Answers

Answer 1

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.


Related Questions

4 effect by which we can see several keyframes at once is
a. Onion Skin b. Layer Effect o c. Timeline Effect
5. You can control the speed of animation by increasing or decreasing the value in
a. Timeline a b. Fps Box O ㅁ c. Tools Panel
Write T for True and 'F' for False statements.
1. Pencil2D has autosave option for saving your work after every few minutes
2. The source code of Pencil2D is not available for users.
3. You cannot erase unwanted part of object or drawing on the stage 4. Hand tool is used to quickly move different parts of the stage. 5. Bitmap layer is used for raster graphics, which is made up of pixels.
Fill in the blanks.
1. Pencil2D is used to create animation using and graphics
2. The big white rectangle in the middle of your screen is called the
3. The is used to mark current frame displayed on the stage.
4 You can a layer to clearly identify it in the timeline.
5. Frame is the little in the Timeline, in which we create an image
6. You can fill color in your enclosed drawing or shape with tool.​

Answers

Onion skin
Onion timeline stage

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

full form of ip ........?​

Answers

internet protocol - hope this helps!

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario

Answers

DDoS hope this helps :3

Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
teaching a science course. He wants to make sure students who do not have PowerPoint can still view the
presentation. Reed is teaching a math course online. He finds the students are very visual and wants to control the
timing per slide
Which best describes how each teacher handled their presentations?
O Tristen created handouts, Wyatt saved as a PDF, and Reed saved as a video
O Tristen created a video, Wyatt saved as a PDF, and Reed broadcasted.
O Tristen created handouts, Wyatt saved as a video, and Reed saved as a PDF.
O Tristen created a video, Wyatt broadcasted, and Reed saved as a video

Answers

Since Tristen want her students to take notes on her presentations, she should have some sort of handout.

Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.

Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.

Thus, A is the best choice.

The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.

The program uses methods to:

1) get the numbers entered by the user all on one line separated by spaces;

2) calculate the average of the numbers entered by the user; and

3) print the results.

The first method should take no arguments and return a String of numbers separated by spaces.

The second method should take a String as its only argument and return a double (the average).

The third method should take a String and a double as arguments but have no return value.

IF user input is: 20 40 60 80 100

Answers

Answer:  

import java.util.Scanner;  

public class AverageDemo

{  

public static String getNumbers()

{

 

 String numbers;  

 Scanner scn = new Scanner(System.in);  

 System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");

 numbers = scn.nextLine();

 return numbers;

}  

public static double calcAverage(String numbers)

{

 String[] values = numbers.split(" ");

 double total = 0;  

 for (int i = 0; i < values.length; i++)

 {

  total += Integer.parseInt(values[i]);

 }  

 if (values.length == 0)

  return 0.0;

 else

  return (total / values.length);

}  

// Method definition of printResults: print the results

public static void printResults(String numbers, double average)

{

 System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);

}  

// main method

public static void main(String[] args)

{

 // Call the methods

 String numbers = getNumbers();

 double average = calcAverage(numbers);

 printResults(numbers, average);

}

}

Output:

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

20 points!!!!! Plz answer quickly

Answers

Answer:

other words are not clear

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

if ur computer is runing slowly what is most likey to slove the problem

Answers

One way to solve this problem is if you clear up some storage space. On my computer things were running very slowly and I checked my storage and it was beyond full. Another way would be to clean up your hard drive, run some virus and malware scans as your computer may have some viruses that would be slowing it down. Some others ideas are to download more memory on your computer, install a faster hard drive, and reinstall or upgrade your operating system. I hope this helps!!
Reboot the device or clear your cache. Maybe it may need to go to a shop as well and get a few parts switched out

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

tiền tệ ra đời là kết quả

Answers

bruuh, wht is this man saying

Money was born as a result?

