Answer:
AI uses accelerometers, infrared, magnetic and other electronic sensors to gather data
name of the people associated with the development of computer briefly explain thier contribute
Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B
Answer:
technician A if you use the net it still saves the hair than letting it long and exposed
Write a program that reads numbers from the user until a blank line is entered. Your
program should display the average of all of the values entered by the user. Then
the program should display all of the below average values, followed by all of the
average values (if any), followed by all of the above average values. An appropriate
label should be displayed before each list of values.
Answer:
nums = []
while True:
in = input()
if in:
nums.append(in)
else:
break
if nums:
avg = sum(nums) / len(nums)
for i in range(len(nums)):
if nums[i] == avg:
print(f"index: {i+1}")
print(nums[i])
else:
print(-1) # if there aren't any values in nums
Explanation:
Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.
did y’all enjoyed project next phase 3 and The 4 revamped heroes
Answer:
it was good i liked it
Explanation very good
What is the difference between cipher block chaining mode and electronic code book mode?
Answer:
ECB (Electronic Codebook) is essentially the first generation of the AES. It is the most basic form of block cipher encryption.
CBC (Cipher Blocker Chaining) is an advanced form of block cipher encryption. With CBC mode encryption, each ciphertext block is dependent on all plaintext blocks processed up to that point.
Someone help me please i need to finish this
Answer:
My digital life is like a adventure because there is so much to discover.
Hope this help please give the brainliest award.
How is advertising using social media different from using traditional advertising?
Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.
Hiding text in a picture is known as?
Answer:streganography
Explanation: it allows you to hide text in an image without anyone knowing
Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!
Answer:
5=5
Explanation:
2+2 is 4
Below is the required Python code for the program.
PythonProgram code:
# Starting the code
# Defining a function
def same_ends(lst, n):
# Starting a loop
if lst[:n] == lst[-n:]:
return True
else:
return False
# Testing the function
lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]
# Printing the values
print(same_ends(lst,4))
print(same_ends(lst,3))
Explanation:
Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.Output:
Find below the attachment of the code output.
Find out more information about python here:
https://brainly.com/question/26497128
SOME PLEASE DO THIS ASAPP!!
Answer: I think it’s really cool. You don’t have to find someone g m ai l and then write a subject and whatever else. You can just send it like a m ess age. I love how it has the call option because it means that you don’t have to have a nu m ber to call your friends or family. And you can do business em ai l while me s saging whoever you need to instead of going back and forth.
You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have g m ails and it’s fairly simple to just add your friend and te xt them.
It might be hard to figure out at first. But when you get used to it its fairly simple. It can also shut down do to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your gm a i l and read all of your information. (there is a few words i spaced out bc it wouldnt let me send)
Explanation:
Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value for hours worked in a day. The program calculates the hours worked in a five-day week and the hours worked in a 252-day work year. The program outputs all the results.
Answer:
i think its 2131
Explanation:
c
What is one still image in a film or video called?
unit
frame
stand
selection
Answer:
frame
Explanation:
the answer is frame ;)
Answer:
Frame
A still frame is a single static image taken from a film or video, which are kinetic (moving) images. Still frames are also called freeze frame, video prompt, preview or misleadingly thumbnail, keyframe, poster frame, or screen shot/grab/capture/dump
Explanation:
Pls mark as brainliest
What are the difference generation of computer system?
Answer:
5 generations
Explanation:
1st generation 1940's to 1950's vacuum tube based.
2nd generation 1950's to 1960's transistor based.
3rd generation 1960's to 1970's integrated circuit based.
4th generation 1970's to 1980's microprocessor based.
5th generation present and future artificial intelligence based.
Python 3.12 LAB: Input and formatted output: Right-facing arrow Given input characters for an arrowhead and arrow body, print a right-facing arrow. Ex: If the input is: * # Then the output is: # ******## ******### ******## #
The code below prints the required shape using the string manipulations in Python.
In Python, if we multiply a character with a number, we get that character side by side that number of times.
