Answer:
True
Explanation:
For loops:
//This is Java code
for (int i = 0; i < 10; i++)
{
System.out.println("hi");
}
They let you specify the number of times the code inside the loop will execute. Above, it would print "hi" 10 times.
Answer:
true
Explanation:
have a nice day and hope it helps
What do you call a software program that runs on a web server? Please respond ASAP! Please no comments unless you have a legit answer!
Type the correct answer in the box. Spell all words correctly.////////////////////////////////////////////////////////
////////////////////////////////////////////////////////In a manufacturing system, a sensor determines whether a furnace is at an appropriate temperature. The sensor’s information governs the flow of fuel to the furnace. Identify the elements of this manufacturing system.////////////////////////////////////////////////////////
This particular manufacturing system has an additional fourth element known as
.
Answer:
Where are the words to put in
Explanation:
Answer:
mm I dont understand where do the words go
Explanation:
What term refers to a hacker that uses
technology to announce or deliver a social,
ideological, religious. or political message?
Answer:
Hacktivist
Explanation:
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.
The three main objectives of information security are.
Answer:
confidentiality, integrity, availability
Explanation:
Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others
Integrity: Keeping the data intact, complete and accurate, and IT systems operational
Availability: An objective indicating that information or system is at disposal of authorized users when needed.
The page .Product contains data retrieved from an external system of record using a data page. How do you ensure .Product always contains the most current data from the data page
Answer:
Select refer to a data page on .Product
Explanation:
Q:
The page .Product contains data retrieved from an external system of record using a data p…
A. Select Refer to a data page on .Product.
B. Select Copy data from a data page on .Product...
A:
A
A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem
Answer:
The printer driver is incorrectly installed by the user.
A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook
Answer:
Formula
Explanation:
Formulas are functions that can express a calculation.
What are the qualities of strong leaders? Check all that apply. They inspire others. 1)They are easily influenced by others. 2)They are outstanding role models. 3)They have a strong sense of purpose. 4)They lack self-confidence.
I would pick 2 and 3 based on process of elimination
Which type of document would be best created in Word?
Animation
Newsletter
Presentation
Spreadsheel
Answer:
it would be Animation I declare
Convert the binary expansion of each of these integers to a decimal expansion. A) (1 1111)2 b) (10 0000 0001)2 c) (1 0101 0101)2 d) (110 1001 0001 0000)2
Step 3: Double the total and add the next leftmost digit. Repeat this until you run out of digits. Step 4: The result you get after adding the last digit to the previous doubled total is the decimal
By default, how many levels does the outline view contain?.
Answer:
Nine
Explanation:
By default, how many levels does the Outlining View contain? Nine.
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
Answer:
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
What is the device that converts a sign from binary or analog form into a signal of another form
Answer:
A digital-to-analog converter is a device that converts a discrete signal in the form of a binary digital quantity into an analog quantity based on a standard quantity (or reference quantity), referred to as a DAC or D/A converter. Electronic Basics #10: Digital to Analog Converter (DAC) Catalog Ⅰ Composition and characteristics
Explanation:
A small publishing company has a network design such that when a broadcast is sent on the lan, 200 devices receive the transmitted broadcast. how can the network administrator reduce the number of devices that receive broadcast traffic?
The network administrator reduce the number of devices that receive broadcast traffic and Segment the LAN into smaller LANs and route between them.
What is this segmentation about?By segmenting the one big network into a smaller network, the network administrator is one that has developed two smaller broadcast domains.
Therefore, in the scenario above, The network administrator reduce the number of devices that receive broadcast traffic and Segment the LAN into smaller LANs and route between them.
Learn more about network administrator from
https://brainly.com/question/20424057
#SPJ1
Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing the application, a banner appears on the mobile screen showcasing offers and discounts on air tickets. The banner is best referred to as a(n) ________.
Answer:
online display advertisement
Explanation:
Q:
Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing …
A. online display advertisement
B. contextual advertisement...
A:
A
Find the 66th term of the arithmetic sequence
25,10,−5
Answer:
the answer is 33825
Explanation:
Answer:
-950
Step-by-step explanation:
Arithmetic sequence=a+(n-1)d
a=first number
n=nth term
d=difference
a=25
n=66
d=-15
So let's solve
25+(66-1)(-15)
25+(65)(-15)
25-975
-950
So the 66th terms is -950
this ingredient is often used as decoration for both hot and cold dessert
Answer: cream
Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.
