PLS ANSWER ASAP
——————————————



Question 2 (1 point)
What function would you use to find the most popular video?
Max
Average
Sum
Count
Min

Answers

Answer 1
Count explanation: I don’t really know how to explain it hope it helps:)
Answer 2

Answer:

Count

Explanation:

Because most popular vidoes need a count of viewers to determine how popular it is. Think of it like the cliche bar chart sued to determine what is the most popular ice cream flavor. A computer could anaylse this data and count each reponse to see what flavor had the most responses. Hope this helps! Let me know if you need more info!  


Related Questions

Jenny is preparing a presentation on the health statistics of the 10 most populated countries. She wants to apply a blinking effect to the names
of the countries, and a motion effect between the exit and entry of every slide. Which options should she use?
Jenny should use the v option to apply a special blinking effect to the names of the countries and the
option to
apply a motion effect between the exit and entry of every slide

Answers

Answer:

Jenny opens presentation software and insert data in slides

then, click on country names one by one and apply animations as you want, to apply animation on text. animation are occur in animation tab. Different type of animations are found in animation section such as blinking, fade , Wipe, Fly in etc.

After applying animations on country names

Secondly, You apply motion effect on exit and entry  of every slide.

Select slide on which you want to apply motion effect then click on Transitions tab and apply that motion effect as you want. the effect will apply on this slide.

If you want to apply same motion effect on all slide then you will first select all slide and then apply desire motion effect.  

The motion effect will apply on exit and entry of every slide.

Explanation:

Answer:

Jenny should use the Animation option to apply a special blinking effect to the names of the countries and the Transition option to apply a motion effect between the exit and entry of every slide.

__________ is a tool for building a new list from another list by applying an expression to each item in a sequence. Group of answer choices arrays nested lists list comprehension []

Answers

Answer:

Nested lists __________ is a tool for building a new list from another list by applying an expression to each item in a sequence.

Explanation:

The nested list can contain any sort object, even another list (sublist), which in turn can contain sublists themselves, and so on.  Nested lists can be used to arrange data in hierarchical structures.  Some nested lists are unordered lists, some are ordered lists, and others are description lists.  The most important observation of a nested list is that it usually appears as an element on another list.

What is the best way to describe eNotes?

A.it is a tool students can use to take notes during an online lesson

B.it provides access to an extensive back up system on the nternet

C.It allows students to clip a portion from a webpage for later use.

D.It is a tool for storing images and recordings in one location.​

Answers

Answer:

A.it is a tool students can use to take notes during an online lesson

Explanation:

ENotes is a tool used to take notes, particularly targeted towards online learners. Note-taking generally help students to possess a far better understanding of what they learn. It also helps the scholars to enhance their writing skills. There are many sophisticated and straightforward note-taking tools available on the market.

Answer:

(A) It is a tool students can use to take notes during an online lesson.

Explanation:

HELP QUICKLY

What is the result for the following line of code? >>>print("one+day")

O one day
O one + day
O one day
O oneday

Answers

Answer:

The answer is 4. oneday

Explanation:

Just did it and got it right.

The result for the given line of code "print("one+day")" is oneday. Thus, the correct option for this question is D.

What is meant by Coding?

In computer and technology, Coding may be defined as a type of process that remarkably assigns a code to some instruction for classification or recognization. Coding anyhow makes it feasible for us to construct computer software, games, apps, and websites.

Coding is a list of sequential or step-by-step process that delivers instructions and gets computers to do what you want them to do. The given line of code involves one + day without spacing, so the output for this line of code is oneday.

This set of instructions delivers the commands to the processing units in order to reveal a valid and accurate output.

Therefore, the correct option for this question is D.

To learn more about Line of code, refer to the link:

https://brainly.com/question/20212221

#SPJ5

Assign sub_lyric by slicing rhyme_lyric from start_index to end_index which are given as inputs.

