Answer:
not me
Explanation:
Sorry :\
Answer:
LOL yesss, rblx for days
What games do you play?
Be sure not to report any answers!
Brainly! This app is amazing!
I’ll mark Brainliest
Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that they are designing.
What state should that switch be in?
state 1
state 0
input
output
Answer:
Explanation:
state o
PLZZ HELP TAKING TEST Which of these is a way that web developers work around the problem of not knowing the screen resolution at which a user will view a web page?
using HTML to create the page
creating different sets of pages for different resolutions
storing the website on a web server
using a mobile app building application instead of a web development tool
Answer: I believe it's using HTML to create the page.
Explanation:
The answer choice which is a way that web developers work around the problem of not knowing the screen resolution at which a user will view a web page is:
A., using HTML to create the pageWhat is a Website Design?This refers to the various processes of creating, designing a web page which serves user needs.
With this in mind, we can see that some of the programming languages which are needed to design a website includes:
HtmlCssJavascriptJquery, etc.Furthermore, if a web developer wants to solve the problem of screen resolution of his viewers, then he would have to use HTML to create the pages.
Read more about web design here:
https://brainly.com/question/25941596
For what purposes do students collect data? Check all that apply.
to check a statement's credibility
to answer a question
to support an argument
to evaluate a statement
to examine a question's reliability
Answer:
sounds like all of the above
Explanation:
only one im not 100% sure on is to examine a question's reliablity
Answer:
1
2
3
4
Explanation:
How has technology changed in the last 10 years?
What Is Better, A GTX 1660 Or Radeon Rx 5500XT
Answer:
I say Radeon Rx 5500XT
Explanation:
Explain how this transfer observes the conservation of change
Answer:
The law of conservation of charge states that charge is always conserved. ... Charge is neither created nor destroyed; it is simply transferred from one object to another object in the form of electrons.
Explanation:
i need help with computer science
im on Write Password Evaluator
Answer: Password Evaluator is designed to examine passwords and tentative passwords to look for dictionary words and patterns that a password cracking tool might exploit. It looks for reversed, rotated, keyboard shifted, truncated, dropped letters, substituted characters and other variations on dictionary words both singly and in many combinations.
Explanation:
Hackers crack hash functions by finding collisions or pre-generating millions of hashes and comparing them until find the one generated it.
A. True
B. False
Answer:
A.true
Explanation:
Answer:
The answer is A. True
Explanation:
define online pollution
Explanation:
E-Pollution is the environmental damage that comes from the constant heat and cooling down in facilities that are referred to data centers. Data centers are where online information is collected, processed, stored and exchanged.
sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the plant's pattern of growth?
Answer:
A. The cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.
Explanation:
Answer:
the cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.
Explanation:
Because thats how plants work.
NEED HELP ASAP!!!!!!!!!!!
What can happen if music is downloaded illegally from a P2P network?
Large fines may have to be paid.
O Your computer screen will freeze.
O Your computer will shut down.
You will not receive the correct music.
Name the part of the computer that stores all information and software.
Answer:
Hard Drive
Explanation:
Answer:
The Hard drive
Explanation:
When would it be most beneficial to package a presentation on a CD? Check all that apply. when sending the file via email for distribution of very large files as a promotional gift for customers when uncertain of on-site equipment when presenting in public environments when sending a PowerPoint file for review
Answer: b,c,d, e
Explanation:
Got it right on edg 2020 hope this helps
Answer: B C D E
for distribution of very large files
as a promotional gift for customers
when uncertain of on-site equipment
when presenting in public environments
Explanation:
i like ur cut g.......
Jen’s house contains the following devices:
Jen’s laptop, which is wirelessly connected to the home network router and turned on
her husband’s PC, which connects to the router by a cable but is turned off
her mother’s virus-infected computer, which has been unplugged from the router
her daughter’s smart phone, which is wirelessly connected to the router
Select all that are correct:
Jen’s network is a WAN.
Jen’s network is a processor.
There are three networked computers in Jen’s house.
Jen’s router is a server.
Jen’s network is a cloud.
Jen’s mother’s computer is not part of the network.
All the computers in Jen’s home besides her mother’s are peers, whereas her mother’s computer is a slave.
Answer:
The anserw is the first one
Explanation:
Hoped it help
ANSWER ASAP PLEASE, 100 POINTS. Xavier wants to print the slides of his PowerPoint presentation to practice and make notes but doesn't want to use too much ink or paper. What print option should Xavier use?
A: Print Full Page Slides
B: Print Handouts
C: Print Notes Pages
D: Print Presentation
Answer:
c
Explanation:
The print option should Xavier use is print Notes Pages. Hence option C is correct.
