematician devolved the concept of a programmable digital computer and worked with Ada Lovelace to design the first mechanical computer the Analytical Engine
A William Shockley
B Grace Hopper
C Charles Babbage
D Bill Gates
someone pls answer asap
Answer:
C: Charles Babbage
Explanation:
Charles Babbage
Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines.
The analytical engine is a comprehensive robotic computer system that's been fully programmed as well as automatically controlled, and the further discussion can be defined as follows:
The computer pioneer Charles Babbage (1791-1871), designed two engine classes, different engines as well as analytical engines.He was indeed the brain behind ideas and therefore is considered one of the best on two different computers.A British mathematician Charles Babbage has invented the notion of the digital programmable computer and has been working with Ada Lovelace to design an analysis engine's first machine.Therefore, the final answer is "Option C".
Learn more:
brainly.com/question/23422991
Python Variables Worksheet
Print | Save
Output: Your Goal
You will write a program to store a message in two variables, then print that message.
Part 1: Plan and Write the Pseudocode
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
Decide on the message you would like to display to the screen. Some ideas include:
Your favorite book title or TV show and why you like it
A few sentences sharing information about you
Your favorite sport and team or athlete
Use two variables to store your message.
Insert your pseudocode here:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Use at least two variables and two print statements to display your message to the screen.
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite TV Show” message. Your specific results will vary depending on the choices you make about your message.
Output
My favorite TV show is MythBusters.
I like it because I learn a lot and they do crazy experiments.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.
Part 3: Post Mortem Review (PMR)
Write two to three sentence responses to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.
Print | Save
Answer:
Pseudocode:
define func main
accept two parameters
create two variables from those parameters
v1 = title
v2=message
print v1, v2
returns None
call the func including the two arguments
Code:
def main(p1, p2):
""" this is a docstring, the function accepts two parameters p1 and p2 and prints them out"""
____title = p1
____message = p2
____print(title)
____print(message)
main()
Reminder
this didnot include the comment you are to add about your name, date and details
-- comments are placed after a pound sign (#)
also "____" the dashes behind the variables are not indentation just empasising them, as they are done with either by
Tab Button - pressed onceSpace Bar - pressed four timesNEVER MIX THEM CHOOSE AN INDENTATION STYLE AND STICK TO IT
Finally the call function doesn't have a colon called as a nomal object, just as the print funtion also you may include the dicstring if neccessary.
DONT FORGET THE REVIEW QUESTIONS
The ideal hash function:
A. Should be unfeasible to find two inputs that map to the same output
B. Should be unfeasible to learn anything about the input from the output
C. Basically we don’t want people to figure out what was said
D. All the above