What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer 1
A person is asking you not to use those words/sentences here because it hurt their feelings

Related Questions

Which of these is NOT a user interface?

A. Graphical user
B. Command line
C. Icon interface
D. Menu driven​

Answers

Answer:

menu driven is not an interface

Explanation:

hope that helps you

please follow

please mark brainliest

I will follow you if you mark me brainliest

Which of these is NOT a user interface?

Choose: B. Command line

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this

Answers

Answer:rogue access point

Explanation:

Why are programming languages like Java and Python ideal for rapid development?

Answers

Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.

What are programming languages?

A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.

A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.

Learn more about programming languages, Here:

https://brainly.com/question/12696037

#SPJ5

plz help me I need help​

Answers

Answer:

false

because it was used for the local people to have a fast calculation skill. An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen.
Which of the following multiple display options would be BEST to select when teaching?
A. Show only on 1.
B. Extend these displays.
C. Show only on 2.
D. Duplicate these displays.

Answers

Answer:

Duplicate these displays.

Explanation:

A. Show only on 1 displays only the first screen and disconnects the second one

B. Extend these displays displays two different outputs on the same computer

C. Show only on 2. displays only the second screen and disconnects the first one

D. Duplicate these displays. displays the same output for both screen

Answer:d. Duplicate these displays

Explanation:

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

write some difference between the third and fourth generation of computer?​

Answers

Answer:

third generation of computer are larger than fourth generation. they are slower than fourth generation. IC chips were used whereas in fourth generation microprocessor were used. fourth generation consumed less electricity than third generation.

I HOPE THIS WILL HELP YOU IF NOT THEN SORRY

HAVE A GREAT DAY :)

Explanation:

Third generation of computer

from 1965-71Integrated circuit basedLarger in size compared to fourth generation and Smaller in size compared to second generation of computer.More electricity neededHigh level languageExamples: IBM 360 & IBM 370

Fourth generation of computer

from 1971-1980VLSI microprocessor basedSmaller in size compared to third generation and Larger in size compared to Fifth generation of computerLess electricity is neededinitiate number of High level language like COBOLExamples : IBM 4341 & PUP 11

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

define analogue computer with any four features​

Answers

Answer:

hope it helps you

Explanation:

and pls mark as brainlist ans

You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
A. The smartnet
B. Internet of smart devices
C. *Internet of things*
D. Dynamic environment

Answers

Answer:

*Internet of things*

Explanation:

A network with multiple physical smart devices are known as things on the network

why are GUI operating system more popular than CUI operating system these days?​

Answers

Answer

GUI operating system are more popular than CUI operating system because the GUI operating system is easy to use and understand because commands are graphically presented.They support extra devices and multimedia system.They support network and internet fully.They are multiuser,multitasking operating system.eg windows.

Explanation:

Hope it helps you

Why are digital computer known as general purpose computer

Answers

More intelligent and better than others

Name the type of token x belongs to: x=10+20+30 a) Keyword b) Literal c) Identifier d) Operator
Computer class 11

Answers

Answer:

C) Identifier is the answer I am answering question of class 11 but I read in class7. Thank you!!!

A blog is a Web site of personal or commercial origin that uses a dated log format updated, daily or very frequently, with new information about a particular subject or range of subjects. true or false

Answers

True True True True True

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

what is the right thing to do when you spot fake news​

Answers

Answer:

to tell the truth

Explanation:

l mean there is no reason to keep it secret

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

write any four characteristics of desktop computer​

Answers

The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed. A powerful computer is capable of performing about 3-4 million simple instructions per second

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

write an algorithm to verify a number as even​

Answers

Algorithm to verify a number as even is given in the picture attached.

full form of ip ........?​

Answers

internet protocol - hope this helps!