For example: 6 * '#' would give us → ######
Also, we can use + sign to concatenate the strings.
For example: 'hi' + ' there' would give us → hi there
We use this approaches to print the required shape line by line.
Comments are used to explain each line.
The output is attached as an image.
#get the characters from the user
base_char = input()
head_char = input()
#set first row with 6 spaces and 1 head_char
row1 = 6 * ' ' + head_char
#set second row with 6 base_chars and 2 head_chars
row2 = 6 * base_char + 2 * head_char
#set third row with row2 and 1 head_char
row3 = row2 + head_char
#print the rows to draw the shape
print(row1)
print(row2)
print(row3)
print(row2)
print(row1)
You may see another question at:
https://brainly.com/question/22101725
which is NOT a basic human sense used in collecting collecting data?
Answer:
Explanation:This section outlines some of the key considerations that may arise during various steps in the data collection process. There is no requirement that these steps be followed or pursued in the order that they are written. The model presented is offered as a reference tool. How data is gathered and analyzed depends on many factors, including the context, the issue that needs to be monitored, the purpose of the data collection, and the nature and size of the organization.
Mikayla is listening to music while she completes research for a school assignment. The input and output devices are able to communicate with each other because the computer has
central processing memory
a central processing unit
random access memory
read-only memory
Answer:
A central processing unit (CPU)
3. Find the best.
Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.
Do this with beginner c programming.
Example output:
Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1
Average Score = 5.3333, best = 10
Answer:
1. is the answer
Explanation:
mark me as brainlestarithmetic test is given twice within a few days to a student. The highest possible score is 40. He receives a score of 35 the first time and a score of 18 the second time. If similarly varying results are obtained from other students, the test result is probably unreliable in the idea o
Similar varying results obtained as scores from other students indicates that the test is; Unreliable.
This is about test reliability and it is based on consistent results. This implies that it is a measure of how well a characteristic of a test is measured dependably or consistently.With reference to the above on test reliability, applying it to our question. If the student took the test twice and got a similar result the two times, then the test is said to measure the score reliably but if the two scores are not similar but vary widely from each other, then the test is said not to measure the score consistently and is said to be unreliable.
In our question, since varying results scores are continually obtained for two same tests of same students, then we can say the test does not measure the scores reliably and we can conclude that the test is unreliable.Read more at; https://brainly.com/question/15136257
if the middle number is lesser than the candidates then u eliminate the ___ half of the data
Answer:
kimochisiwiwie282828
Using a vue-cli initiated project, make a ticker that will keep track of the number of attendees in a space
When people become more dependent on digital technology in their lives, the potential for data misuse will grow.
Explain the above sentence in your opinion.
Answer and I will give you brainiliest
Answer:
abbjiaj
zzz
Explanation:
uuwuwahsbsbsssiaaivab njw
As of 2007, how many concentrated solar power plants did the United States have?
Answer:
12,718
Explanation:
Hope this helps! Let me know! :)
What do Virtually all of the 7 million millionaires in the United States do??
Virtually all of the 7 million millionaires in the United States:
never had to think about tomorrow, since they knew they would be rich.
were always thinking ahead.
wanted their money to work for them.
wanted to store their money under the bed.
were looking forward to buying a lot of nice toys.
assumed all sellers were telling the truth.
learned how to make smart decisions by doing their homework.
always paid their cell phone first.
always paid themselves first.
It is assumed by a lot of people that the life of the people who are very rich is very easy and that they do not have to work so hard. People think that the rich people have always had a bed of roses kind a life for them. But that is not the reality. Rich people also have to work hard to get success in their life and for that they have to think properly and wisely before making decisions in their life. These people have to make a lot of research and do a lot of home work before making decisions and have to think a lot. It is not very easy for them also.
Option 7 is the most apt
but if there can be multiple options, then it would be 2,3,7 and 9
Many people believe that the lives of the wealthy are easy and also that they do not have to work as hard as the rest of us.