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Other Questions
(riddle) Why can't someone living in kathmandu be buried in pokhara? Which statement best describes the arrangement of electrons in an atom of fluorine (F)?(1 point) giving brainliest for sure There are two electrons in the first energy level and seven electrons in the second energy level.There are two electrons in the first energy level and five electrons in the second energy level.There are five electrons in the first energy level and two electrons in the second energy level.There are seven electrons in the first energy level and two electrons in the second energy level. If h(x) = x2-5x + 7 find: h(-8) PLEASE HELP PLEASE!!!! AB||CD . Find the measure of BFG. Find the equation of the line that is parallel to f(x) and goes through point (-1,7). Choose the correct statements about the ROC curve.A. By plotting the true-positive rate against the false-positive rate for different threshold values, the ROC curve can be used to select the optimal model.B. ROC stands for Receiver Operating Characteristic curve, which was originally developed to detect enemy aircrafts on radar.C. The ROC curve is a useful diagnostic tool for determining the optimal classification model.D. The ROC curve was originally developed to optimize healthcare and detect congestive heart failure readmission rate. Look at the graph shown.Which equation best represents the line? (4 points)y = 1 over 3.x 1y = 3x 1y = x + 1 over 3.y = 3x + 1 a. What is energy? Write its unit. subject science What does Johnny mean when he says Stay gold, Ponyboy? how many square metres of floor are there in a room of 6 metres ig something like that MUST BE IN PRESENT PERFECT OR PAST PERFECT!!!!!!!! Historia del mar due August 5th 11:59 PM CDTCompleta el siguiente artculo de enciclopedia con los verbos conjugados en el presente perfecto o el pluscuamperfecto.En diciembre de 1872, la tripulacin del barco Dei Gratia encontr en el ocano Atlntico al barco Marie Celeste. Navegaba atoda velocidad, pero no haba gente.Un mes antes, el Marie Celeste (1) (salir) de Nueva York hacia Gnova. Llevaba alcoholindustrial. Cuando la tripulacin del Dei Grotio lo encontr, (2)(desaparecer) toda latripulacin. El bote salvavidas y otras cosas (3)(desaparecer) tambin, perqel alcohol estabaall. Nunca pudieron saber qu pas.Desde entonces, la gente (4)(5)(6)ms famosas historias del mar.(dar) muchas explicaciones sobre el hecho. Algunos(decir que la tripulacin dej el barco porque crey que iba a hundirse. Otros(contar) historias exticas. La desaparicin de la tripulacin del Marie Te es una de las In your opinion, what factors lead to succes Bill Johnson, sales manager, and Diane Buswell, controller, at Current Designs are beginning to analyze the cost considerations for one of the composite models of the kayak division. They have provided the following production and operational costs necessary to produce one composite kayak.Kevlar $250 per kayakResin and supplies $100 per kayakFinishing kit (seat, rudder, ropes, etc.) $170 per kayakLabor $420 per kayakSelling and administrative expensesvariable $400 per kayakSelling and administrative expensesfixed $119,700 per yearManufacturing overheadfixed $240,000 per yearBill and Diane have asked you to provide a cost-volume-profit analysis, to help them finalize the budget projections for the upcoming year. Bill has informed you that the selling price of the composite kayak will be $2,000.(a) Calculate variable costs per unit. Variable cost per unit $Bill Johnson, sales manager, and Diane Buswell, co (b) Determine the contribution margin per unit. Contribution margin per unit $Bill Johnson, sales manager, and Diane Buswell, co (c) Using the contribution margin per unit, determine the break-even point in units for this product line. Break-even point Bill Johnson, sales manager, and Diane Buswell, co units(d) Assume that Current Designs plans to earn $270,600 on this product line. Using the contribution margin per unit, calculate the number of units that need to be sold to achieve this goal.Number of units Bill Johnson, sales manager, and Diane Buswell, co units(e) Based on the most recent sales forecast, Current Designs plans to sell 1,000 units of this model. Using your results from part (c), calculate the margin of safety and the margin of safety ratio. (Round margin of safety ratio to 1 decimal place, e.g. 25.5%.)Margin of safety $Bill Johnson, sales manager, and Diane Buswell, co Margin of safety ratio Bill Johnson, sales manager, and Diane Buswell, co%By accessing this Question Assistance, you will learn while you earn points based on the Point Potential Policy set by your instructor.(a) Calculate variable costs per unit.Variable cost per unit $Bill Johnson, sales manager, and Diane Buswell, co(b) Determine the contribution margin per unit.Contribution margin per unit $Bill Johnson, sales manager, and Diane Buswell, co(c) Using the contribution margin per unit, determine the break-even point in units for this product line.Break-even point Bill Johnson, sales manager, and Diane Buswell, co units(d) Assume that Current Designs plans to earn $270,600 on this product line. Using the contribution margin per unit, calculate the number of units that need to be sold to achieve this goal. Number of units Bill Johnson, sales manager, and Diane Buswell, co units(e) Based on the most recent sales forecast, Current Designs plans to sell 1,000 units of this model. Using your results from part (c), calculate the margin of safety and the margin of safety ratio. (Round margin of safety ratio to 1 decimal place, e.g. 25.5%.)Margin of safety $Bill Johnson, sales manager, and Diane Buswell, coMargin of safety ratio Bill Johnson, sales manager, and Diane Buswell, co% What is the median for the set of data? 6, 7, 10, 12, 12, 13 Answer choices:6710121213 Find two numbers nearest to 8888888 which are exactly divisible by 2915 explain step by step A police officer investigating a car accident finds a skid mark of 115 ft in length.How fast was the car going when the driver hit the brakes?Round your answer to the nearest mile per hour. mph Help me please.. List the sides of the triangle in order from largest to smallest. What's 672 divided by 32 20 points!!!!! Plz answer quickly