i will mark brainalist! ​

I Will Mark Brainalist!

Answers

Answer 1

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer 2

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:


Related Questions

Convert
1. 116° to K
2. -39° to K
3. 450K to C° ​

Answers

1 389.15 kelvins
2 234.15 kelvins
3 176.85 degrees celsius

What features in Excel are the same as in Word?
What features are differ?

Answers

Answer:

Following are the difference and similarity between word and Excel:

Explanation:

The similarity in word and excel:

The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the  Spreadsheet (tablet program).  In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.

The difference in word and excel:

In a word, it includes an application for text processing, and excel would be used for the tablet program.  The word is used to create documents like assignments file data files,  while excel is being used for the manipulation of numbers by mathematical equations.

IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID

Answers

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase

Answers

Answer:

When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.

Explanation:

Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?

Answers

Answer:

A wand tool is to do that in an editing software.

Answer: Peter should use the burn tool

Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.

Answers

Answer:

The correct option is;

IT refers to everything that involves computers

Explanation:

Information technology (IT) are technology related to computing or computing systems

Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.

The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by dividing the list of items to be sorted into smaller subsets. The pivot is the mechanism that is used to segment the list. Describe how the quicksort works including a discussion of the pivot, how it is selected, and why the pivot is important to the quicksort.

Answers

Answer:

The quicksort pivot is an arbitrary element within the collection that is being sorted.  Using the pivot point, the collection of elements is partitioned into two smaller lists of elements.  Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point.  Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.

Cheers.

The pivot of a quicksort algorithm ought to always be the element in the middle. Some algorithms will choose the item in the center as the pivot, while others will choose the first or last element.

What is quicksort algorithm?

Quicksort is a sorting method that operates in-place. It was created by British computer scientist Tony Hoare and is still a widely used sorting algorithm.

When properly implemented, it can be slightly faster than merge sort and two or three times faster than heapsort.

The quicksort pivot can be any element in the collection being sorted. The collection of elements is divided into two smaller lists of elements using the pivot point.

Smaller elements are placed to the left of the pivot point, while larger elements are placed to the right of the pivot point.

To optimize the creation of the two sub-lists into a balanced state, you would prefer your pivot point to be the median of your dataset.

Thus, this way quicksort works.

For more details regarding quicksort algorithm, visit:

https://brainly.com/question/13257594

#SPJ2

With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program starts executing. The C declaration (for example, "long sum[1000];") appearing outside any function causes this variable to be stored in _____.

Answers

Answer:

The answer is "  Uninitialized data segment ".

Explanation:

It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").  

If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.

Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information

Answers

Answer:

B. Ahmad is installing new software to improve the ease of accessing the database.

C. Shania is creating a printed handbook of company policies for new employees.

D. Ian is making updates to the company website to include the latest product information

Explanation:

Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,

1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.

Why were most movies from the late 1890s until the early 1930s only filmed in black and white? The film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. There were only a few people who could afford the technology to produce color motion pictures back then. Color films had to be hand-colored, frame by frame. Audiences did not want color motion pictures until later.

Answers

Answer:

Color films had to be hand-colored, frame by frame.

Explanation:

Colored films were a rarity during the late 18th and early 19th centuries. Most movies were produced in black and white as the production of colored films was a difficult task as the films have to be hand-colored, frame by frame.

However, things began to change with the development of art and technology. While the dye is used to tint the color of certain scenes before, the new development in the films allows the capture of all scenes in color. But this does not mean that all films are shot in color. Most films continued to be shot in black and white even after the development of colored films.  

Answer:

b

Explanation:

how to delete audio from powerpoint​

Answers

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()

Answers

Answer:

B) Measurable.sum (branchAccounts)

Explanation:

The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.

are teaching a class on computer hardware to new IT technicians. You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides this functionality

Answers

Answer:

The chipset of the motherboard.

Explanation:

The chipset that is on the motherboard handles all the data flow management of the system.  This includes all communications that will occur on the motherboard including communication between the CPU and the RAM.  

The chipsets themselves are designd by the companies that create the CPUs but are integrated on the motherboards created by third-party vendors.

Hope this helps.

Cheers.

Question 19 :A user needs the video capability in his computer upgraded to support a new graphics application. The computer includes an onboard video card. You install a new video card in the computer. You need to disable the onboard video card. Where should this card be disabled

Answers

Answer:

The onboard video card should be disabled in the BIOS. After you disable the onboard video card in the BIOS, it will no longer function.

Explanation:

Since in the question a user wants to upgrade for new graphics application and also the computer involves the onboard video card and a new video card is installed in the computer now you want to disabled it

So this can be done in the BIOS i.e basic input output system which is to be used for rebooting the computer system

And after disabled it, you cannot used.

Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it was saying this please help...and yeah:( I’ll let give you fifty ..

Answers

Answer:

Sometimes phones do this, did you take it to the phone store?

Explanation:

In order to send and receive iMessages to your iPhone.

iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

Which are characteristics of pseudocode? Select all that apply.
O helps in working out inputs and outputs of the solution
used in modeling the solution
presents algorithms informally, such as in English
presented in the programming language

Answers

Answer:

A,B,C

Explanation:

how to print the output of "WELCOME" by using python codes with arrays.

Answers

Answer:

Following are the code to this question:

arr=['WELCOME']#defining list arr and assign string value

print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes

Output:

WELCOME

Explanation:

The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.

In the above code "arr", that is list is declared, that store a string value.    

To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.

ternary operators of computer

please explain. ​

Answers

Answer:

It's a compact way of doing an if-else statement.

