Answer:
cyberstalking harassment
Explanation:
since Julian is being harrased or bullied online by someone
.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables is called
Answer: Network interface controller
Explanation:
A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.
It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.
Overflow and roundoff errors result from real-world limitations in representing . . . (10 points)
A. number systems
B. fractions
C. place values
Answer:
C. place values
Explanation:
Place value can be defined as the numerical value representing a digit owing to its position in a number. Some examples of the various place values used in representing each digit are tenths, hundredths, thousandths, unit, tens, hundreds, thousands etc.
For example, in the number 316.2;
The place value of 3 is hundreds. The place value of 1 is tens. The place value of 6 is units. The place value of 2 is tenths.In the real-world, their instances where there are limitations in counting and representing real numbers that are infinite (too small or too large). In order to overcome these limitations or barriers, we use place values.
An overflow error arises when a real number cannot be represented because it is too large and exceeds the upper limits of a range chosen.
Also, a roundoff error can be defined as the difference between the output generated from an algorithm using an exact or actual numbers and the output generated using rounded or finite-precision numbers.
Hence, overflow and roundoff errors result from real-world limitations in representing place values.
Mark is working on a feature film project. His job is to portray the economic status, occupation, and attitude of the characters visually. Which role is he playing?
Answer:
Videographer
Explanation:
Answer:
i think i would be costume designer
Explanation:
because if you spell videographer it gives you the little red squiggly line
Which hard drive type would be best to use by the army when writing operational data while traveling in a jeep in rough terrain?
Answer:
They should use an SSD.
Explanation:
The fact that the writing operation takes place in a jeep in rough terrain suggests that they should be using an SSD (Solid State Drive) which unlike HDD's, don't have a spinning disk and a head that writes data on it. So there are no moving parts in an SSD, and they have about 30 times more resistance to shock/vibration damage which is really helpful in this situation.
I hope this answer helps.
Hardcoding numbers (unnamed, literal constants) in code without explanation is a bad programming practice. What are these hardcoded numbers known as
Answer:
Magic numbers.
Explanation:
In Computer programming, hardcoding can be defined as a software development process which typically involves directly embedding or infusing data into the source code of a computer software application or program rather than generating the data at runtime or sourcing (obtaining) it from an external source.
Hence, hardcoding numbers (unnamed, literal constants) in code without explanation is a bad programming practice. These hardcoded numbers are known as magic numbers.
A magic number refers to a hard-coded value embedded into the source code of a software program without explanation and as such are very difficult to update.
Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape sequences.
Answer:
- \' is used to escape a single quote in a string enclosed in single quotes like;
my_string = 'this is John\'s ball'.
- \n is used to jump to a new line, Eg;
my_string = "Johns is a good boy\nbut he hates going to school."
the next set of the string after the '\n' character is displayed on the next line.
- \t is used to add a tab space to a string.
my_string = 'Jane is \thungry'
the character adds four character spaces before the word 'hungry'.
- \r adds a carriage return (or enter in keyboards) to start a new block paragraph in a string.
my_string = "Johns is a good boy\rbut he hates going to school."
Explanation:
Escape sequences in programming are used to format strings or output syntax of a program. They always begin with the backslash. Examples of escape sequence are " \' ", "\n", "\t", "\r", etc.
Using E-commerce , how you can make Secure payments
Answer:
requesting a receipts for every payment
Explanation:
after making a payment you have to request a receipt it might be printable or electronic
1. An output device sends data to a computer.
(YALL PLEASE I NEED HELP I GOT AN F ON THIS, I HAVE 1 MORE CHANCE)
Answer: False. Input device does not receive data either.
Explanation:
59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this
Answer:
False Positive
Explanation:
A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.
In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.
Write a recursive method that takes four inputs: a 1-D array of Strings (i.e., exams), the length of this 1-D array (i.e., n), an index to access array elements (i.e., i) and a 2-D array containing double values (i.e., ret).