What is print?Print is defined as a computer sending information to a printer, which creates a hard copy (printed copy) of the information being printed. Not only are books and newspapers printed, but also textiles, plates, wall coverings, packaging, and billboards. It has also been used in the creation of small electrical circuits. The general consensus is that print media is more reliable than digital media.
Each presentation slide and your notes are included on the notes pages. Every slide has its own notes page when printed. Your notes are attached to the slide. Your notes pages can contain information, such as graphs and pictures.
Thus, the print option should Xavier use is print Notes Pages. Hence option C is correct.
To learn more about print, refer to the link below:
https://brainly.com/question/14668983
#SPJ3
Hash functions use algorithms use a big chunk of data and squeeze it into a small amount to verify something like a file or an application.
A. True
B. False
Answer:
A. True
Explanation:
Identifying and verifying files/applications is one use of hash functions.
Is the PS5 worth it?
I’m planning on getting one so I need to know. Also, I am giving 100 points. Please answer quickly.
Answer:
Do your Homework
Explanation:
Save up the money and watch multiple videos and reviews, unboxing, etc. Trust me it helps lol
Save up that money tho
Plz mark brainliest
what is binary code?
Answer:Binary code, code used in digital computers, based on a binary number system in which there are only two possible states, off and on, usually symbolized by 0 and 1. ... In binary code, each decimal number (0–9) is represented by a set of four binary digits, or bits.
Explanation:
Brainliest
Answer:
binary code is a jumble of random 0s and 1s that forn chains that make up all coded systems on any electronic device
Explanation:
please write a 200 to 300 word of the topic you choose
read the direction and answer if you do i will give you brainlest!!!!!!!
Answer:
There is a scar above my brother’s knee.
This scar tells a story of distance.
You should know for the longest time my dad worked the late shift. He’d sleep in the day and then be up all night. Because of this, we didn’t get much time with him.
We always joked about Jon being Dad’s favorite.
Although a joke, there was still some semblance of truth to our kidding around.
Most mornings when Mom had time, she’d apply her makeup in the dining room. She’d sit on the floor cross legged, peering into the mirror. Months earlier the mirror came loose from our bathroom cabinet, so now Mom found herself sitting here daily. You should know, the mirror wasn’t in a frame. Instead it had sort of an unfinished edge. This morning Mom in her haphazard rush to get out the door, precariously placed the mirror overlapping the door frame.
I imagine I was chasing Jon around the house one summer morning. Although two years younger than me, he could always hold his own against me. Most often, we didn’t fight, but instead pushed each other to be more competitive. Mostly we played. From lava, to tag, to wrestling, hide-n-go seek, to ninja turtles. We were always roughing about.
Loop after loop we were silly and screaming. “I’m gonna get you now! Come hear sucka! You’re going to DIE!!” “Nuh uh!!” We were endless in our back and forth pursuit of each other. Sometimes we’d chase each other and wrestle over something: the remote control, a toy, a snack, a dictionary.
So now I was hot on Jon’s tail. He turned a corner and I gained on him through the living room.
Instantly Jon crumpled to the ground. A scream hung in the air.
“Chaz!! Stop!!
A flood of red began to seep through Jon’s jeans. I’d never seen this much blood before. Panic settled in.
“Sorry. Sorry! What happened?”
Silence from my brother. The mirror had sliced and sunk into his skin.
I hurried to the phone. Dialed mom’s work. 342-2746.
“Bob’s Tasty Treats.”
“Is Penny there? I need to talk to my mom.”
“Just a second.”
“You know I’m busy. What’s going on?”
“Mom. Jon just sliced his knee open. There’s blood. Like so much blood. It’s everywhere. Help. What do we do?”
“Have you told your dad?”
“Oh yeeeaah… K. Love you so much. Bye”
I rushed upstairs and woke dad up from his slumber. “Dad! Dad! Jon’s hurt. He’s bleeding. Get up!”
I’m not sure what followed. I imagine Dad rushed down the stairs and wrapped Jon’s knee up in a towel or something. He probably packed us all in to our Red Lumina and rushed Jon off to the hospital twenty minutes away. Jon got stitches. I’m not sure how many. Jon doesn’t even know anymore. All Jon really remembers is the pain.
In the years that passed I began to wonder why we didn’t go upstairs to dad in the first place. Why’d we call mom first?
Through a conversation with my sister, we realized this was our normal. Although Dad was around, he was never present. He was absent so often that in a time of crisis we didn’t even turn to him. As a father, I want to be present.
hope mine gets picked i really need it also good luck on this!
