Answer:
Offer second chances/clean slates.
Be resourceful.
Make learning active.
Be an advocate.
Pursue lifelong learning.
Answer:
hi how are you
Explanation:
List three features of the third generation of computers
Explanation:
Features:
1.They were small and efficient than previous generation.
2.They use integrated circuits as main electronic circuit.
3.The operating speed was increased unto nano seconds.
Hope it helps and have a good day.
Compare an electric circuit to a river flowing with water. Which of the following could appropriately be considered a source?
a spring
a place where two rivers join
an ocean
an island
Answer:
a spring.
Explanation:
An electric circuit can be defined as an interconnection of electrical components which creates a path for the flow of electric charge (electrons) due to a driving voltage.
Generally, an electric circuit consists of electrical components such as resistors, capacitors, battery, transistors, switches, inductors, etc.
This electrical network which is usually a closed loop comprises of a device that provides the energy (voltage) to drive electrons or electric current; the device is referred to as a source such as a generator or battery.
Springs are points from which water naturally seeps from the ground. A spring is the original point or most common type of source from which a river flows or begin its journey.
This ultimately implies that, a spring serves as a source to a river flowing with water while a battery or generator serves as a source to an electric circuit with current flowing through it.
Hence, if we compare an electric circuit to a river flowing with water, a spring is considered to be a most likely source to the river.
in remote areas,your gps device may lose reception. its good idea to have a
Answer:
map or compass or follow a trail so you don't get lost
Explanation:
The photograph shows a way individuals work together in groups a the photograph
Answer:
D. AdministratorsExplanation:
Hope it helps
#CarryOnLearning
Item 3
Which of the following describes new technology development?
A harmless process
A somewhat assured process
A partially risky process
A very risky process
Answer:
A somewhat assured process
B. A somewhat assured process is describes new technology development
What are the five phases in technology development process?Five phases guide the new product development process for small businesses: idea generation, screening, concept development, product development and, finally, commercialization.
What is technology development process?Technology Development Process, is a directed process at developing new knowledge, skills and artefacts that in turn facilitates platform development
To learn more about new technology development, refer
https://brainly.com/question/27090068
#SPJ2
List two building techniques or materials that should be considered if you are building in Tornado Alley.
Which of the following is the best example of a way in which a programmer can use abstraction to manage the complexity of a program?
Replacing each instance of repeated code with a call to a procedure
Replacing longer variable names with shorter variable names to reduce typing errors
Replacing several lines of documentation with a single line of documentation
Replacing lists with individual variables
The best example of a way in which a programmer can use abstraction to manage the complexity of a program is to Replacing longer variable names with shorter variable names to reduce typing errors.
Why the replacement?The act of Replacing longer variable names with shorter variable names to reduce typing errors is very important.
Conclusively, in any programming, to handle the complexity of a program, on can Replace the string variables such as name1, name2, name3, and name4 with the use of list of strings known as the shorter form called names.
Learn more about programmer from
https://brainly.com/question/23275071
Which generation experienced a generation gap?
A.
the boom generation
B.
the silent generation
O C.
Generation X
D.
the millennial generation
Answer:
B. Baby boomers (the boom generation)
Explanation:
They went against everything their parents said. Also I took a test on it and got it right.
PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because
A.The introduced species compete for resources more effectively than native species
B.These introduced species will require more land to be protected
C.Introduced species often become endangered when they are placed in a new habitat
D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat
Answer: A.The introduced species compete for resources more effectively than native species.
Explanation:
An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.
When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.
Therefore, the correct option is A.
Complete the statement about WYSIWYG editors when you use a WYSIWYG editor you typically specify the continent and blank A.layout B.Html Code C. Meta tags while the editor generates the blank A.layout B. Html code C. Meta tags
Answer:
When you use a WYSIWYG editor you typically specify the content and layout while the editor generates the HTML code
Explanation:
Required
Complete the blanks
In WYSIWYG, the user of the application provides contents to the WYSIWYG software and also designs the appearance; The appearance is referred to as the layout.
Throughout the design, the user will not use HTML codes; it is the duty of the WYSIWYG editor to generate HTML code based on the input designs by the user.
The syntax for ________ requires you to use a colon after every if statement and while loop.
Java
Boolean
Python
programming
Hey does anyone think nervegear would be possible? (Just asking)
Answer:
Depends
Explanation:
Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.
Answer:
No, the Nerve Gear cannot be possible at the moment. However, in Japan, they are creating the Nerve Gear and is to be released in May 2022 told by the creator, Kayaba Akihiko. So, the Nerve Gear cannot be possible in 2020 but in 2022. We just have to wait for two more years.
Explanation:
please choose me as brainliest if that is ok ;)
45 Points!
This topology will require the most cabling to connect its five computers and two peripherals-the scanner and the fax.
- mesh
- bus
- star
- ring
Answer:
I think D but I'm not sure
what would be the most constructive response
Answer:
we cant tell what your talking abt please repost with at pitcher or a exolination
Explanation:
Edhesive 8.3 lesson practice pls help
Answer:
String data type
Explanation:
See attachment for complete question
Required
Data type in stuff
On line 1 of the program, stuff is initialized as an empty list.