Sample output with inputs: 4 7
cow

Answers

In python:

sub_lyric = rhyme_lyric[start_index:end_index]

Just add this line of code wherever you need it. I hope this helps!

Answer:

start_index:end_index

Explanation:

put this where it says '''Your solution'''

write a calss called animak that contains a static variable called count to keep track of the number of animals created

Answers

Answer:

Follows are the code to this question:

class Animal //defining a class Animal

{

static int count = 0;//defining static integer variable count

int myCount;//defining integer variable myCount

Animal() //defining default constructor Animal

{

myCount = ++count;//use myCount to hold incrementing value of count

}

public static int getCount()//defining a static method getCount

{

return count;//return count value

}

public static void setCount(int count)//defining a static method setCount that accept a parameter

{

Animal.count = count;//use class to hold value in count variable  

}

public int getMyCount() //defining a method getMyCount

{

return myCount;//return myCount value

}

}

public class Main//defining a class Main

{

public static void main(String[] ax)//defining main method  

{

Animal a1 = new Animal();//creating animal class object

Animal a2 = new Animal();//creating animal class object

Animal a3 = new Animal();//creating animal class object

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("first animal count: " + a1.getMyCount());//calling getMyCount method

System.out.println("second animal count: " + a2.getMyCount());//calling getMyCount method

System.out.println("third animal count: " + a3.getMyCount());//calling getMyCount method

}

}

Output:

please find the attached file.

Explanation:

please find the complete question in the attached file.

In the above-given code, a class "Animal" is defined, inside the class two integer variable "count and myCount" is defined, in which "count" is the static variable.

In the next step, the class constructor is defined that holds the incrementing value of count in the myCount variable, and use the get and set method to hold the value, in which set is static type.

In the main class, the "Animal" class object is created, which calls the getMyCount method to print its value and use the class name to call the set method.    

is domain name system encrypted?

Answers

Answer:

they are all the same

Explanation:

all the packets look the same tis is because of HTTPS and HTTP/2, and how they both use connection

Paghambingin ang malawak na perspektibo sa

ang

limitadong perspektibo sa pamamagitan tatlong

eng lakas halimbawa.


Malawak


1

2

3


Perspektibo


1

2

3

Answers

Answer:

2

Explanation:

Paghambing limitadong perspektibo sa pamamag

5. It is possible to prevent someone
from copying the cell from yoursheet?
How?​

Answers

can you elaborate more?

Answer:

click REVIEW tab and then "protect workbook"

Explanation:try it

How do I find questions to answer?

Answers

Answer:

you go to the left side

Explanation:

yea

Can hackers actually hack into a built in camera on a laptop?

Answers

Answer:

Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study or virtual socialising. Unfortunately, this privilege can leave us vulnerable to an online attack known as camfecting. This is when hackers take control of your webcam remotely.

Answer:

yes

Explanation:

. Write a program, Array Range, that asks the user to input integers and that displays the difference between the largest and the smallest. You should ask the user the number of integers s/he would like to enter (this will allow you to set the length of the array). Allow the user to input all the numbers and then store them in the array. Search the array for the largest number, then search for the smallest, and finally compute the calculation. Display all the numbers given by the user, the max number, the min number, and the difference

Answers

Answer:

Written in C++

#include<iostream>

using namespace std;

int main() {

int n;

cout<<"Number of array elements: ";

cin>>n;

int myarr[n];

cout<<"Enter array elements: ";

for(int i=0;i<n;i++) {

 cin>>myarr[i];

}

int small = myarr[0];

int larg = myarr[0];

for(int i=0;i<n;i++) {

 if(small > myarr[i]) {

  small = myarr[i];

 }

 if(larg<myarr[i]) {

  larg = myarr[i];

 }

}

cout<<"Array Elements are: ";

for(int i =0; i<n;i++) {

 cout<<myarr[i]<<" ";

}

cout<<endl;

int range = larg - small;

cout<<"Largest: "<<larg<<endl;

cout<<"Smallest: "<<small<<endl;

cout<<"Range: "<<range<<endl;  

return 0;

}

Explanation:

I've added the source file as an attachment where I used comments as explanation

How to make distortion effects on sony vegas or premiere pro

Answers

i use i movie what do u use

Write a Java method to find the smallest number among six numbers.