3
What steps can be used to access the Subtotal dialog box?
Select any cell in the data range.
Click the_____tab
In the
_______group, click______
to access the Subtotal dialog box.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
There are some steps that you use to access the subtotal dialog box.
To access the Subtotal dialog box, you need to follow the following steps:
Click the Date tab
In the Outline group, click Subtotal
to access the Subtotal dialog box.
The Subtotal function used in Excel and return the subtotal of the numbers in a column in a list or database. Subtotal is a builtin function in Excel that used to subtotal the number in a column or in a given database.
Answer:
Data
Outline
Subtotal
Explanation:
Have a good day:))
What benefits will you receive by attending the high school you are applying to? (in complete sentences)
how does having weak security on your browser represent the weakest link in a network
Answer:
1. Your location is always exposed "might not be a problem, until it is"
2. Computer Viruses as your browser allows them
3. Hackers, of course, Ransomware attacks
4. SpyWares, read terms and condition or atleast visit trusted sources
5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.
6...... ALWAYS STAY SECURED
YOU WERE NEVER THE TARGET, JUST THE VICTIM
Type the correct answer in the box. Spell all words correctly.
What kind of graph or chart does this image represent?
The given image represents a
.
Answer:
its a bar graph
but some people also call it a line graph
i hope that helped
Answer:
bar graph
Explanation:
lots of bars
expalin the defference between the driver of a desktop and a laptop
Answer:
None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.
A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions
Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.
what paper is best for vibrancy A. Uncoated paper B. natural paper C. Newsprint paper D. Coated paper
Answer:
the answer is a
Explanation:
Uncoated paper creates the perfect canvas for vibrant color, because the unreflective surface doesn't detract from vivid color and beautiful detailed imagery. When comes to making colors pop on uncoated paper, there are no other options than the high-quality performances of Cougar and Lynx.
Answer:
D. Coated paper
Explanation:
I just took a test and it was correct
what are the difference between requests management to problem management??
Answer:
Problem management is a practice focused on preventing incidents or reducing their impact.
Request Management is the systematic handling of the tasks required for a variety of different internal or external requests using workflow automation, business rules, and analytics. Request management problems manifest in a variety of ways in any organization: Slow request turnaround times.
Explanation:
Create a two functions: first called grocery_cost(food), where food can be one item or a list of items from the stock and price dictionaries, the second is called stock_check(stock_list) where a store manager can check if stock numbers are at a minimum value.grocery_cost: loops through the argument food, notes the price, checks the stock, calculates and prints the total cost and changes the stock number. You will need to use a for statement to loop through the items in food and an if statement to check and update the stock (substract one from the stock for each item in the stock).Stock_check: loops through each item in the stock dictionary and uses an if-statement to print a statement if stock is less than 5.Given:stock_key={'tomato soup':20,'cheese':10,'milk':25,'oreos':100,'red bull':0,'apples':17,'oranges':4}price_key={'tomato soup':1.85,'cheese':3.99,'milk':4,'oreos':7.49,'red bull':0.99,'apples':0.59,'oranges':1.29}
Answer:
stock_key={'tomato soup':20,'cheese':10,'milk':25,'oreos':100,'red bull':0,'apples':17,'oranges':4}
price_key={'tomato soup':1.85,'cheese':3.99,'milk':4,'oreos':7.49,'red bull':0.99,'apples':0.59,'oranges':1.29}
def grocery_cost(*args):
total_cost = 0
for arg in args:
if arg in stock_key.keys():
stock_key[arg] -= 1
total_cost += price_key[arg]
print( f"Total cost of groceries: {total_cost}")
def stock_check():
for key, value in stock_key.items():
if value < 5:
print(f"The stock \"{key}\" is less than 5.")
grocery_cost('apples', 'oranges','milk', 'oreos','cheese')
stock_check()
Explanation:
The functions of grocery_cost and stock_check are python defined functions. The former accepts a list of one or more items and calculates the total cost of the grocery items from the stock and price dictionary while the latter check the size of the stock in the food store.
If you used an Atbash cipher to encrypt the following message, what would the output be?
HELLO
Answer:
SVOOL
Explanation:
Need help on Assignment 4: Evens and Odds
n = int(input("How many numbers do you need to check? "))
even = 0
odd = 0
for x in range(n):
num = int(input("Enter number: "))
if num % 2 == 0:
even += 1
print(str(num) + " is an even number.")
else:
odd += 1
print(str(num) + " is an odd number.")
print("You entered " + str(even) + " even number(s).")
print("You entered " + str(odd) + " odd number(s).")
This works for me. Best of luck.