8. Fill in the blanks.
a) A set of instructions that performs a particular task is called a ______
b) Machine invented by William Oughted is _____
d) A memory used by second generation computer _____
e) Cyber Nepal was established in ____​

Answers

Answer:

a)It is called a program

b)Machine invented by Williams Oughted was Slide rule

d)Magnetic cores were used

What is instance variable??​

Answers

Explanation:

a distance variable includes a value and a dependency. includes a value and a dependency

2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD. ​

Answers

Answer:

Cccccccccccccccccccccccccccccccccc

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Answers

Edward Snowden is a retired CIA employee, and an NSA contractor is regarded by many as a whistle-blowing hero or a treasonous villain. This individual obtained sensitive digital data from the U.S., British, and Australian agencies and leaked them to the press, exposing the breadth of government surveillance efforts.He is a former computer intelligence consultant who released a highly classified central intelligence agency (NSA) in 2013 while serving as a contract for the Central Intelligence Agency.That's why the answer is "Edward Snowden".

Learn more:

Edward Snowden: brainly.com/question/3426041

What is generation of computer ?​

Answers

I HOPE THIS INFORMATION WILL HELP YOU A LOT......

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Hope this answer helps you..!!

..

..

Plz select it as the BRAINLIEST..!!

solve plz
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

JavaScript
HTML
CSS
Text editor

Answers

Answer:

HTML

Explanation:

HTML is used is making web pages.

Answer:

what

Explanation:

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

Other Questions
what do you do to help your sick neighbour two cars started to move towards each other at the same time. the speed of the first car was twice the speed of the second car. they met in two hours. if the distance traveled altogether was 300 km find the rates of the cars. Looking for specific requirements willnot help answer a question or receiveall points possible.TrueFalse Given f(x) = log2x, which of the functions below represents g(x) resulting from reflecting the graph of f(x) in the x-axis and shifting left by 2 units? Correct answer get brainliest and 5 star Please answer this, I need help asap What were the effects of the poison gas, according to the reporter? definite society ??? . If the Federal Reserve raises interest rates in an autonomous tightening ________. A) the MP curve shifts up, there is an upward movement along the IS curve, and the AD curve shifts to the left to a lower level of equilibrium output B) the MP curve shifts down, there is a downward movement along the IS curve and the AD curve shifts to the right to a higher level of equilibrium output C) the MP curve shifts up, there is a downward movement along the IS curve and the AD curve shifts to the right to a lower level of equilibrium output D) the MP curve shifts down, there is an upward movement along the IS curve and the AD curve shifts to the left to a higher level of equilibrium output in digging a pipe trench that measures 29 feet long, 2 feet 9 inches wide, and 3 feet 6 inches deep.How many cubic yards of earth were removed from the site? Step by step plz on how to do this HELP MEEEE!!!!!Gertrude Belle Elion was born on Jan. 23, 1918, in New York City. She graduated from Hunter College in New York City with a degree in biochemistry in 1937. Unable to obtain a graduate research position because she was a woman, she took a series of jobs, including lab assistant, chemistry and physics teacher in New York City high schools, and research chemist. During this time she also took classes at New York University, where she earned a master's degree in 1941. Because she could not devote herself to full-time studies, Elion never received a doctorate.How does the author organize information in this article to create a clear main idea? Chronologically Interviews and research Cause and effect Problem-solution Jessica, a Jew marries Lorenzo, a Christian do you approve of such 'mixed' marriage? Friction causes wastage of energy and hence increases fuel consumption.Suggest different ways to reduce friction and promote responsibleconsumption of fuel and energy. Find the value of xA. 15B. 6C. 60D. 10 Which book contains the Mouth of Hell painting Which of these equations for theformation of an oxide ion is correct?0 + 2e" --> 02-0 --> 02- + 2e Solve for the value of p. p = Explain how presidential powers impact congressional decision making when attempting to achieve their legislative agenda, by explaining how congressional decision making is affected by the presidents veto power, power to issue executive orders, and power as commander in chief. (Focus this response on how the president impacts Congress). QS 8-4 Units-of-production depreciation LO P1 On January 1, the Matthews Band pays $65,800 for sound equipment. The band estimates it will use this equipment for four years and perform 200 concerts. It estimates that after four years it can sell the equipment for $2,000. During the first year, the band performs 45 concerts. Compute the first-year depreciation using the units-of-production method.