Answers

Answer:

1. import java.util.*;

2. public class SmallestInArrayExample1{

3. public static int getSmallest(int[] a, int total){

4. Arrays.sort(a);

5. return a[0];

6. }

7. public static void main(String args[]){

8. int a[]={1,2,5,6,3,2};

Explanation:

Here is some coding information.

import java.util.Arrays;

public class SmallestIntArray{

   public static int getSmallest(int[] a){

       Arrays.sort(a);

       return a[0];

   }

   public static void main(String []args){

       int a[] = {1,2,3,4,5,0,1};

       System.out.println(getSmallest(a));

   }

}

The method getSmallest takes one arguement, an array of integers. The integers are then sorted in ascending order (smallest number first) then we return the first integer in the array.

import java.util.Arrays;

public class SmallestIntArray{

   public static int getSmallest(int a, int b, int c, int d, int e, int f){

       int ar[] = {a, b, c, d, e, f};

       Arrays.sort(ar);

       return ar[0];

   }

   public static void main(String []args){

       System.out.println(getSmallest(1,2,3,4,5,0));

   }

}

The method getSmallest takes 6 integers as arguements and then puts them into an array. We then sort that array in ascending order and we get the smallest number by returning the first integer in the array.

By looking at the IP packets in your trace, answer these questions: 1. What are the IP addresses of your computer and the remote server

Answers

Hii, you've asked an incomplete question. However, inferred you may want to know about IP addresses and remote servers.

Explanation:

The IP (Internet Protocol) address in simple words refers to a unique set of numbers assigned to each connected device in a computer network (or internet network) using the Internet Protocol to send and receive information.

The remote server refers to a server (a computer providing data to other computers) that is found in another location different from the location of the user accessing them.

Each element in a dictionary has two parts: a key and a value. You use a key to locate a specific value.
a) True
b) False

Answers

Answer: TRUE

Explanation:

Elements in a dictionary are usually composed of two parts ; the key which could be viewed as the file name used to store the value. In general a dictionary written in the pattern; {key : value}. A certain value can be located, modified, deleted and added to a dictionary by using the dictionary key attached to each value in the dictionary object created. Each dictionary key should be unique and will be a string of letters which holds a particular value.

During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter:

Answers

Answer:

The answer is "Patch and restarts the unknown service".

Explanation:

Please find the complete question in the attached file.

SNMP would be a means to share information with different devices on the network. It allows systems to interact, and although machines are physically executing code.

SNMP Trapping was warning notifications that are sent to a central repository, the "SNMP manager" from either a remote SNMP enabled device. The trigger could warn them that a controlled device overheats.

Its key form of contact between both the SNMP control devices-SNMP Agent and SNMP Director-is trap communications. If you will note, SNMP is a possible protocol to also be shared with supervisors and agents.

__________consist of two or more computer-controlled machines or robots linked by automated handling devices such as transfer machines, conveyors, and transport systems.

Answers

Answer:

Flexible manufacturing systems

Explanation:

Flexible manufacturing systems which can be written in short form as (FMS) is the combination of more two or more machines which are controlled by computer.

The overall performance of the system is directed by computers thereby directing each work to the appropriate route where the needed activity will be carried out.

what is a compter software​

Answers

Answer:

Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be really used on its own.

Hope this helps!!

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

one paragraph essay about early computing device​

Answers

Alternatively, most modern computational devices are “digital”. One of the earliest implementations of a digital system is attributed to Joseph-Marie Jacquard of France in 1801, the Jacquard Loom. He used a punched card to control the weaving actions of a loom, which introduced much more intricate patterns in woven cloth. Jacquard’s approach was a variation on the original punched-card design of Jacques de Vaucanson in 1745. de Vaucanson was a toy maker (most famous for his mechanical duck), and his idea of automating the weaving process was not well accepted by weavers (a situation not unlike that of the modern day computer ink and paint process in traditional animation.)