Line 2 to line 4; some elements are appended into stuff list
These elements are written in quotes
In programming, when an expression is written in quotes, such expressions are referred to as strings.
Hence, the elements stored in stuff are string datatypes
The data types in the elements "stuff" are string datatypes
What is strings data type?String data type are data types in programming which is used when an expression is written in quotes(" ").
What is programming?Programming can be defined as process of building or designing a computer program. It involves building computer instructions or algorithm and the use of the instructions to perform a particular task.
There are different types of programming language:
JavaJavaScriptPHPSQLpythonRubySwiftLearn more about programming:
https://brainly.com/question/16397886
HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.
1. In Access, click Open on the File tab.
2. Select the database.
3. Click the drop-down arrow to the right of Open, and click
.
4. Click the File tab.
5. Click
, and select Encrypt with Password.
6. Enter a password when you are prompted
. Click OK.
7. Close and reopen the database.
8. To open the database again, you will need to
.
Answer:
1. Open Exclusive
2. Info
3. twice
4. enter a password
Explanation:
In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password
Which view is opened when File tab is clicked?The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.
Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.
Learn more about password from
https://brainly.com/question/17174600
#SPJ2
ced-vfrj-yiu
ev.eyo.ne joi.n.thro.ugh goog.le m.eet
Answer:
n.o
Explanation:
n.o.
compare and contrast the typewriter with that if the computer keyboard pls help omg
Answer:
Typewriters use paper and ink
and computers keyboards is an electroic typing
Explanation:
How can users open a shared worksheet if they do not have Excel installed on a computer? visit Microsoft’s website use Office365’s home page open a PDF version for editing use Excel Online through the 365 portal
Answer:
use Excel Online through the 365 portal
Explanation:
just did it
Computer networks can consist of as few as computers.
Options are: 5, 10, 2, & 3
Answer: 2
Explanation:A computer network is a set of computers that are connected together.
Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be, I just want to hear other people's comments on this. (Beatless)
Answer:
Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.
Explanation:
please mark this answer as brainliest
A free open source audio editing software program is
A. Sound Forge.
B. Pro Tools.
C. iTunes.
D. Audacity.
D. Audacity
،،،،، ،،،،،،،،،،
A free open source audio editing software program is Audacity. Thus, option D is correct.
What is audio editing?The audio editing is given as the change in the audio, volume, with the length, speed of the audio or other manipulations. The audio editing is performed with the use of the software in the computer that enables the generation of the audio data.
The three types of audio editing techniques involves:
Sound Forge: It mediates the edit in the sound files with playback.
Audacity: It is a free software that has been used for long with multi-track audio editor and recorder.
Pro Tools: It enables the use of the view and edit of the track.
Therefore, A free open source audio editing software program is Audacity. Thus, option D is correct.
Learn more about audio editing, here:
brainly.com/question/24228690
#SPJ3
Has the human population reached its carrying capacity? How do you know?
Answer:
..
Explanation:
.
Consider the following code segment.
int a = 3 + 2*3;
int b = 4 + 372;
int c = 7 % 4 + 3;
double d = a + b + c;
I
What is the value of d after the code segment is executed?
Answer:
20.0
Explanation:
3+2*6 = 9
4 + 3/2 = 5.5 but, since b is an int value, it will round down to a 5
7%4+3 = 3 +3 = 6. the % symbol will give the remainder of the quotient
9 + 5 + 6 = 20. It becomes 20.0 because d is a double value.
The value of d after the code segment is executed is 391.0
How to determine the value of d?To do this, we evaluate the code statements one after the other.
So, we have:
int a = 3 + 2*3;
This gives a = 9
int b = 4 + 372;
This gives b = 376
int c = 7 % 4 + 3;
This gives c = 6
For double d = a + b + c;
Substitute a = 9, b = 376 and c = 6 in d = a + b + c;
So, we have:
d = 9 + 376 + 6
Evaluate the sum
d = 391.0
Hence, the value of d after the code segment is executed is 391.0
Read more about computer programs at:
https://brainly.com/question/23275071
One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed. Since all files are contiguous, copying a
file squires a seek and rotational delay to read the file, followed by the transfer at full speed. Writing the file back requires the same work. Assuming a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and an average file size of 8 KB, how long does it take to read a file into main memory and then write it back to the disk at a new location? Using these numbers, how long would it take to compact half of a 16-GB disk?
Answer:
The answer is below
Explanation:
a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB
Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec
The time required to read and write is twice the sum of the seek and transfer time.
Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec
b) half of 16 GB = 8 GB = 8000000 KB
number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000
Transfer rate = 8 MB/sec = 0.008 GB/sec
Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec
Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec
Write a program to create a list of numbers in the range of 1 to 10. Then delete all the even numbers from the list and print the final list.
2. You go to an intemet cafe to send an email to your friend upon returning home you
realize that you forgot to log out your account. What probably could happen to your
account?
Pueden cojer los datos privados hackear la cuenta
Need answer ASAP I’ll mark brainliest if correct
How can you create a class without any methods, yet call a method from that class?
The class can___ methods from another class
print a test page what is the answer.
Answer:
The keys "Ctrl" and "P"
jdr-wivg-vmb
co.me a.nd jo.in fa.st...
go.ogle me.et
Explanation:
what is this don't post like this