Answer:
First... you don't want to have to click on a million different sites
Second.... some sites have viruses, and they activated when you click on a certain source.
Explanation:
Hava great day!
Answer:
They say that it has to be from a trusted source because, you will be needing the correct and trustworthy information. Like take wikipedia for example anyone can go on there and change the information to something fake and then you have fake info in what you are writing.
Explanation:
Which of the following are advantages of automatic updates?
Answer:
I think maybe b or d
Explanation:
Answer:
It's A, B, and D
Explanation:
write an article for publication on why every student should be computer literate
Answer:bankrupt
Explanation: no money on your card lol i hope you haveing a great day and i want you to know that you got this babe like is life is good then great but if not then it will get better beause you will make it get better
What is the importance of different camera angles ?
Answer:
the camera angle helps the Creator to establish different relationships between the subject and even between the audience and the subjects. it's very important to master these techniques if you want to become a pro filmmaker!
The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an external application (non-HTML) isolates text that is formatted in a different direction from other text o creates multiple media resources for < video > elements
Answer:
yes very correctExplanation:
Use the drop-down menus to complete each of the following sentences. Choose the best answer. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to _______. Sleep mode and Hibernate mode are ________ that help you safely put your computer in a low-power state when you’ll not be using it for a period of time. Cleaning dust from your keyboard, monitor, and fans should be done _______. Magnets _______ a computer’s performance. Heat, humidity, and cold can damage a computer’s _______. You should check all computer cords for the safety of _______.
Answer:
1: eject them
2: power-saving modes
3: regularly
4: may damage
5:internals and externals
6: you and the computer
Explanation:
Answer:
1: Eject Them
2: Power-Saving Modes
3: Regularly
4: May Damage
5: Internals and Externals Components
6: You and the Computer
Explanation:
1. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to Eject Them
2. Sleep mode and Hibernate mode are Power-Saving Modes that help you safely put your computer in a low-power state when you will not be using it for a period of time.
3. Cleaning dust from your keyboard, monitor, and fans should be done Regularly.
4. Magents May Damage a computer’s performance.
5. Heat, humidity, and cold can damage a computer’s Internals and Externals Components.
6. You should check all computer cords for the safety of You and the Computer.
There are differet kinds of tools in the box identify the tools that we leed in embroidery.Write your answer in the blank
Answer:
The tools are listed below.
Explanation:
There are many tools used in embroidery, the basic ones are mentioned below:
- Needles: there are needles like crewel needle, Milliner needle, tapestry needle.
- Hoops and frames
- Embroidery Scissors
- Pinking shears
Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!
Find sum of the first n even numbers.
Without using formula (n*(n+1)).
Answer:
number = int(input())
x = 0
y = 0
for n in range(number):
if n % 2 == 0:
x += n
else:
y += n
print(x)
print(y)
Workers in a child care facility or preschool are part of what career path?
A. education and training
B. health care
C. human services
D. hospitality
Answer:
A
Explanation:
Preschool teachers show education
Good Morning! Please Help Me With This New Question!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.
Explanation:
Section 6.9 of your textbook ("Debugging") lists three possibilities to consider if a function is not working.
Describe each possibility in your own words.
Define "precondition" and "post-condition" as part of your description.
Create your own example of each possibility in Python code. List the code for each example, along with sample output from trying to run it.
Answer:
www.dso hellooo miaralo
why is it important to make sure link is from a trusted source?
Answer:
So to make sure itś true not false
Explanation:
Answer:
so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff
Explanation:
hope this help !!:):
why we have to maintain the good condition of tools and equipment?
Answer:
Construction tools and equipment suffer a lot of wear and tear. Hence, it is important to maintain them regularly. This will help increase the service life as well as the performance of the equipment. Precautionary maintenance of tools and equipment will also help reduce unwanted expenses related to broken or faulty equipment
Explanation:
1. Is the function void or return
a. void
b. return
2. What is the result of the following expression: int r = 3; r%2 == 0;
a. it evaluates as true
b. it evaluates as false
c. nothing happens
Answer:
(a) void
(b) Nothing happens
Explanation:
Solving (a): void and return
A function that returns no value is referred to as a void function.
On the other hand, a void can not be return or named return.
So, the function is void
Solving (b):
r = 3
Required
The result of r%2 == 0
Substitute 3 for r in r%2 == 0
3%2 == 0
3%2 is 1.
So, we have:
1 == 0
Hence, the equivalent of r%2 == 0 is 1 == 0.
However, nothing will happen because there is no instruction attached to the statement (i.e. r%2 == 0;)
Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.
PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}
PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?
math(1, 2)
Answer:
The display will be 17.
Explanation:
Tracing through the program:
At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.
If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.
So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.
So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.
Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.
Then c (7) and g (10) are added together and displayed.
How do we store value in a variable? Give an example
How do we use the value in variable? Give an example
Answer:
hi
Explanation:
im not smart
What is the legal precedence that affects data collection and data preservation as it relates to the digital forensics process
Answer:
Following are the solution to this question:
Explanation:
Some certain laws affect collection and data preservation procedures. When an electronic crime happens, government employees must be ordered to continue with both the inquiry or permission by their senior government officials. The digital forensic investigator has to comply with the laws of a country as they apply to both the situation so if conducting out such a digital forensic analysis. Many law safeguards that rights of patients who could obstruct their investigator. Its culprit can manipulate or interfere with digital evidence until the inquirer gathers and maintains this. There are many limitations on permit study.