The punched-card idea was adopted later by Charles Babbage in about 1830 to control his Analytical Engine, and later by Herman Hollerith for tabulating the 1890 census. The Babbage Analytical engine (which was never completed by him) was designed to use Jacquard’s punched cards to control an automatic calculator, which could make decisions based on the results of previous computations. It was intended to employ several features later used in modern computers, including sequential control, branching, and looping.

An assistant to Babbage was Augusta Ada Lovelace (or Lady Lovelace), the daughter of the English poet Lord Byron, and a mathematician, who created a “program” for the Analytical Engine to compute a mathematical sequence known as Bernoulli numbers. Based on this work, Ada is now credited as being the first computer programmer and, in 1979, a modern programming language was named ADA in her honor.

In 1878, Oberlin Smith devised a crude magnetic recording device made of a silk thread covered with steel dust. In theory, when exposed to a magnetic field, the steel dust particles would align with the magnet, creating a digital pattern. Smith applied for a patent, but never followed through with the application. He concluded that he wouldn’t be able to establish a useful pattern on the strings, published his results in 1888, but dropped his investigations.

Further contributions to magnetic recording were few, until Fritz Pfleumer developed the magnetic tape, which was a strip of paper covered with magnetic dust (the first paper tape used was covered with high grade ferric oxide barn paint (rust red), and a cloud of red dust sprayed the air as the tape was used). The German General Electric company bought the patents from Pfluemer and marketed the first true tape recorder, the Magnetophon (meaning “tape recorder” in French) in 1936.

The U.S. Census Bureau was concerned about the difficulty of tabulating the 1890 census. One of its statisticians, Herman Hollerith, envisioned a machine that could automate the process, based on an idea similar to that used in the Jacquard Loom. Hollerith designed punches for his system, which he called the Hollerith Electric Tabulating System. A pin would go through a hole in the census card to make an electrical connection with mercury placed beneath. The resulting electrical current activated a mechanical counter and the information would be tabulated. The tabulating system was featured in an 1890 issue of  Scientific American magazine.

1890 Scientific American cover

The 80 column punch card introduced by Hollerith in 1928 became the standard input medium for computers until the late 1970s when interactive systems became usable. It was sized at 7 3/8 inches wide by 3 1/4 inches high by .007 inches thick. Prior to 1929, this was a standard size for many U.S. banknotes, and Hollerith apparently chose it so that he could store cards in boxes made for the Treasury Department.

“IBM” Card

What became known as the “IBM card” was the source of a popular phrase which became the topic for a great article by Steven Lubar of the Smithsonian in 1992, titled “Do not fold, spindle or mutilate: A cultural history of the punch card.”[2]

Hollerith obtained over 30 patents for his research, but he was not a marketer. He felt he had a choke hold on the census tabulating machine, and he charged the Census Bureau more than it would have cost to do it by hand. As a result, they developed, and in fact patented their own version of the machine. Hollerith almost closed the doors on his company, but he was able to attract a brilliant business mind, Thomas J. Watson, to run it, and his company survived; it would later become International Business Machines (IBM).

