Answer:
Display square root of an input number
REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...
DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
SUB SQROOT (N) S = N ^ (1 / 2) ...
DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
FUNCTION SQROOT (N) SQ= N ^ (1 / 2)
Explanation:
hope this helps u
Which type of attack cripples the network and prevents legitimate users from accessing network resources
Answer:
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.
Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.
1
What is a DDoS attack?
1.1 – Understanding a DDoS Attack
The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
1.2 – What is the Goal Behind a DDoS Attack?
The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:
The website can become slow to respond to legitimate requests.
The website can be disabled entirely, making it impossible for legitimate users to access it.
Write a letter of application to your school as a chemistry teacher
Answer:
Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.
Write a basic notation for
[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]
Answer:
[tex]a = (b + c)/(2 * c)[/tex]
[tex]z = x/(y + c)[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Explanation:
Required
The expression in basic
To do this, we use () to group items, / as divide and * to combine factors
So, we have:
[tex](a)\ a = \frac{(b + d)}{2c}[/tex]
In basic, it is:
[tex]a = (b + c)/(2 * c)[/tex]
[tex](b)\ z = \frac{x}{y + c}[/tex]
In basic, it is:
[tex]z = x/(y + c)[/tex]
[tex](c)\ c = \frac{9c + 32}{5}[/tex]
[tex]c = (9 * c + 32)/5[/tex]
John wants to assign a value to the favorite sport variable:
favoriteSport = indoor soccer
However, he gets an error message. What does he need to change in order to make the code work?
Add a space between the words in the variable name
Create a longer variable name
Put quotation marks around the string literal
Omit the symbol in the string
Put quotation marks around the string literal
Jon wants to assign a value to the favorite sport variable: favoriteSport! = "indoor soccer" but gets an error message by Removing the exclamation mark from the variable name it will fix for the code to work.
In laptop programming, code refers back to the set of instructions, or a machine of rules, written in a selected programming language (i.e., the supply code).
If you've got ever observed an exclamation mark (!) earlier than the variable in a person's JavaScript code the negation operator (!) definitely simply reverses the means of its operand. ! is the logical now no longer operator in javascript.
Learn more about the javascript here:
brainly.com/question/27683041
#SPJ3
who invented pascaline and when?
Pascaline, also known as Pascal's calculator or arithmetic machine, was invented by [tex]\sf\purple{Blaise\: Pascal}[/tex] between [tex]\sf\red{1642\: and\: 1644}[/tex].
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
4. What are the things that a computer literate understands?name them
[tex]{\blue{OII}}[/tex]
[tex]{\green{TUDO}}[/tex] [tex]{\red{BEM ?}}[/tex]
The activities that the computer scientist develops Data structuring, development and design. CG. Numerical analysis and development of algorithms. Database management. CG.
[tex]{\red{TCHAU }}[/tex]
❤❤
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
can I play the game the last of us with this spec:
a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat
Answer:
5000 passcodes
Explanation:
5x10x10x10 = 5000
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
1. The purposes of traffic signs are
a. to direci, to decide, to stop.
b. to observe, to direct, to guide.
to stop, to warn, to decide.
d. to regulate, to warn, to guide.
Answer:
D. to regulate, to warn, to guide.
1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal
Answer:
1. Integrated circuit.
2. Smart card.
3. RFID.
4. Digital ink pen.
5. Electronic Paper Display.
6. Radio transceiver
Explanation:
1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.
2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.
3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.
4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.
5. Electronic Paper Display: display or sign with the ability to update the information electronically.
6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.
algo de La historia de los productos tecnologicos
Answer:
La tecnología se define como la suma de técnicas, habilidades, métodos y/o procesos utilizados y utilizados en la producción de bienes, productos o servicios, o para lograr objetivos clave de la investigación científica.
Precisamente, la tecnología se define como la aplicación del conocimiento científico con fines prácticos, especialmente en la producción industrial. Un significado secundario de la palabra se refiere al desarrollo de dispositivos y mecanismos con fines científicos y está directamente relacionado con las artes aplicadas, las ciencias aplicadas o la ingeniería. A veces se refiere a la metodología que caracteriza tal proceso. En los últimos años ha existido una tendencia a que el concepto se refiera únicamente a la alta tecnología y / o tecnología informática, aunque básicamente no se limita a estas áreas. Por ejemplo, tanto la Estación Espacial Internacional o una computadora pueden ser tecnología, también pueden ser un abridor de botellas estándar. A menudo, el objeto de la tecnología con beneficios prácticos no es el producto de la investigación científica, sino el resultado de un descubrimiento accidental.
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?