When its private data is revealed, the Electronic Communications Protection Act (ECPA) has been adopted to protect the privacy rights of its ISPs' consumers. That protects people (suspect/culture) from the investigators by just not acquiring its ISP's information, in many specific regulations are affecting the process of digital forensic data collection and preservation.
Corrine is doing online research about polar bears. One Web site she finds is wwwdefendersorg. What is the likely primary goal of this Web site?
A. to persuade or change the thinking or actions of others
B. to sell a product
C. to provide clear, balanced, and unbiased information about the topic
D. to entertain the viewer
Answer:
C
Explanation:
This should be right
cccccccccccccccccccc Explanation:
how was banking in the 1950s
Answer:
Diners Club launches the national charge card industry. Previous credit cards had been limited in use to one retail establishment or chain. 1950: Wider Acceptance
Explanation:
con Arrange the following steps in conducting preventive maintenance of compentylook
by wing the number in the blank provided
Secure a borrowers slp from your teacher
Perlombricating procedure
out the splom conectly intended for the needed to
Read and analyze the use of preventive Maintenance Schedule form
Apply thin coat of oil on the parts for a long period of time
Open the bearing cover and opply rose
Determine the types of tools and machines needed to be caled
Determine the parts of the machine needed to be lubricated
ou requisition splor in releasing the lubricants needed
Perform the task according to the prescribed schedule and the signed machine
WILL GIVE BRAINLIEST IF IT IS RIGHT!! 25 POINTS!!!
Dacey needs to calculate the difference between 8,794 and 5,632.
Which Python statement should Dacey use to calculate this?
A.) print(8,794 - 5,632)
B.) print(8,794 * 5,632)
C.) print = 8,794 + 5,632
D.) print("8,794 - 5,632")
(this is for Coding)
Answer:
A
Explanation:
When you are finding the difference in a code you are subtracting the bigger number from the smaller one. You wouldn't technically use " " when printing a number equation as it doesn't work.
Answer:
The answer is A
Explanation:
they are not multiplying so its not b
they are not adding so its not c
there is NOT quotation marks when calculating.
PLEASE HELP ASAP!! Timed test!!
Lakendra finished working on her monthly report. In looking it over, she saw that it had large blocks of white space. What steps could Lakendra
take to reduce the amount of white space? It’s more than one answer!!
A. Include more special effects
B. Have an unjustified right margin
C. Increase the use of boxes and rules
D. Adjust column spacing
Answer:
d i think
Explanation:
please an urgent answer
will give brainliest
what is the definition of bucket address.
Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.
Which source is the most relevant for the presentation?
a]-an interview with history students about the “Great Society”
b]-a photograph of Johnson making his “Great Society” speech
c]-a chart describing the conditions that led to the “Great Society”
d]-an audio recording of Johnson’s “Great Society” speech
Answer:
Option d) is correct
Explanation:
To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.
An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.
So,
Option d) is correct
Answer:
the answer is D
Explanation:
I just took the quiz :)
The binary number represented by the voltage graph below is
I will give you brainlist if you actually answer
Answer:
the answer is the pattern is odd numbers like Odd numbers are whole numbers that cannot be divided exactly into pairs. Odd numbers, when divided by 2, leave a remainder of 1. 1, 3, 5, 7, 9, 11, 13, 15 are sequential odd numbers. Odd numbers have the digits 1, 3, 5, 7 or 9 in their ones place.
Explanation:
Answer:
11010100
Explanation:
Why should you delete files from your computer?
so that you will have less work to do
because only one hundred files can be saved in a directory
to increase the computer's efficiency
to improve your productivity
to increase the computer's efficiency
Explanation
The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.
hope it helps!
Answer:
To increase the computer's efficiency.
Explanation:
Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.
I hope this helps :)
HELP ME PLEASE PLEASE PLEASE!!!! IM BEGING YOU!!!!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.
Explanation:
PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed
Explanation:
What is returned by the code: range (20, 100, 30) ?
The code returned for range (20, 100, 30) is (20, 50, 80).
What is code?The line of code returns the ASCII code.
ASCII, has the full form American Standard Code for Information Interchange. It consists of a seven bit code in which every single bit represents a unique alphabet.
Thus, the code returned for range (20, 100, 30) is (20, 50, 80).
Learn more about code.
https://brainly.com/question/2596551
#SPJ2
If you could design an app for a phone or tablet, what would it be? Explain your design in at least a paragraph.
Answer:
If i were to design an app for a phone or a tablet, it would probably be about cloth styles...
Explanation:
Sowwy but I don't have time to write a paragraph.. tho search information about this and see what you find.. hope I helped :)
Answer:
I would design an app for hospital patients to communicate on.
Explanation:
Due to the pandemic, people admitted to the hospital for long term diseases are currently stuck in their rooms not being able to communicate with other patients on their floors. This app can fix that and help people make new friends.
HELP. PLZZZZZZZZ. ASAP
Dropdown.
You defined the raft class as shown.
class raft:
def __init__(self,capacity):
self.capacity = capacity
self.location = 'Gauley'
self.repairs = []
The code, raftA = raft(45), creates a(n) of the raft class.
instance
function
method
constructor
Code, raft A = raft(45), creates a(n) self of the raft class.
What is raft class?Code is a term used to describe a set of rules or instructions expressed in a specific computer language.
Raft is a mechanism that ensures that every node in the group of computer systems accepts the same set of state transitions and is universal for spreading state machines among them.
Therefore, Using the raft consensus technique for both the election of the leader and data replication, raft A = raft(45), creates a(n) self of the raft class.
Learn more about raft class, here:
https://brainly.com/question/21709647
#SPJ1