Answer:
import java.util.*;
public class Main
{
public static void main(String[] args)
{
String [] exams = {"1;2;3;4;" , "5;6;7;8;" , "9;10;11;12;" };
double[][] n = new double[exams.length][4];
examArray = convert(exams , exams.length , 0 , n);
for(int i = 0 ; i < exams.length ; i++)
{
for(int j = 0 ; j < 4 ; j++)
{
System.out.print(n[i][j] + "\t");
}
System.out.print("\n");
}
}
/* recursive function convert defined here */
public static double[][] convert(String[] exams , int number , int x , double [][] result)
{
if(x==number)
return result;
else
{
String total = exams[x];
String currentScore = "";
int p = 0;
for(int j = 0 ; j<totalScore.length() ; j++)
{
char ch = total.charAt(j);/
if(ch==';')
{
result[x][p] = Double.parseDouble(currentScore);
p++;
currentScore = "";
}
else
{
currentScore = currentScore + Character.toString(ch);
}
}
return convert(exams , number , x+1 , result);
}
}
}
Explanation:
The Java source code defines a recursive function or method called convert that converts the results of three students that sat for four examinations to double or float number and screens their individual results for the four exams on the screen.
PLEASE ANSWER ASAP! THANKSSSSS
What problems might scientists encounter in using this ethod in the field that you would not have encountered in the simunlation?
Answer:
Errors that would be observed as a result of natural input in the field not found in the simulation.
Explanation:
The simulation is a virtual representation of the activities to be experienced in the field, it eliminated natural factors that could affect the result of the experiment in the field. In the field, scientists are able to anticipate errors based on records of natural factors like temperature, humidity, etc, working around it to get the desired result.
How would you maximize the use of a class?
Answer:
can't understand your qs.......
fill in the blanks y'all-
-------- is a pictorial representation of a step-by-step algorithm
I will give brainliest, just answer quick :)
k I don't need it anymore
Answer:
Flowchart
Explanation:
Flowchart is a pictorial representation of a step-by-step algorithm.
It comprises of the various steps involved in a process which are usually well arranged in an orderly and sequential manner.
It is also referred to how algorithms are diagrammatical put up for better analysis .
3. Sum of Numbers Assume that a file containing a series of integers is named numbers . dat and exists on the computer's disk. Design a program that reads all of the numbers stored in the file and calculates their total.
Answer:
The program written in Python is as follows:
file_handler = open("numbers.dat","r")
nums = 0
for line in file_handler:
try:
nums+=int(line)
except ValueError:
continue
file_handler.close()
print("Sum: "+str(nums))
Explanation:
The file handler is used to enable the program reads content of the file numbers.dat
file_handler = open("numbers.dat","r")
This initializes the sum of numbers to 0
nums = 0
This iterates through the line of the file
for line in file_handler:
The try exception is used to prevent program crash if data other than integer is read
try:
This adds numbers on each line
nums+=int(line)
This exception is returned for data other than integers
except ValueError:
continue
This closes the file handler
file_handler.close()
This prints the calculated sum
print("Sum: "+str(nums))
Natasha's laptop has long-term storage that uses a magnetic arm to move over a platter to read and write data. It is cheaper than other storage options and has a high capacity of storage, but because of its moving parts, it is not as durable than other options and runs very loudly. What type of long-term storage does her computer have?
A.
read-only memory (ROM)
B.
hard disk drive (HDD)
C.
random access memory (RAM)
D.
solid-state drive (SSD)
SSD
Explanation:
But I prefer SSD rather than HDD , because there are soo many benifits of SSD like very fast read and write speed , small in size , it did not corrupt your data easily , did not get damage by any physical impact . SSD is like bigger version of smartphone’s sd card. Only one thing is that SSD is too most costly than HDD
Which of the following is a key aspect of any IT position? installation of fiber optic cables
network security
computer maintenance
network administration
Answer:
network security
Explanation:
edg2021
IT security is woven into each of the jobs in technology, with each individual in IT usually responsible for some area of security, from password management to updating desktops with patches. Having preventive plans in place as well as what to do after a potential breach involves all areas of a business
You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
from random import *
# Generate and save a random number.
correct =
(1,10)
NEED HELP FAST
The code to generate a random number from 1 to 10 is as follows:
import random
print(random.randint(1,10))
The code is written in python.