Please mark as brainliest
7.6.8: What's in a Name? code hs help
The exercise here is to write a code that prints the result "What's in a Name?". See the soluton for this below.
What is the code for the above exercise?The CodeHS that states: "What 's in a name?" is:
print('Hello,', input('What's in a name? '))
CodeHS refers to an online platform for learning that is interactive. It offes turorials on general computer science knowledge as wella s programming.
Learn more about CodeHS at
https://brainly.com/question/15599262
#SPJ1
Which of the following statements best describes the future of mass media?
O We will always need mass media, but because of social media, we will rely on it less.
O Although we still need it now, we will one day no longer need mass media because of social media.
o We no longer need mass media at this point in our culture because of our use of social media.
O It is likely that we will always need mass media, because social media cannot last.
The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less.
What is the growth of mass media like?The use of the mass media in recent times is one that is known to be growing rapidly in terms of the kinds of electronic media forms used, the number of TV stations and others. ,
Conclusively, The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less because the use of social media may outweigh the use of mass media.
Learn more about mass media from
https://brainly.com/question/26152499
#SPJ1
Answer:
A.) We will always need mass media, but because of social media, we will rely on it less
Mass media refers to forms of communication that reach large audiences, such as television, radio, newspapers, and magazines. While social media has certainly had an impact on the way people consume information and connect with others, it is unlikely that mass media will become obsolete. However, it is likely that people will rely on mass media less as they increasingly turn to social media and other online sources for information and entertainment.
That being said, mass media still holds an important role in our society, providing us with news, entertainment, and other forms of information. As such, it is likely that mass media will continue to evolve and adapt to changing technologies and social trends in the future.
How is a secure HTTP (HTTPS) different from a non-secured HTTP?
Secure HTTP is armed with a proxy service that inspects any incoming data.
O Secure HTTP is armed with a series of firewalls to protect it from potentially unsafe files.
O Secure HTTP is armed with passwords to ensure that only authorized users gain entry.
Secure HTTP is armed with secure socket layers to create another layer of security
Answer:
the second last option
Explanation:
secure HTTP is armed with passwords to ensure that only authorised users gain entry.
the data is encrypted during transmission
What is the first step you should take if unable to make bill payments on time?
Answer:
"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time
Explanation:
What are three coding languages that are used to build websites?
Answer:
Python, Javascript, and Java
Explanation:
These are the main coding languages used for building most websites.
William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did William have to do to clean up the data
William had to manually edit the data if he wants to remove the null values and incorrect column headers.
What is data editing?Data editing is known to be a term that connote the act of making changes, reviewing or adjustment some survey data.
Note that by editing one can remove want one do not want from a group of data and as such, William had to manually edit the data if he wants to remove the null values and incorrect column headers.
Learn more about data from
https://brainly.com/question/26711803
#SPJ1
pivotetable are based on?
A pivot table is known to be based on the summary of your data and it is one that report on different topics or trends.
What is pivot table?This is known to be a kind of table that shows the summary of one's data, as they are said to be packaged in a chart.
Note that, A pivot table is known to be based on the summary of your data and it is one that report on different topics or trends.
Learn more about pivot table from
https://brainly.com/question/15214258
#SPJ1
Select the correct term to complete the sentence.
A is an application with browser functionality embedded within an application written for a specific platform.
A is an application run through a browser enabling cross-platform access.
A is an application written for a specific device and operating system.
Answer:
A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found. ... A _____ is an application that runs in a
Explanation:
First blank: Hybrid App
Second Blank: Web App
Third blank: Native App
PROOF:
Which part of the nist cybersecurity frameworks defines the activities needed to attain the different cybersecurity results?.
The part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.
What is cybersecurity?The term 'cybersecurity' makes reference to the strategies aimed at protecting information on the deep web.
Cybersecurity techniques are fundamental to protect sensitive data such as passwords from hackers.
In conclusion, the part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.
Learn more about cybersecurity here:
https://brainly.com/question/17579545
#SPJ1
Soft skills high module 7
Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use
Q:
Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?
A:
Masking
Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety of sources to formulate a conclusion. How could you do this in this situation of measuring pollution on a particular river?
To measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.
What is pollution?Pollution is the mixing of unwanted or harmful things in any substance or compound.
Water pollution is the mixing of toxics and chemicals in water.
Thus, to measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.
Learn more about pollution
https://brainly.com/question/23857736
#SPJ1
Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.
Answer:
✓ two-tier architecture
Explanation:
Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.
✓ two-tier architecture