como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

Answer 1
shsibdhebduduebsisodbduei



Related Questions

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

Answers

Answer:

Answer would be, PSTN (public switched telephone network)

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Answers

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759

Answers

Answer:

The program is as follows:

total = 0

for i in range(3,67,3):

   total += i    

print(total)

Explanation:

This initializes the sum of the series to 0

total = 0

This iterates through the series with an increment of 3

for i in range(3,67,3):

Add up all elements of the series

   total += i

Print the calculated sum    

print(total)

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

a computer takes a lot of time to do complex calculation​

Answers

Question:

A computer takes a lot of time to do complex calculation.

Answer:

False!

Hope it helps you

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?

Answers

Answer:

There must be a  proxy server that is not allowing access to websites

Explanation:

A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

7. The message on a diamond-shaped sign might be
a. Pass With Care, Trucks Use Right Lane, or
Do Not Pass.
b. Curve, Hill, or Winding Road.
One Way, Wrong Way, or No Trucks.
d. No Turn, Speed Zone Ahead, or Left Lane
Must Turn Left.

Answers

Answer:

a. pass with care, trucks use right lane, or do not pass

you press the F9 key to convert an object to a symbol true or false​

Answers

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol

A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.

Answers

Explanation:

oi.........................

i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned​

Answers

They are all bold and what ever else

What is the correct order or a technological system?

A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output


POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help

Answers

Answer

C

Explanation:

In a system you have to send on input data, then the application processes it and then it returns your output

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

Cuando se introduce una fórmula en una celda primero que hay que introducir es

Answers

Answer:

El signo =.

Explanation:

La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.

Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.

can I play the game the last of us with this spec:​

Answers

No . Take my advice
no the cpu is not powerful enough to support a game

#include

int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);

return 0;
}
whats the error not giving the correct output

Answers

Answer:

#include<studio.h>

#include<conio.h>

void main()

{

char ch;

printf("Enter any letter");

scanf("%c",&ch);

Human Resources can be classified into four groups namely________, ________, _______ and _____________.

A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz

Answers

Answer:

Option D

Explanation:

Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.

What is the purpose of "display:table"?

Answers

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width

Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist

Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.

Pseudocode & Python

Answers

Answer:

user_input = [int(input()) for i in range(20)]

even = []

odd = []

for i in user_input:

if i%2:

even.append(i)

else:

odd.append(i)

print("odd : ", len(odd), "even : ", len(even))

Explanation:

The above code is written in python :

Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.

Two empty list are defined, even and odd which is created to store even and odd values.

A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.

Other Questions
What did the 15 European countries who met at the Berlin Conference in 1884determine? What do you know about the hypotenuse of triangle abc Una muestra de S2 (g) se coloca en un recipiente rgido vaco a 800 K y sta ejerce una presin inicial de 0,92 atm, luego se combina para formar S8 (g) mediante la reaccin: S2 (g) S8 (g) Una vez alcanzado el equilibrio, la presin parcial de S2 (g) ha disminuido a 0,18 atm. Calcule Kp para la reaccin a esta temperatura ____ more than 3455 is two hundred seventy -eight thousand five hundred eighty three please helpthank you!have a nice day! Mother and Daughter Enterprises is a relatively new firm that appears to be on the road to great success. The company paid its first annual dividend yesterday in the amount of $.28 a share. The company plans to double each annual dividend payment for the next three years. After that time, it is planning on paying a constant $1.50 per share indefinitely. What is one share of this stock worth today if the market rate of return on similar securities is 11.5% how can we consider recreational and fun games as a form of fitness A simple random sample of students could be achieved by stopping every other student who enters the library.a. Trueb. False Ken Jones, an architect, organized Jones Architects on April 1, 20Y2. During the month, Jones Architects completed the following transactions: Transferred cash from a personal bank account to an account to be used for the business in exchange for Common Stock, $30,000. Purchased used automobile for $20,000, paying $4,500 cash and giving a note payable for the remainder. Paid April rent for office and workroom, $3,000. Paid cash for supplies, $1,440. Purchased office and computer equipment on account, $6,000. Paid cash for annual insurance policies on automobile and equipment, $2,000. Received cash from a client for plans delivered, $7,500. Paid cash to creditors on account, $1,740. Paid cash for miscellaneous expenses, $375. Received invoice for blueprint service, due in May, $1,000. Recorded fees earned on plans delivered, payment to be received in May, $5,200. Paid salary of assistant, $1,600. Paid cash for miscellaneous expenses, $810. Paid installment due on note payable, $240. Paid gas, oil, and repairs on automobile for April, $390.Required:Record the above transactions in T accounts. defined Snell's law Identify the transformation that occurs to create the graph of h(x). H(x)=f(x+3) Answer to this problem Explain why it is not advisable for two sickle cell carriers to marry. The economic term that describes the satisfaction that consumers gain from consuming goods and services is What is the difference between food chains and food webs?1. Food webs show the flow of energy from producers to consumers, and food chains show the flow of energy from consumers to producers.2.Food chains show a single path of energy in an ecosystem, and food webs show overlapping pathways of energy in that ecosystem.3.About ten percent of the energy is passed on to the next trophic level in food webs, but in food chains, about ninety percent is passed on to the next trophic level.4.Heat is lost when energy is passed on to the next trophic level in food chains, but in food webs, heat is not lost when energy is passed on to the next trophic level. similarities and differences between distance education and non formal education De qu manera se relacionan la antigedad clsica con el humanismo y el renacimiento? ayuda es para hoy :( You often get phone calls,______? question tag PLEASE HELP! Given the inequality y Choose the correct answers for (a) the total installment price, (b) the carrying charges, and (c) the number of months needed to save money at the monthly rate to buy the item for its cash price.A bunk bed with a cash price of $1,998, at $143 per month for 15 months