Code explanation:The first line of code is used to import a module name "random". The random module is use to generate the random numbers.The second line of code, we use the object in random to generate integers from 1 to 10. The print statement is then used to print the random numbers from 1 to 10. Running the code we generate random numbers between 1 to 10 as required.learn more on python code here: https://brainly.com/question/26104476?referrer=searchResults
Answer:
randint
Explanation:
Got it correct on edge
Help meee pleaseeee
Answer:
1. DO, RECEIVE
2. PERFORM
3. STORE, TAKE IN, CALCULATE
4. EXPRESS
5. COMPUTE, DISPLAY
Explanation:
1. A computer DO or RECEIVE data
2. Modern automatic digital computers PERFORM more than 100 mln operations in each second
3. A computer STORE information or data, TAKE IN a sequence of operations on information and CALCULATE answers.
4. The hardware inside the computer EXPRESS arithmetical operations or logical relations
5. When the computers COMPUTE results, they DISPLAY them.
1. DO, RECEIVE
2. PERFORM
3. STORE, TAKE IN, CALCULATE
4. EXPRESS
5. COMPUTE, DISPLAY
The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group membership. It includes the password hashes for all users in the domain.
Just take the points.
Answer:
I hate it
Explanation:
Mark it as the brainliest if u love god
Cassette tape is an example of ____ memory
Cassette tape is an example of computer memory.
ark titanoboa taming
it is a passive tame throw the an egg down and it will eat it if it attacks you or gets attacked it will reset the taming process
Explanation:
PLS HELP ASAP!! which of these would be easier to do in a database program than a spreadsheet program? check all of the boxes that apply.
• Store a list of favorite books for personal use
• email all customers who purchased a laptop the previous year
• perform complex calculations
• collect and analyze survey results
• update the record with ID#5872033
Answer:
a,b
Explanation:
Answer:
It's B,D,E
Explanation:
You should not be more than 5 minutes early to your interview because it makes you look desperate to get the job. A. True B. False
Answer: I believe this is false. When you arrive early for an interview, you give the impression that you are a responsible and punctual person, and that you take other people's time with respect.
Answer:
B
Explanation:
What is a program? - define and explain
Answer:
a series of coded software instructions to control the operation of a computer or other machine.
Explanation:
a set of instructions that process input, manipulate data, and output a result. For example, Microsoft Word is a word processing program that allows users to create and write documents.
To add a glow effect to WordArt text, which of the following should be done?
1.Change the Shape Style
2.Change the Shape Fill
3.Apply a Shape Effect
4.Apply a WordArt Text Effect
To add a glow effect to WordArt text, you apply a WordArt Text Effect.
WordArt texts are simply texts that have special effects, such as
ShadowsGlowOutline ReflectionTo apply the glow text effect (and any other effect) to a WordArt text, you simply select the text, and select text effect in the home menu
Hence, the step that should be done is (4) Apply a WordArt Text Effect
Read more about texts at:
https://brainly.com/question/12809344
Importance of individual differences in difference in work potential with examples
Individual differences are how people differ from one another. Each individual in an organization has their own style of behavior. Individual differences are crucial for supervisors to comprehend because they influence employees' feelings, thoughts, and behavior.
What is work potential?The innate ability of every person to live and perform in alignment with their highest self is referred to as work potential.
Overall, studying individual differences helps us understand not only what makes humans similar, but also what makes them different.
We can best understand the full range of human behavior by taking into account the variations that can occur from one person to the next.
Thus, individual differences in difference in work potential is crucial.
For more details regarding work potential, visit:
https://brainly.com/question/24947234
#SPJ1
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Name the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number.
Answer:
Parity Bit
Explanation:
Given that Parity bit is a form of strategy or method that utilizes a scheme in adding a solitary bit to a binary string. This can be either 1 or 0, thereby making the total quantity of bit to become either odd parity bit or even parity bit during storage.
Hence, the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number is called PARITY BIT.
When you go to Starbucks, you note that your IP address is 192.168.104.2, and that your netmask is 255.255.240.0. . How many bits are in the host portion of this subnet
Answer:
The correct answer is 4 bits.
Explanation:
First we must identify what class it belongs to and we see the first octet on the left side of the IP address, which is 192 and we can determine that it is a Class C address, therefore its mask is:
Default mask 255.255.255.0 => 24 bits.
IP mask 255.255.255.240 => 28 bits.
We can conclude that I borrow 4 bits to calculate subnets.
We can conclude the following:
[tex]2^{n} --> 2^{4} -->[/tex]16 subnets maximum.