If you found this helpful, please mark me brainliest and rate it and thank me thru that button!

how can I write 3*3*3=27 in C langueg

Answers

Answer:

x³ - 27 = 0

-Astolfo

Suppose you start with an empty queue and perform the following operations: enqueue 1, enqueue 2, dequeue, enqueue 3, enqueue 4, dequeue, enqueue 5. What are the resultant contents of the queue, from front to back?
a. 1, 2, 3, 4, 5
b. 1, 3, 5
c. 1, 2, 3
d. 3, 4, 5

Answers

Answer:

The correct answer is   d) 3 4 5

Explanation is given below  

Explanation:

A queue is FIFO data structure which means first in first out so when you perform operation enqueue 1, enqueue 2 it will add  1, 2 to queue when you perform dequeue it will remove front element which is 1 further when you perform enqueue 3 and enqueue 4 it will add 3 and 4 to queue and when you perform dequeue it will remove front element which is now 2 as 1 is already removed after that when you perform enqueue 5 it will add 5 to queue so now the queue is like 3 4 5.

uppose that a datagram of 2,700 bytes (20 bytes of IP header plus 2,680 bytes of IP payload) arrives at a router and must be forwarded to a link with an MTU of 900 bytes. Also suppose that the original datagram is stamped with an identification number of 15. How many IP fragments will be created by the router to forward this packet

Answers

Answer:

Four (4) IP fragments will be created by the router to forward this packet.

Explanation:

Datagram = 2700 bytes

IP Header = 20 bytes

Maximum Transmission Unit = 900 bytes

Original datagram is stamped with an identification number of 15

Required number of fragments = [tex]\frac{Datagram - IP header}{MTU - IP header}[/tex]

⇒  [tex]\frac{2700 - 20}{900 - 20}[/tex]

⇒  2680 / 880 = 3.045

ceiling(3.045) = 4

There are three main categories of objects to be protected by access controls: information, technology, and _____________.

a. applications
b. processes
c. physical location
d. networks

Answers

Answer:

c. physical location

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device in order to grant or deny them access to a computer resource.

Access control work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials through a process known as authentication and granting the user access if the credentials provided are authentic (valid) through a process known as authorization, else, they would be denied access.

An example of an access control is a password because it is typically a basic and fundamental front-line defense mechanism against an unauthorized use of data or cyber attacks from hackers.

There are three main categories of objects to be protected by access controls: information, technology, and physical location. Information refers to all data sets, technology refers to the software applications, network and computer systems while physical location refers to infrastructures such as building, data centers, campuses, offices etc.

Rafael needs to add a title row to a table that he has inserted in Word. What should he do?

Answers

Answer: C

Explanation:

Edge2020

Answer:

c

Explanation:

Give two example computer applications for which connection-oriented service is appropriate. Now give two examples for which connectionless service is best.

Answers

Answer:

File transfer, remote login, and video on demand need connection-oriented service.

Explanation:

I HOPE THIS HELPS

A connection-oriented service is a data transfer mechanism used at the session layer. Connectionless service is an in-data communication that is used to convey data at the OSI model's transport layer.

What is a connection-oriented service?

A connection-oriented service is a data transfer mechanism used at the session layer. Unlike its opposite, connectionless service, connection-oriented service necessitates the establishment of a session connection between the sender and recipient, similar to a phone conversation. Although not all connection-oriented protocols are considered reliable, this method is generally thought to be more reliable than a connectionless service.

What is a connection-less service?

Connectionless service is a notion in data communications that is used to convey data at the OSI model's transport layer (layer 4). It refers to data transmission between two nodes or terminals in which data is transferred from one node to the other without first confirming that the destination is accessible and ready to accept the data. There is no need for a session connection between the sender and the receiver; the sender just begins delivering data.

Telnet, rlogin, and FTP are examples of services that leverage connection-oriented transport services. And Connectionless services include User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP).

Learn more about Connection-Oriented Services:

https://brainly.com/question/13151080

#SPJ2

Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is: 8 3 Your program must define and call a function. SwapValues returns the two values in swapped order. void SwapValues(int

Answers

Answer:

Written in C++

#include <iostream>

using namespace std;

void SwapValues(int num1, int num2) {

   int temp = num1;

   num1= num2;

   num2 = temp;

   cout<<num1<<" "<<num2;

}

int main() {

   int num1, num2;

   cout<<"Enter two integers: ";

   cin>>num1;

   cin>>num2;

SwapValues(num1,num2);

   return 0;

}

Explanation:

I've added the full program as an attachment where I used comments as explanation

A ________ helps create objects using a step-by-step process. Group of answer choices template shortcut file extension wizard

Answers

Answer:

Wizard.

