Answer:
Diners Club launches the national charge card industry. Previous credit cards had been limited in use to one retail establishment or chain. 1950: Wider Acceptance
Explanation:
PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed
Explanation:
HELP. PLZZZZZZZZ. ASAP
Dropdown.
You defined the raft class as shown.
class raft:
def __init__(self,capacity):
self.capacity = capacity
self.location = 'Gauley'
self.repairs = []
The code, raftA = raft(45), creates a(n) of the raft class.
instance
function
method
constructor
Code, raft A = raft(45), creates a(n) self of the raft class.
What is raft class?Code is a term used to describe a set of rules or instructions expressed in a specific computer language.
Raft is a mechanism that ensures that every node in the group of computer systems accepts the same set of state transitions and is universal for spreading state machines among them.
Therefore, Using the raft consensus technique for both the election of the leader and data replication, raft A = raft(45), creates a(n) self of the raft class.
Learn more about raft class, here:
https://brainly.com/question/21709647
#SPJ1
In your opinion which of the following is the most convenient way to create a bootable USB flash drive? Why?
Answer:
here
Explanation:
Plug the USB drive into your computer’s USB port.
Search for the “cmd” application in the Windows start menu, right-click on the item, and select “Run as administrator” from the context menu. This opens a small window with white text on a black background.
Type the command “diskpart” and confirm your input with the enter key (you’ll also do this after every other entered command). This starts the storage device manager.
Enter the command “list disk” to display all available storage devices.
You can recognize your USB by its storage capacity, and it’s usually listed as “disk 1”. In the system partition, “disk 0” is usually your PC, so a hard drive or solid state drive in your computer.
Based on the assumption that your USB has the label “disk 1”, enter the command “sel disk 1” to select it (or the corresponding “disk 2”, etc.).
Enter then command “clean” to delete all files from the USB.
Enter the command “create partition primary” to create a main partition.
Enter the command “list par” and select the newly created main partition with “sel par 1”.
Activate the partition with the command “active”.
Format the USB with the command “format fs=FAT32 label=“WINDOWSUSB” quick override” (in place of “WINDOWS USB” you can also choose another label, so long as it doesn’t contain any spaces or special characters. The drive will later be displayed under this name if you plug into a running Windows computer). Formatting may take a while. You can track its progress in the percentage bar.
As soon as the process is finished, enter the command “assign” to automatically assign a drive letter (for example “G:”) to your USB.
Enter “exit” to close DiskPart, and then “exit” again to close the command prompt
Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.
PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}
PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?
math(1, 2)
Answer:
The display will be 17.
Explanation:
Tracing through the program:
At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.
If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.
So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.
So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.
Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.
Then c (7) and g (10) are added together and displayed.
Match each feature to whether it influences audio or video quality
Answer:
Video: Frame Rate, Color depth, Resolution
Audio: Sampling Rate, Bit Depth
Explanation:
Corrine is doing online research about polar bears. One Web site she finds is wwwdefendersorg. What is the likely primary goal of this Web site?
A. to persuade or change the thinking or actions of others
B. to sell a product
C. to provide clear, balanced, and unbiased information about the topic
D. to entertain the viewer
Answer:
C
Explanation:
This should be right
cccccccccccccccccccc Explanation:
Select the correct answer from each drop-down menu.
Look at Marta's email signature and fill in the missing elements.
In the first box the answers are:
Editor-in chief
Tel: 2472367
Date:7/6/2015
Answer:
Editor-in chef, and Tel: 2472367
Explanation:
A strong technique to present your professionalism to your readers and provide them with your contact information is through your email signature.
What is E mail?Each email has a signature at the bottom, which helps you make a good first impression and sets you apart from your competitors.
A polished email signature contains vital details about you and your company. Your name, job title, company, phone number, address, and website link will all be listed on it.
Although it can do much more, a genuinely professional signature will include your picture and company logo, social network icons, and a call to action.
Therefore, A strong technique to present your professionalism to your readers and provide them with your contact information is through your email signature.