Answer:
Vulnerability scanner
You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.
What is a vulnerability scanner?Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.
A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.
If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.
To learn more about vulnerability scanners click here:
https://brainly.com/question/10097616
#SPJ12
When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoice line items for the month. But the sum of the sales produced by the query did not agree with the sum of the monthly sales revenue reported on the company's general ledger. This is best described as a problem with
Answer:
The correct answer is "Consistency".
Explanation:
It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.Thus, the above is the correct answer.
You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal
Answer:
Answer would be, PSTN (public switched telephone network)
i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))
Answer:
grade = int(input("What grade are you in?")
if grade == 9:
print ("Freshman")
elif grade == 10:
print ("Sophomore")
elif grade == 11:
print ("Junior")
elif grade == 12:
print ("Senior")
else:
print ("Invalid")
Explanation:
You fail to provide the complete code. So, I will rewrite the code from scratch
The complete question requires that the level is printed based on the input grade.
The code has been added in the answer section.
The explanation is as follows:
[Thus gets input for grade]
grade = int(input("What grade are you in?")
[If grade is 9, this prints Freshman]
if grade == 9:
print ("Freshman")
[If grade is 10, then level is sophomore]
elif grade == 10:
print ("Sophomore")
[If grade is 11, then grade is Junior]
elif grade == 11:
print ("Junior")
[If grade is 12, then level is senior]
elif grade == 12:
print ("Senior")
[All other inputs are invalid]
else:
print ("Invalid")
what can be the maximum possible length of an identifier 3163 79 can be of any length
Answer:
79 characters
Explanation:
The programming language is not stated, but a little search online shows the question is about python programming language
Literally, identifiers are the names given to variables, arrays and functions.
In most programming languages (e.g. python), identifiers are case-sensitive.
i.e. Abc is a different identifier when compared to abc.
Having said that, python allows up to 79 characters to name an identifier.
Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.
What is the purpose of "display:table"?
Answer:
Modern browsers use CSS to style all their markup.
How would they render a <table> element if CSS had nothing that could express the appearance of one?
(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).
They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.
You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width
como se llama el arte de pintar en las cuevas sus actividades de caceria
Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File
Answer:
Explanation:
1.Save and Save As
The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name
2.Blank Document and Template
Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template
3. Existing File and Recently Open File
Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced
it.
True
Оr
False
Answer:
False
Explanation:
Digital learning tools are nowadays used In Education. Countries like Japan, China, India and Korea use computers and internet in their educational system.
Hope it helps!
Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:
Answer:
Families are systems
Explanation:
first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.
6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned
1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.
Answer:
The SQL queries are as follows:
1. select * from customer
select * from sale
select * from product
2. select name, sex from customer
3. select * from customer where sex = 'male'
4. select name, age from customer where sex = 'male'
5. select name, price, color from product
Explanation:
Given
Tables: customer, sale, product
Required
Answer question 1 to 5
(1) All data in the given tables
To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.
So, we have:
select * from customer --> This lists all data from customer table
select * from sale --> This lists all data from sale table
select * from product --> This lists all data from product table
(2) Selected details from customer table
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, sex from customer
(3) Male customers
In (1), we have:
select * from customer --> This lists all data from customer table
To retrieve male customers, we introduce the where clause
So, we have:
select * from customer where sex = 'male'
(4) Name and age of male customers
In (3), we have:
select * from customer where sex = 'male'
To retrieve the name and age, we replace * with name and age. So, we have:
select name, age from customer where sex = 'male'
(5) Name, price and color of products
In (1), we have:
select * from product --> This lists all data from product table
To retrieve selected details, we replace * with the field names.
So, we have:
select name, price, color from product
Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759
Answer:
The program is as follows:
total = 0
for i in range(3,67,3):
total += i
print(total)
Explanation:
This initializes the sum of the series to 0
total = 0
This iterates through the series with an increment of 3
for i in range(3,67,3):
Add up all elements of the series
total += i
Print the calculated sum
print(total)
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____
Answer:
That would be Bluetooth
Explanation:
As Bluetooth is the most widely used network. It is used to operate many things, such as:
Headphones
Speakers
Remotes
etc.
A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
Group of answer choices.
A. It can communicate with networks inside a particular company with subnets.
B. It can communicate on the local network as well as on the Internet.
C. It has a public IP address that has been translated to a private IP address.
D. It cannot communicate outside its own network.
Answer:
D. It cannot communicate outside its own network.
Explanation:
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.
When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.
Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.
Human Resources can be classified into four groups namely________, ________, _______ and _____________.
A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz
Answer:
Option D
Explanation:
Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.