7 million millionaires in the United States:People believe that the lives of the wealthy has always been a bed of roses.
However, this is not the case. Rich individuals must also work hard in order to achieve success in life, and they must think carefully and sensibly before making decisions.
Before making judgments, these folks must conduct extensive study and complete extensive homework, as well as reflect deeply. It's not easy for them either.
So, option '7' is the correct answer to the following question.
Find out more information about 'Judgments'.
https://brainly.com/question/26380040?referrer=searchResults
Choose the comparison operator that will create a true statement in scratch
Answer:
the first one
Explanation:
think about it. 60 equals 60! this is true!
Answer:
A is correct
Explanation:
i took this same test
Name the five automated information systems - The Vendors
Answer:
The computer age introduced a new element to businesses, universities, and a multitude of other organizations: a set of components called the information system, which deals with collecting and organizing data and information.
An information system is described as having five components.
1- Computer hardware. This is the physical technology that works with information.
2- Computer software. The hardware needs to know what to do, and that is the role of software.
3- Telecommunications.
4- Databases and data warehouses.
5- Human resources and procedures.
Explanation:
Computer hardware
This is the physical technology that works with information. Hardware can be as small as a smartphone that fits in a pocket or as large as a supercomputer that fills a building. Hardware also includes the peripheral devices that work with computers, such as keyboards, external disk drives, and routers. With the rise of the Internet of things, in which anything from home appliances to cars to clothes will be able to receive and transmit data, sensors that interact with computers are permeating the human environment.
Computer software
The hardware needs to know what to do, and that is the role of software. Software can be divided into two types: system software and application software. The primary piece of system software is the operating system, such as Windows or iOS, which manages the hardware’s operation. Application software is designed for specific tasks, such as handling a spreadsheet, creating a document, or designing a Web page.
Telecommunications
This component connects the hardware together to form a network. Connections can be through wires, such as Ethernet cables or fibre optics, or wireless, such as through Wi-Fi. A network can be designed to tie together computers in a specific area, such as an office or a school, through a local area network (LAN). If computers are more dispersed, the network is called a wide area network (WAN). The Internet itself can be considered a network of networks.
Databases and data warehouses
This component is where the “material” that the other components work with resides. A database is a place where data is collected and from which it can be retrieved by querying it using one or more specific criteria. A data warehouse contains all of the data in whatever form that an organization needs. Databases and data warehouses have assumed even greater importance in information systems with the emergence of “big data,” a term for the truly massive amounts of data that can be collected and analyzed.
Human resources and procedures
The final, and possibly most important, component of information systems is the human element: the people that are needed to run the system and the procedures they follow so that the knowledge in the huge databases and data warehouses can be turned into learning that can interpret what has happened in the past and guide future action.
Question 3 of 15
Which term describes a computer program's ability to run, receive feedback to
rewrite, and improve its own algorithms for the future?
A. Machine learning
B. Operator with variables
C. Algorithmic bias
D. If-then programming
A. Machine learning
Machine learning is the study of computer algorithms that can be automatically modified for improvement through experience and the use of data.
How can i watch the Loud house FREE with a fire stick ? will mark brainliest :3
Answer:
cinema you'll have to download it
OSI layer for HDLC??
Answer:
HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).
Explanation:
Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.
Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.
What are the research paper's impacts on cyberbullying?The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.
Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.
To know more about the Cyber Bullying visit;
https://brainly.com/question/1460915
#SPJ1
highlight and detail two ways that you can use excel to make you more efficient as a college student
MS excel is a office program and is quite commonly used in day to day business. The application is easy to use and have various advantages, as it can be used for statistical and scientific purposes.
The application can be made easy and presented in numerous ways. In order to highlight the importance of this software as a college student one can show the methods to interpret the data. Making worksheets and visualizing large amounts of data. Use of shortcuts for formula and use graphics to enhance presentations.Learn more about the detail two ways that you can use excel to make you.
brainly.com/question/24325415.