To learn more about Email, refer to the link:
https://brainly.com/question/14666241
#SPJ2
What is the best way to prove you did your research on a person you contact via email for help or guidance? A. Reference a specific project the person has worked on recently to show you did a deep dive into his/her background B. Tell the person generally how much you respect his/her career; if you're too specific, it will be overboard and you may turn the person off
Answer: A. Reference a specific project the person has worked on recently to show you did a deep dive into his/her background.
Explanation:
If you were to write an application letter for employment at a company, you would include certain details of the company that you found out whilst researching them so that your chances of being hired are improved.
The logic is the same here. In order to prove that you have researched a person, the proof lies in what you found out during that research. In this scenario, that includes specific projects that the person has worked on of recent.
name instances in the past where social media has kept you informed about the latest news around the country
con Arrange the following steps in conducting preventive maintenance of compentylook
by wing the number in the blank provided
Secure a borrowers slp from your teacher
Perlombricating procedure
out the splom conectly intended for the needed to
Read and analyze the use of preventive Maintenance Schedule form
Apply thin coat of oil on the parts for a long period of time
Open the bearing cover and opply rose
Determine the types of tools and machines needed to be caled
Determine the parts of the machine needed to be lubricated
ou requisition splor in releasing the lubricants needed
Perform the task according to the prescribed schedule and the signed machine
Which of the following file formats allows you to share and save documents without a designated application? Ο
Α. HTM
B. PDF
C. JPG
D. MP3
Answer:
B. PDF
Explanation:
For online fax service, fax documents are usually in PDF, TIFF or plain text formats.
Answer: PDF
Explanation:
a p e x
please an urgent answer
will give brainliest
what is the definition of bucket address.
What is returned by the code: range (20, 100, 30) ?
The code returned for range (20, 100, 30) is (20, 50, 80).
What is code?The line of code returns the ASCII code.
ASCII, has the full form American Standard Code for Information Interchange. It consists of a seven bit code in which every single bit represents a unique alphabet.
Thus, the code returned for range (20, 100, 30) is (20, 50, 80).
Learn more about code.
https://brainly.com/question/2596551
#SPJ2
The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an external application (non-HTML) isolates text that is formatted in a different direction from other text o creates multiple media resources for < video > elements
Answer:
yes very correctExplanation:
python exercise c2 q4
Sam wants to write a code that will produce the following:
000
001
010
011
100
101
110
111
He doesn’t know where to start so he starts with the basic:
00
01
10
11
However, he also has trouble finishing this code. He only has a basic idea. Help him to complete the basic version first:
for i in range (0, 2):
for j in range (0, ): (1 mark)
print( i , ) (1 mark)
Now that you know the basic, complete the code that will print the chart 000, 001….all the way to 111 (Hint: look at the code you just complete. This time you probability need 3 for loops, one within another)
for i in range (0, 2):
for j in range ( , ): (2 mark)
for k in range ( , ): (2 marks)
print( , , k ) (1 mark)
Answer:
for i in range (0, 2):
for j in range (0, 2):
print(i , j)
and
for i in range (0, 2):
for j in range (0, 2):
for k in range (0, 2):
print(i , j, k)
Explanation:
The nicer method of doing this would be:
for i in range (0, 8):
print("{0:03b}".format(i))
WILL GIVE BRAINLIEST IF IT IS RIGHT!! 25 POINTS!!!
Dacey needs to calculate the difference between 8,794 and 5,632.
Which Python statement should Dacey use to calculate this?
A.) print(8,794 - 5,632)
B.) print(8,794 * 5,632)
C.) print = 8,794 + 5,632
D.) print("8,794 - 5,632")
(this is for Coding)
Answer:
A
Explanation:
When you are finding the difference in a code you are subtracting the bigger number from the smaller one. You wouldn't technically use " " when printing a number equation as it doesn't work.
Answer:
The answer is A
Explanation:
they are not multiplying so its not b
they are not adding so its not c
there is NOT quotation marks when calculating.
Good Morning! Please Help Me With This New Question!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.