Explanation:

This is explained to be a sort of design that's seen to require place in forms or steps in designing it. Here, steps just like the layout fixing, program for an improved performance and plenty of other factors that are employed in portraying a top quality design are been put to put extensively.

Internet designing of web makes use of assorted programs and tools so as to attain the intended look, like Photoshop and lots of others. so as to form a winning design, Web designers must consider their audience, the aim of the web site and therefore the visual appeal of the planning.

How do you win a game of amoung us

Answers

Answer: As the Crewmates move around the map in Among Us to complete tasks, Impostors try to sabotage and kill them off anonymously. If the latter successfully kills off all the Crewmates without being noticed, then he/she wins the game.

Explanation: Have a blessed day!

Answer: Just go around vent, in secret and press emergency meeting ONE TIME. then say someone vented,  and say they vented but really it was you

Explanation:

:)

Other Questions
If you heat up water and the particles begin to move faster is this an example of? The math club had to pay a $12 set up fee for club T-shirts plus $5 per shirt.Formulate an equation. Let s represent the number of t-shirts and C the cost. How did Egypt depend on the Kingdom of Kush?A It relied on Kush for gold for its economy.B It relied on Kush for archers during major battles.C It depended on Kush for salt for preserving food.D It depended on Kush as a source of enslaved workers. the markup rate is the constant of proportionality in the equation y =kx. Write an equation that can be used to find the amount of markup on the cost x of a phone What is aerobic respiration? what is a compter software NameClass:Find the place value of a digit in a whole numbe1.What is the value of 5 in 857,963 ?5 is in theplace.5 has a value ofWhat is the Value of 5 in 857,963 A.10,000B.1,000 C.100 At the end of the year, Bramble Co. has pretax financial income of $583,000. Included in the $583,000 is $74,200 interest income on municipal bonds, $26,500 fine for dumping hazardous waste, and depreciation of $63,600. Depreciation for tax purposes is $47,700. Compute income taxes payable, assuming the tax rate is 30% for all periods. Which is the algebraic expression for "two less than theproduct of seven and a number?" Copying someone else's material and claiming that it is your own creation is called _____.stylestructureplagiarismlanguage A student added solid calcium oxide to dilute hydrochloric acid in a beaker. The student added solid calcium carbonate to dilute hydrochloric acid in another beaker describe one difference between the two reactants Find the slope and y-intercept of y=1/5x+4 o Easy question!!plss help!!!ASAP!!!The_________system transports oxygen and carbon dioxide through theBody. Why don't you try another approach," suggested the drama coach. "perhaps the character should be played more humorously." Which words should be capitalized? You are offered two different sales jobs. The first company offers a straight commission of 7% of the sales. The second company offers a salary of $ 330 per week plus 3% of the sales. How much would you have to sell in a week in order for the straight commission offer to be at least as good? The maximum kinetic energy of photoelectrons does not depend on Help easyOne reason cells divide is to_____.A. dieB. growC. reproduceD. respire How would I solve this question What is the unit cost per bottle if a pack of 4 bottles of juice sells for $3 ((ILL GIVE POINTS AND BRAINIEST))How were the Revolutionary efforts of Samuel Adams and John Hancock most alike? (4 points) aBoth were members of the Sons of Liberty. bBoth were members of the Declaration of Independence Committee. cBoth were imprisoned by the British for their actions. dBoth fought in the Continental Army. Joshua buys p pounds of bananas for 40 cents per pound. He pays the clerk with a fifty-dollar bill. The clerk subtracts the total cost of the bananas from the fifty-dollar bill to determine the amount of change to give Joshua. Write an expression to represent this scenario. Then, determine how much change Joshua will receive if he buys three pounds of banana