General Format is

<condition> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

Which part of project management involves determining the overall work? Breakdown Incomes Scope Time

Answers

Answer:

Incomes

Explanation:

Project management has to do with the process of achieving a set goal with the help of a team within a specified time. Most times, the main problem that comes with project management is completing the project within the available constraints.

No project can start up without funds, which in this case is called income and this is the part of the project that determines the overall work.

Answer:

It's not income I just got it wrong I'm not really sure but I would assume it is breakdown I'm sorry if I'm wrong if I'm right please reward me brain list.

Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement

Answers

Answer:

A. Create a custom object tab.

Explanation:

The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization

While the custom object tab is a tab in which the data stored is displayed in the records of the custom object

Therefore according to the given situation,  since the sales teams used the mobile app and want to create new insight records by using their phones

So for meeting this we should recommend creating a custom object tab

Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
Debug
Document
Error check
Restore

Answers

Answer: Debug

Debugging is the process of finding bugs and fixing them.

Answer:

Its A

Debug

Explanation:

I took the test

Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time

Answers

Answer:

See answer below

Explanation:

He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.

In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.

The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.

Which rule should be followed to stay safe online?
O Keep inappropriate messages private.
O Avoid sharing photos with anyone online.
O Keep screen names private.
Ask an adult for permission to download.

Answers

Answer:Avoid sharing photos with anyone online.

Explanation:in other to stay safe on the internet avoid sharing of your pic to strangers most especially pic with inappropriate dressing.... You can be manipulated.....

Answer:

B

Explanation:

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

Businesses today suceed or fail based on their ability to

Answers

Answer:

their ability to Innovate with technology to meet their customers needs

Explanation:

Payroll deductions are the same for all employees. True False

Answers

Answer:

The answer is "False".

Explanation:

The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.

All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.

Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions

Answers

Answer:

To enable VI editor automatically display lines as numbered, the following steps must be taken:

Step 1: Press the Escape key to exit the insert or append mode.

Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.

The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.

Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc

Cheers!

Which of the following has the honor of the first robot-human handshake in space?
a. Robonaut 2
b. Baxter
c. Shakey
d. Robosapien

Answers

Answer:

option a

Robonaut 2

Explanation:

it is also known as R2

hope it helped you:)

Write a Java program to compute the sum of the upper-rounded value of the number 4.2 and the square of 25. Display all the three values to the user on different lines, without any assignment operation in the entire program.​


please answer.

Answers

Answer:

how do expect someone to write an entire java script code for you

Explanation:

Other Questions
Which of the following images shows a scale copy of the trapezoid using a scale factor of 1/2PLEASE HELP According to McClelland, a high need for ____ is associated with successful attainment of top levels in the organizational hierarchy.a. powerb. achievementc. affiliationd. successe. expertise 0.22 L of HNO3 is titrated to equivalence using 0.18 L of 0.2 MNaOH. What is the concentration of the HNO3? Originally, filters for Mr. Coffee electric-drip coffeemakers were sold through appliance and mass merchandise stores. If the company decided to sell the filters in grocery stores where customers purchased their coffee, what type of intermediaries would the company most likely hire 22The church pictured above is an example of Ottonian architecture. Which of the following churches is shown in thispicture?the church of Saint Cyriakusthe church of Saint Agnesc the church of Saint Registhe church of Saint Klaus x = 4 7 9 I dont mind for a step by step To what was Gustave Courbet's desire to paint individuals and scenes from ordinary life in the grand artistic tradition usually reserved for gods and royalty linked Solve for x 1/4(32x-16)=6x Evaluate the function,f (x) = 5 - 4x for f(-2) The distance from the center of a lens to the location where parallel rays converge or appear to converge is called the _____ length. Colin found 22 more mushrooms than Sophie did while they were out picking them in the forest. On the way home, Sophie asked Colin to give her some mushrooms so that they would have equal amounts. How many mushrooms should Colin give to Sophie? Jen believes that she should get more space in the closet because she has more clothes, however, her roommate Kate thinks that she has an equal amount of clothes and so they should split it down the middle. This is an example of what type of conflict Do numbers below 0 make sense outside of the context of temperature? If you think so, give some examples to show how they make sense. If you dont think so, give some examples to show otherwise. Pretzelmania, Inc., issues 6%, 10-year bonds with a face amount of $63,000 for $58,523 on January 1, 2018. The market interest rate for bonds of similar risk and maturity is 7%. Interest is paid semiannually on June 30 and December 31. Record the bond issue and first interest payment on June 30, 2018. All of the following statements about the maps above are TRUE except: A. These maps illustrate census data. B. In 2000, many states had more people under 18 than they had in 1990. C. In 2000, many states had fewer people under 18 than they had in 1990. D. These maps represent the number of people under 18 living in the US in 1990 and 2000. How many moles of steam, H 2 O react with 1 mol of charcoal, Caccording to the balanced chemical equation? C(s)+H 2 O(g)\ \ CO(g)+H 2 (g) Paisley is playing with a yo-yo. The following graph traces the path of the yo-yo while it is in the air, where y is the height of the yo-yo above theground, and x is the time, in seconds, from when the yo-yo leaves Paisley's hand Five stages of the yo-yo's path are marked on the graph.Which of the five stages shows the slowest rate of change in the yo-yo's height above the ground?CD Which expression can be used to convert 100 USD toJapanese yen? Find an exact value of sin(17pi/12) All the following statements concerning variable life insurance are correct EXCEPT: Group of answer choices The policyowner can invest the cash value in different investment accounts. The premium is level and guaranteed not to increase. The death benefit can vary with the policy's investment experience. Cash surrender values are guaranteed.