Answer:
Optical Storage Device
what is the binary for O?
Answer:
01001111
Explanation:
Answer:
0000 0000
Explanation:
What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6
Answer:
A math.pow reference
Explanation:
Answer:
from math import ceil
Explanation:
yes
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
Answer:A
Explanation:
Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play?
Group of answer choices
pseudostory
metagame
ludonarrative
iambic pentameter
Answer:
Explanation:
The answer is ludonarrative.
Please mark me brainliest.
Give two examples of search
Answer:
goo.gle and ya.hoo
Explanation:
In a PC, which of the following components stores the BIOS
A. CPU
B. RAM
C. ROM
D. Hard drive
QBasic commands any 10 with examples
Answer:
I haven't used qbasic in a quarter of a century, so my apologies if any of these are outdated.
I listed 13 here as I don't know what are being qualified as "commands" (I'm sure print is in there, but INT? LEN? these might be interpreted not so much as commands as functions)
PRINT prints text on the screen.
PRINT "How much wood would a woodcuhck chuck?"
INPUT gets text from the user
INPUT woodchuckwood$
INT casts a value as an integer
w = INT(woodchuckwood)
OPEN opens a file for input/output
OPEN "woodchuck.consumption" FOR OUTPUT AS #f
OPEN "woodchuck.consumption" FOR INPUT AS #f
CLS clears the screen
CLS
LOCATE specifies the cursor's location on the screen
LOCATE 10, 10
INKEY$ reads a character from the input buffer
a$ = INKEY$
LEN returns the length of a string
l = LEN(a$)
CHR$ takes an int and returns it's ascii value
$enter = CHR$(13)
ASC() returns the ascii value of a character:
$space = ASC(" ")
DO...LOOP repeats a loop until a condition is met:
x = 0
DO
x = x + 1
LOOP UNTIL x = 10
SHARED declares global values as being accessible locally
SHARED $username
SHELL executes an os command
SHELL "dir /w"
describe a tsunami when it is far from the coast
I hope it is helpful for you ......
Mark me as Brainliest ......Tsunamis are marine phenomena, created by the abrupt displacement of large amounts of water into an aquatic formation. Tsunamis manifest as waves, which travel in the deep waters of the oceans at an average speed of 756 kilometers per hour.
While in deep water the tsunami, due to its characteristics there, is not considered a serious danger to the floating structures, reaching the shores has particularly devastating consequences.
Learn more in https://brainly.com/question/15964056
What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:
The following program is a while loop that will output the following data
7,12,17.
In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command
numB = numB+5 and it will print 7
The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command
numB = numB+5 and it will print 12
The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command
numB = numB+5 and it will print 17
The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command
Learn more:
https://brainly.com/question/19344465
Answer: 7,12,17.
Explanation: got it right on edgen
How to unblock a website on a school computer? ASAP who's ever works will get Brainliest and will get a follow.
Answer:
You can't unblock them without admin access to the router. The only way to visit such sites is to find a VPN that is not also blocked by the school.
But you should know, what you are trying to do can get you in trouble if the school's IT department is competent to any extent.
Answer:
login as a teacher into the pc from there you can change the settings of the student acct. because you are the administrator of the pc due to the fact your acct is organized by the school organization such as Lightspeed and other organizations used by the school.
Explanation:
What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class
When comparing systems software and application software, what is the main difference?
Answer:
it is a
Explanation:
i did the test
When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive forces between the particles
Answer:
great enough to overcome.
Explanation:
Kinetic energy can be defined as an energy possessed by an object or body due to its motion.
Mathematically, kinetic energy is given by the formula;
Where, K.E represents kinetic energy measured in Joules.
M represents mass measured in kilograms.
V represents velocity measured in metres per seconds square.
A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.
When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.
Basically, the phase change includes solid, liquid and gas.
Why was the Internet first developed? Use details and information to explain your answer.
Answer:
for military purposes,
Explanation:
and then expanded to the purpose of communication among scientists. Unlike the telephone network, the Internet uses packet switching. Packet switching was invented by three different independent research groups around the world.
Explaining AutoCorrect
How is the AutoCorrect feature useful in Outlook 2016? Check all that apply.
It checks for common typing errors.
It can automatically fix the error while you are typing.
It suggests email recipients that might be interested in your message.
It underlines words that need spelling and grammar corrections.
It ensures that you are emailing the correct recipients.
Answer:
1.
2.
4.