Explanation:
There are differet kinds of tools in the box identify the tools that we leed in embroidery.Write your answer in the blank
Answer:
The tools are listed below.
Explanation:
There are many tools used in embroidery, the basic ones are mentioned below:
- Needles: there are needles like crewel needle, Milliner needle, tapestry needle.
- Hoops and frames
- Embroidery Scissors
- Pinking shears
How do you predict technology will continue to change the marketing and promotions industry?
Answer:
The in person marketing industry won't completely die down, but now with the pandemic hitting forcing a lot of people to do deals, sell, and promote things online. Advertising is only going to grow online as time goes on, and marketing will follow close behind.
Explanation:
How do we store value in a variable? Give an example
How do we use the value in variable? Give an example
Answer:
hi
Explanation:
im not smart
1) What is a RAM and what are it's functions?
2) What is a ROM and what are it's functions?
Answer:
The interpretation of the statement is characterized in the answer section below.
Explanation:
RAM:
This would be the real physiological remembrance of such a computer where even the OS and initiatives were also stacked as well as stored so that the processor could be made available extra rapidly.The function of RAM:
It's own key marketing strategy as both temporary storage with program guidelines that could be brought major more by CPU even before needed.ROM:
ROM contains computing which enables the computer system to commence as well as replenish every time these are switched on.The function of RAM:
Most PCs have such a minuscule percentage of ROM which stores government initiatives, including the program which boots just one desktop.What is the importance of different camera angles ?
Answer:
the camera angle helps the Creator to establish different relationships between the subject and even between the audience and the subjects. it's very important to master these techniques if you want to become a pro filmmaker!
Which of the following are advantages of automatic updates?
Answer:
I think maybe b or d
Explanation:
Answer:
It's A, B, and D
Explanation:
What is the legal precedence that affects data collection and data preservation as it relates to the digital forensics process
Answer:
Following are the solution to this question:
Explanation:
Some certain laws affect collection and data preservation procedures. When an electronic crime happens, government employees must be ordered to continue with both the inquiry or permission by their senior government officials. The digital forensic investigator has to comply with the laws of a country as they apply to both the situation so if conducting out such a digital forensic analysis. Many law safeguards that rights of patients who could obstruct their investigator. Its culprit can manipulate or interfere with digital evidence until the inquirer gathers and maintains this. There are many limitations on permit study.
When its private data is revealed, the Electronic Communications Protection Act (ECPA) has been adopted to protect the privacy rights of its ISPs' consumers. That protects people (suspect/culture) from the investigators by just not acquiring its ISP's information, in many specific regulations are affecting the process of digital forensic data collection and preservation.
why is it important to make sure link is from a trusted source?
Answer:
So to make sure itś true not false
Explanation:
Answer:
so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff
Explanation:
hope this help !!:):
Describe the different non-printing characters,
Answer:
or formatting marks are characters for content designing in word processors, which aren't displayed at printing. It is also possible to customize their display on the monitor. The most common non-printable characters in word processors are pilcrow, space, non-breaking space, tab character etc.
Explanation:
write an article for publication on why every student should be computer literate
Answer:bankrupt
Explanation: no money on your card lol i hope you haveing a great day and i want you to know that you got this babe like is life is good then great but if not then it will get better beause you will make it get better
Section 6.9 of your textbook ("Debugging") lists three possibilities to consider if a function is not working.
Describe each possibility in your own words.
Define "precondition" and "post-condition" as part of your description.
Create your own example of each possibility in Python code. List the code for each example, along with sample output from trying to run it.
Answer:
www.dso hellooo miaralo
Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!
Find sum of the first n even numbers.
Without using formula (n*(n+1)).
Answer:
number = int(input())
x = 0
y = 0
for n in range(number):
if n % 2 == 0:
x += n
else:
y += n
print(x)
print(y)
Why should you delete files from your computer?
so that you will have less work to do
because only one hundred files can be saved in a directory
to increase the computer's efficiency
to improve your productivity
to increase the computer's efficiency
Explanation
The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.
hope it helps!
Answer:
To increase the computer's efficiency.
Explanation:
Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.
I hope this helps :)