Answer:
3d modeling enhances animation in many ways.
Explanation:
The first and most obvious way is shadows. When 3d modeling your able to cast more detail shadows then compared to 2d.
You are going to create multiple functions that will take in the appropriate measurements as parameters and calculate the area of the specific shape.
The following shapes must be included:
Square, Triangle, Circle, and Trapezoid
Feel free to add on more shapes if you want!!
Answer:
circle
Explanation:
Answer:
circle
Explanation:
A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.
Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
DISPLAY(numFreezing/numDays)
}
B.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
C.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp < 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
D.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
numDays ← numDays + 1
}
}
DISPLAY(numFreezing/numDays)
Answer:
B.
Explanation:
The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
decimal numbers is equivalent to binary 110
Answer:
yes it is
Explanation:
binary number is 1101110
A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weights and heights are listed in columns. Emily needs to determine the maximum weight of the dog breed in row 43. Which tool could she use to quickly navigate to the information?
Answer:
a. Locate
Explanation:
Question options (obtained on the net):
a. Locate
b. Sort
c. Filter
d. Replace
Explanation:
The largest value of the weights of the dog breed in row 43 is the maximum weight of the dog breed in the row
The 'MAX' formula or the 'Autosum' tool can be used to give the largest value in a row, or column
To locate the maximum value in MS Excel, the ADDRESS and MATCH and MAX functions are combined and entered into the blank cell on the right, specifying the same range for the MAX and MATCH functions, and a '0' for the MATCH function as well as a '1' for the ADDRESS function as follows;
=ADDRESS(MATCH(MAX(A1:E1), A1:E1, 0), 1)
Therefore, to navigate to the maximum weight, Emily should use a locate(ing) tool navigate to the information on the spread sheet
Answer:
A. Locate
Explanation:
E2020!
Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.
Answer on https://pastebin.com/raw/nHzXvbPP
Why does brainly always say, "We're sorry, but we are not able to complete your registration at this time"?! Now I cant view any answers to any questions!
Answer and Explanation:
It's very likely a network issue. You could do a hard refresh on your browser or brainly app. Simply clear your application's cache or your browser data or cache and then try again. You could also try re-installing your app. If this doesn't work, please reach out to the Brainly customer support team for help.
Which option is not available in the Presenter view of a presentation?
Group of answer choices.
A. Next Slide Preview
B. Pen/Laser Pointer tools
C. Open Slide Show
D. Navigation Controls
Answer:
C. Open Slide Show
Explanation:
PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.
Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.
Basically, the views that are available on the Microsoft PowerPoint application includes;
1. Slide Sorter.
2. Notes Page.
3. Reading Pane.
4. Presenter view.
Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.
Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;
I. Next Slide Preview.
II. Pen/Laser Pointer tools.
III. Navigation Controls.
However, Open Slide Show is an option which is not available in the Presenter view of a presentation.
Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining platform designed for storing and analyzing big data produced by web communications and transactions. high-speed platform used to analyze large data sets pre-configured hardware-software system designed for analyzing big data. NoSQL database technology that stores both data and procedures acting on the data as object
Answer: open-source software framework designed for distributing data-processing over inexpensive computers.
Explanation:
Hadoop refers to the collection of open-source software utilities which are important in facilitating the use of a network of several computers to solve big data.
It provides huge storage for different kinds of data, and the ability to handle concurrent tasks virtually. Therefore, the correct option is "open-source software framework designed for distributing data-processing over inexpensive computers".
Select the four bad password ideas.
A) lists of numbers in order, such as 1234
B) your name or your child's name
C) the word "password"
D) an inside joke you have with yourself
E) the name of the website
F) strings of random numbers
Answer:
the word "password", the name of the website, lists of numbers in order, such as 1234, your name or your child's name
Answer:
A,C,E,B
Explanation:
Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?
Answer: Rainforest
Explanation:
A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.
Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.
list any three positive impacts of computer technology in our society?
Answer:
nWhich statement about the origins of the American population is true?
A most Americans descend from people who first populated this continent about 20,000 years ago
b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s
c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then
d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves
Explanation:
sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs
Realiza una tabla acerca de los escenarios de usos más comunes de Excel.
Answer:
Microsoft Excel es una hoja de cálculo producida por Microsoft. La aplicación es ampliamente utilizada en empresas e instituciones, así como por usuarios domésticos. Su uso principal es realizar cálculos (por ejemplo, gastos) compilados en forma tabular. Para este uso, se aplican numerosas funciones matemáticas, financieras y de base de datos disponibles en el programa. La duplicación semiautomática de las fórmulas creadas con el uso de diferentes variantes de direccionamiento (direccionamiento relativo, direccionamiento absoluto, direccionamiento mixto) también es de gran importancia. Microsoft Excel también se utiliza para crear muchos tipos de gráficos, útiles, entre otros, en física, matemáticas y economía. También incluye un sistema para la elaboración de informes utilizando el llamado tablas dinámicas, utilizadas en la realización de análisis comerciales.
what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super
Answer:
B: micro
Explanations
a small computer that contains a microprocessor as its central processor.
Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses
Answer:
1. Comment
2. Five (5).
3. Line.
4. Tuple; that
Explanation:
1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.
2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.
3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.
4. A tuple consists of key-value pairs
that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").
help please I would really appreciate
Answer:
the answer is address bar
Answer:
This is called an address bar
Explanation:
It tells your computer where to send the data and what website you are trying to communicate with.
:)
Why is computer called information processing maching???
☆ Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).
HOPE IT HELPS ❣️
Answer:
Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.
Explanation:
You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.
Answer: D
Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.
Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432
Answer:
The Logitech ones.
Explanation:
Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.
An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?
Answer:
You should use an "if" statement to check whether the number is greater than 18 or less than 65.
Explanation:
You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!
A file format refers to the background in a presentation.
True
False
Answer:
False
Explanation:
Required
Describe file format
Literally, file format means file extension and it describes the type of file.
For instance:
. d o c is a file format of word documents
. j p g is a file format of images
etc.
Hence, the statement is false
Answer: The answer is false
Explanation: File formats are linked to certain programs
Select three advantages of cloud computing.
A) large amount of storage capacity
B) no Internet access required
C) great flexibility
D) enhanced security
E) easily managed
Answer:
easily managed, large amount of storage capacity, great flexibility
Explanation:
Can someone please type a code that makes a house in python and turtle graphics i need help
Answer:
import turtle
turtle.speed(2)
#shape
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
turtle.left(45)
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
turtle.left(45)
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
#door
turtle.left(90)
turtle.forward(50)
turtle.left(90)
turtle.forward(25)
turtle.left(90)
turtle.forward(50)
#windows
turtle.penup()
turtle.right(90)
turtle.forward(20)
turtle.right(90)
turtle.forward(20)
turtle.pendown()
turtle.forward(25)
turtle.left(90)
turtle.forward(40)
turtle.left(90)
turtle.forward(25)
turtle.left(90)
turtle.forward(40)
Explanation:
:)
In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.
Answer:
The answer is "Authentication"
Explanation:
The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.
This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.
3 Negative ways of using the Internet
Answer:
1. It rots the mind of children
2. It's to too addicting
3. can show bad things.
Explanation:
Some help me with this I’ll mark brainleist
Answer:
made by apple - final cut studio
sound editing software compatible with both windows and mac - audacity
simple too - garage band
Explanation:
list five function key
list two alphabet key
byEmmanuel okorie
Explanation:
Function keys:F1,F2,F3,F4
Alphabetic keys H,A
describe the uses of computer in different fileds? please help me
Answer:
Computers are used to perform several industrial tasks. They are used to design products, control manufacturing processes, control inventory, manage projects, and so on. Computers are used to control and manage different manufacturing systems and continuous running of the industry.
Recently mobile phones have been used to pay for goods in stores and supermarkets.
One methodof payment involves holding the phone close to a reader in the store.Discuss the advantages and disadvantages of this method of payment compared with other methods of credit/debit card transactions.
Answer:
The advantages of using mobile phones to pay for goods in stores are;
1) The ability to pay for goods and/or services without having to carry a physical wallet, thereby making payments faster, more convenient, and safer as the contents of a money wallet or purse cannot be seen
2) The generation of security codes for each transactions, the use of PIN input and finger sprint scanning for payment, ensures access to payment authorization is limited and requires definitive authentication and that payment transactions will not need to be scrutinized by merchants to detect fraudulent transactions
3) Paying with the mobile phone increases privacy as the card used for payment will be known only to the person doing the payment, thereby a person can use a credit card with low limit without displaying them
The disadvantages of using mobile phones to pay for goods in stores includes;
1) The possibility of breach in security of the mobile phone during payment. Sensitive information of the mobile phone can be collected during payment and then used in other places without the permission of the owner of the phone
2) Mobile phone payment may not be suitable to people who prefer card or cash payment
3) The different mobile phone payment applications and platforms are not entirely compatible and can lead to payment challenges
Explanation:
Select the three reasons that the gaming industry is set to grow.
A) more colleges offering jobs in game design
B) a decrease in the average age of gamers
C) an expanding market on mobile phones
D) expanding markets in Asia
E) new accessories that will attract more players
Answer:
expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones
Explanation:
What is the main device used on fourth generation computer
Answer: Microprocessors were used to create the fourth generation of computers. In 1971, Intel built the first microprocessor, the 4004 chip.
Explanation: The microprocessor is a silicon chip with millions of transistors built using LSI and VLSI technologies.
hope this helps best of luck mate! :)