List any ten keyboard symbols.
Answer:
Esc- Esc (escape) key.
F1 - F12 What are the F1 through F12 keys?
F13 - F24 Information about the F13 through F24 keyboard keys.
Tab Tab key.
Caps lock- Caps lock key.
Shift- Shift key.
Ctrl - Control key.
Fn- Function key.
Alt- Alternate key (PC only; Mac users have an Option key).
Spacebar- Spacebar key.
Hope this helps, have a great day/night, and stay safe!
One advantage of putting information into a database is that you can filter the data.
O True
O False
Answer:
True.
Explanation:
One of the purposes of databases is to allow data lookup through queries, which is basically filtering data, using efficient algorithms too.
Answer:
True
Explanation:
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.
Answer:
the gps and a map
Explanation:
Answer:
I think. it could be GPS and maps to but I may be wrong so yeah
Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables people to collaborate without the extra cost of paying a service provider; however, there is an increased opportunity for cybercrime. Lack of regulation speeds up the process of invention, but requires individuals to back up their own data. Lack of regulation encourages open innovation, but is not always secure. Lack of regulation encourages greater collaboration, but can lead to increased cost from price increases.
Answer:
3.) Lack of regulation encourages open innovation, but is not always secure.
Explanation:
Got it right in Introduction to Careers in Arts, A/V Technology and Communications
Describe the scope of the variables in this code.
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
class petCarrier:
size = 'medium'
color = 'red'
The scope of petName ______.
The scope of color is ______.
Accessible to the entire program
limited to the petCarrier class
limited to the pet class
(both of the blanks need one of those answers)
The scope of petName is local to the class pet.
The scope of color is accessible by all parts of the program.
How to interpret programming variables?The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.
The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.
Read more about programming variables at; https://brainly.com/question/9238988
#SPJ2
Answer:
The scope of petName limited to the pet class
The scope of color is accessible to the entire program
Explanation:
edge
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.
!PLEASE HELP! My business office specialist class, this is about Access.
Which settings are available in the Options dialog box? Check all that apply.
the name of the user or the initials
the images to include in a database
the object types to include in tables
the default format for new databases
the default folder for storing databases
the folders containing trusted databases
the number of databases to save in each folder
Answer:
b
Explanation:
Answer:
Probably late but the answers are
A: the name of the user or the initials
D: the default format for new databases
E: the default folder for storing databases
F: the folders containing trusted databases
1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow
Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.
For which discipline is it most important to study computer technical support and networking?
Answer:
Studying computer technical support would contribute most to the disciplines of computer engineering and information technology.
have an amazing day! =)))
What is a product of respiration
Answer:
carbon dioxide and water
Explanation:
You defined a class and saved it as shoe.py.
Which line of code will allow you to use the class in another program?
from shoeClass import *
O import shoe from
O from shoe import
O import shoeClass from
Please hurry
Answer:
Import shoeClass from
Explanation:
You defined a class and saved it as a shoe. The line of code that allows you to see the class in another program is import shoeClass from. The correct option is d.
What is programming?A form of computer programming language known as procedural programming describes a number of well-planned actions and processes during the course of its development.
It includes statements, functions, and commands that are organized systematically to finish a computing task or program. Its main focus is on developing procedures.
While object-oriented programming is a type of programming where the emphasis is on creating objects as opposed to actions and data or logic. Its four guiding principles are encapsulation, abstraction, polymorphism, and inheritance.
Therefore, the correct option is d. import shoeClass from.
To learn more about programming, refer to the link:
https://brainly.com/question/14368396
#SPJ5
What does the following loop do?
val = 0
total = 0
while (val < 10):
val = val + 1
total = total + val
print(total)
Prints the numbers backwards from 10 to 1.
Prints the sum of the numbers from 1 to 10.
Finds the average of the numbers between 1 and 10.
Prints the numbers from 1 to 10.
Answer:
Prints the sum of the numbers from 1 to 10.
Explanation:
YOU NEED BETTER INDENTATION
Total is the sum.
Each loop it's added
:)
You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random
Answer:
from math import dist
Explanation:
The dist() method is a part of the math module. So, to include it you have to use the following line of code:
from math import dist
hope this helped :D
The line which will allows you to enter the following code in IDLE is from math import dist.
What is dist() method?The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.
The dist() method is a part of the mathematics module. Then, for
>>>dist([2.5).(5.9))
5.0 ,
we have to use code in IDLE as;
from math import dist
Thus, the line which will allows you to enter the following code in IDLE is from math import dist.
Learn more about dist() method.
https://brainly.com/question/25373810
#SPJ2
delete temp or %temp% files in Windows 10 is safe and, can it help boost up your PC fps?
yes or no
Answer: yse
Explanation...
Images, symbols, and diagrams are types of
art objects
Graphs
graphics
presentation objects
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is :
Graphics
Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.
While other options are not correct because:
Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.
To prevent the header from appearing on the title page of your document, select the______ option .
a. Different Odd and Even Pages
b. Different First Page
c. Position Grouping
d. Page Number
Answer:
b. Different First Page
Why do you usually find domain names instead of IP addresses in a URL? Select one: a. An IP address would make your web page load more slowly b. A domain name is easier to remember C. An IP address is not guaranteed to get you to the right server computer d. Domain names are free, while IP addresses are very expensive
Answer:
b
Explanation:
for exaple brainly.com is easy to remember instead of 104.17.73.91
Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT
Answer:
C. The energy used to create and maintain technology
#Carry on learning po
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
Tenim tres resistors en sèrie, calcula la tensió que hi haurà a cadascuna d'elles sabent que una d'elles és de 680 Ω i les altres són de 220 Ω. El generador té una tensió de 12V.
Resposta:
Per a càrrega de 680Ω: 7,27 volts
Per a les dues càrregues de 220Ω: 2,36 volts cadascuna
Explicació:
Segons la llei d’ohms
E = IRt
E és la força electromotriu = 12V
I és el corrent total que circula al circuit
Rt és la resistència equivalent total
Com que els 680Ω, 220Ω i 220Ω estan en sèrie;
Rt = 680 + 220 + 220
Rt = 1120Ω
Obteniu el corrent total del circuit:
Recordem que: E = IRt
I = E / Rt
I = 12/1120
I = 0,0107A
Tingueu en compte que el mateix corrent flueix a través de resistències connectades en sèrie, però tensions diferents.
Obteniu les tensions individuals;
Per a càrrega de 680Ω;
V = IR
V = 0,0107 * 680
V = 7,27 Volts
Per a la càrrega de 220Ω
V = IR
V = 220 (0,0107)
V = 2,36 volts
Per tant, les tensions de les dues càrregues de 220Ω seran de 2,36 volts cadascuna