Explanation:
Had the same question
Review the following definition of sustainable construction projects:
Sustainable construction projects demonstrate common sense applications of natural resources throughout the life of the project.
Sustainable projects also take into account the long-term effects on the environment, including how energy and materials are used and
recycled, which should be incorporated into the building itself.
Based on this definition, which of the following characteristics is not a characteristic of sustainable construction projects?
Energy and material efficiency in construction, operation, and maintenance.
Established technologies that have been in use for several decades
Low environmental impacts over the project's life cycle.
High ratio of renewable energy to fossil energy in construction, operation and maintenance,
Answer:
Established technologies that have been in use for several decades
Explanation:
Answer:I’m not sure
Explanation:
Any device that uses light to read and write information.
A. Optical Drive
B. Peripheral Device
C. Laser Device
D. Optical Device
Answer:
the answer is optical drive
Explanation:
hope that helps thanx optical drive uses reflected light to read data.
What is a placeholder for a piece of information that can change is called?
Answer:
Variable.
Explanation:
A placeholder for a piece of information that can change is called variable.
In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.
For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
Hence, when you create variables in a function, you can can set the values for their parameters.
For instance, to pass a class to a family of classes use the code;
\\parameter Name as Type (Keywords) = value;
\\procedure XorSwap (var a,b :integer) = "myvalue";
Which of the following is NOT a standardized size for an editorial design?
11 inches by 14 1/2 inches
5 1/2 inches by 8 1/2 inches
8 1/2 inches by 11 inches
14 1/2 in by 24 inches
Answer:
14 1/2 in by 24 inches
Explanation:
Editorial designing belongs to the graphic design. It refers to the designing of the newspapers, books, magazines, and many more. Editorial designs are also made in online publications. Various online advertising agencies use them to provides ad online.
The main objective of an editorial design is to make the publication visually very interesting, attractive for the readers and should be easily understood by the reader.
There are various format sizes for publishing an item in editorial designing. The standard sizes are :
a).[tex]11 \ \text{inches by} \ 14 \frac{1}{2} \ \text{inches}[/tex]
b). [tex]8 \frac{1}{2} \ \text{inches by} \ 11 \ \text{inches}[/tex]
c). [tex]5 \frac{1}{2} \ \text{inches by} \ 8 \frac{1}{2} \ \text{inches}[/tex]
Which was the first computer network in the world
Answer:
ARPAnet in 1969
Explanation:
hope this helps :)
How much data can be transmitted with a digital signal?
Answer:
two possible
Explanation:
In most digital circuits, the signal can have two possible valid values; this is called a binary signal or logic signal. They are represented by two voltage bands: one near a reference value (typically termed as ground or zero volts), and the other a value near the supply voltage
What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)
Answer:
R, G, B
Explanation:
Red, Green, Blue
How did you generate a random number for the user to guess? by using the built-in randint function by using the built-in random function by using the random method from the random module by using the randint method from the random module
Answer:
by using the randint method from the random module
Explanation:
The randint() method is a method or function in the random python module. It is used to get or return an integer number within a specified range.
To use the method, the module must be imported into the python file with the "import random" statement, then the method is referenced using dot notation and specifying the range of integer numbers.
syntax: random.randint(first_number, last_number)
Note that the last number in the range is inclusive in the selection.
Answer:
A. randint
Explanation:
I got it right on a quiz
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
Please explain what Level 5 Automation is and give 2 examples of the technology
PLEASE ANSWER
Answer:
Automation is the process by which AI is adapted, trained, and refined to perform actions that are similar/mimic those of human behavior and actions There are 5 levels to automation, 0 being the lowest and 5 being the most "autonomous" and independent.Level 5 automation is complete control of the action essentially a true self-driving car that can go anywhere and at any time, assuming that a human driver could do the same.This is based under the assumption that the human can perform the same action as the AI.Fully autonomous vehicles Robot Conveyer beltSoftware that requires excessive disk space or memory.
A. Malware
B. Excessware
C. Ransomware
D. Bloatware
What might the Internet of Things do in the future?
The future of IoT has the potential to be limitless. Advances to the industrial internet will be accelerated through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at hyperscale.
explain how do compare and contrast graphic organizers help you to synthesize information?
Answer:
Answer: Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set.
Explanation:
Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set
define input hardware
Match the example with the type of collection.
{'casa': 'house'}
[3, 5]
(3, 5, 'dog')
Answer: First is a dictionary, second is a list, and third is a tuple
Explanation: