On a scale of 1-10 how would you rate your pain

Answers

Answer 1

Explanation:

There are many different kinds of pain scales, but a common one is a numerical scale from 0 to 10. Here, 0 means you have no pain; one to three means mild pain; four to seven is considered moderate pain; eight and above is severe pain.


Related Questions

List three ways of breaking a copyright law with the illegal copy of software.​

Answers

Answer:

Using itSelling it Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

Answers

Answer:

base station is the answer

What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard

Answers

Answer:

The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

Explanation:

1. First, convert to the binary (base 2) the integer part: 0.

Divide the number repeatedly by 2.

Keep track of each remainder.

We stop when we get a quotient that is equal to zero.

division = quotient + remainder;

0 ÷ 2 = 0 + 0;

2. Construct the base 2 representation of the integer part of the number.

Take all the remainders starting from the bottom of the list constructed above.

0(10) = 0(2)

3. Convert to the binary (base 2) the fractional part: 0.125.

Multiply it repeatedly by 2.

Keep track of each integer part of the results.

Stop when we get a fractional part that is equal to zero.

#) multiplying = integer + fractional part;

1) 0.125 × 2 = 0 + 0.25;

2) 0.25 × 2 = 0 + 0.5;

3) 0.5 × 2 = 1 + 0;

4. Construct the base 2 representation of the fractional part of the number.

Take all the integer parts of the multiplying operations, starting from the top of the constructed list above:

0.125(10) =

0.001(2)

5. Positive number before normalization:

0.125(10) =

0.001(2)

6. Normalize the binary representation of the number.

Shift the decimal mark 3 positions to the right so that only one non zero digit remains to the left of it:

0.125(10) =

0.001(2) =

0.001(2) × 20 =

1(2) × 2-3

7. Up to this moment, there are the following elements that would feed into the 32 bit single precision IEEE 754 binary floating point representation:

Sign: 0 (a positive number)

Exponent (unadjusted): -3

Mantissa (not normalized):  1

8. Adjust the exponent.

Use the 8 bit excess/bias notation:

Exponent (adjusted) =

Exponent (unadjusted) + 2(8-1) - 1 =

-3 + 2(8-1) - 1 =

(-3 + 127)(10) =

124(10)

9. Convert the adjusted exponent from the decimal (base 10) to 8 bit binary.

Use the same technique of repeatedly dividing by 2:

division = quotient + remainder;

124 ÷ 2 = 62 + 0;

62 ÷ 2 = 31 + 0;

31 ÷ 2 = 15 + 1;

15 ÷ 2 = 7 + 1;

7 ÷ 2 = 3 + 1;

3 ÷ 2 = 1 + 1;

1 ÷ 2 = 0 + 1;

10. Construct the base 2 representation of the adjusted exponent.

Take all the remainders starting from the bottom of the list constructed above:

Exponent (adjusted) =

124(10) =

0111 1100(2)

11. Normalize the mantissa.

a) Remove the leading (the leftmost) bit, since it's allways 1, and the decimal point, if the case.

b) Adjust its length to 23 bits, by adding the necessary number of zeros to the right.

Mantissa (normalized) =

1 000 0000 0000 0000 0000 0000 =

000 0000 0000 0000 0000 0000

12. The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

the user cannot use a computer system without.................... software

Answers

Answer:

the user cannot use a computer system without hardware and software

Answer:

the user cannot use a computer system without.........hardware.....and...... software

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

Write a letter of application to your school as a chemistry teacher​

Answers

Answer:

Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?

Answers

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.

You have just assembled your first PC. You hit the power button and the computer turns on. As the computer runs through POST, it starts beeping multiple times and you don't see anything displayed on the LCD. You notice there are no activity lights flashing for the HDD. However, when you check the inside of the computer, you can hear the drive spinning up. What is the NEXT thing you are going to check in order to get the PC functioning

Answers

Answer:

Explanation:

If the HDD is spinning, this means that the power cable is correctly connected and that the drive is receiving power and powering on. However, this does not mean that the HDD is functioning correctly and reading the information. Therefore, the next logical step would be to check the SATA cable that connects the drive to the motherboard. The cable may be broken or maybe the SATA slot on the motherboard. Switch out the cables and plug it into another slot. If this does not work, then it may be that the HDD is broken. Multiple Beeps can also mean that the RAM or CPU is not plugged in correctly or broken.

You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue

Answers

Answer: Increase your staging folder quota by 20%

Explanation:

The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.

Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.

La historia de los productos tecnologicos
porfa

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.

La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.

MyProgramming Lab

It needs to be as simple as possible. Each question is slightly different.

1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].

Associate the list with the variable arith_prog.

2.

An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].

Associate the list with the variable arith_prog.

3.

A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.

Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].

Associate the list with the variable geom_prog.

Answers

Answer:

The program in Python is as follows:

#1

d = int(input("distance: "))

n = int(input("n: "))

arith_prog = []

for i in range(1,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#2

d = int(input("distance: "))

m = int(input("m: "))

n = int(input("n: "))

arith_prog = []

for i in range(m,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#3

r = int(input("ratio: "))

n = int(input("n: "))

geom_prog = []

m = 1

count = 0

while(m<n):

   m = r**count

   geom_prog.append(m)

   count+=1

print(geom_prog)

Explanation:

#Program 1 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from 1 to n (inclusive) with an increment of d

for i in range(1,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 2 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for m

m = int(input("m: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from m to n (inclusive) with an increment of d

for i in range(m,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 3 begins here

This gets input for ratio

r = int(input("ratio: "))

This gets input for n

n = int(input("n: "))

This initializes the list, geom_prog

geom_prog = []

This initializes the element of the progression to 1

m = 1

Initialize count to 0

count = 0

This is repeated until the progression element is n

while(m<n):

Generate progression element

   m = r**count

Append element to list

   geom_prog.append(m)

Increase count by 1

   count+=1

This prints the list

print(geom_prog)

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

who invented pascaline and when?​

Answers

Pascaline, also known as Pascal's calculator or arithmetic machine, was invented by [tex]\sf\purple{Blaise\: Pascal}[/tex] between [tex]\sf\red{1642\: and\: 1644}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search

Answers

Answer:

n/2

Explanation:

A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

Other Questions
homeostasis is maintained through posterior pituitary endocrine hormones that act on the ______. Round 0.090999 to four decimal places. please solve asap thanks Which expression is equivalent to 2(14x-3y+28+12.2-5y-17.5) What was one result of the migration from farms to cities during the late 19th century and early 20th century? help me please! with this Each floor of a parking garage can hold 90 cars. When all of the floors are full, there are 450 cars in the garage altogether. What fraction of the cars is parked on the ground floor? How do interest groups & political parties shape American politics? What percentages of participants in the study were American? 15 POINTS!! what is a book/ movie that has the same theme as "Everyone can make a difference" The period from the 9th to the 6th century B.C. is known as the _____________________________ during which the Greek kings were deposed by _____________________ ( rule of a fewwho have power and wealth ) of wealthy warriors, and the city-states or _________________ Emerged. Yello Bus Lines uses the units-of-activity method in depreciating its buses. One bus was purchased on January 1, 2019, at a cost of $148,000. Over its 4-year useful life, the bus is expected to be driven 100,000 miles. Salvage value is expected to be $8,000.Required:a. Compute the depreciable cost per unit. b. Prepare a depreciation schedule. How to do these two questions? As the owner/manager of the food truck you will need to comply with all necessary legislation (laws). Correctly name and outline one law you must abide by relating to workplace safety. In Australia! hey everyone, What is earthquake mention the effects of earthquake. A kind of variable that a researcher purposely changes in investigation is In the current year, Marnie rented her vacation home for 75 days, used it for personal reasons for 22 days, and left it vacant for the remainder of the year. Her income and expenses are as follows: Rental income $ 18,000 Property taxes 2,500 Mortgage interest 3,500 Utilities 1,100 Repairs and maintenance 1,000 Depreciation 5,200 What is Marnie's net income or loss from the activity Which Enlightenment thinker preferred tyrannical rule and felt that in order to live in a peaceful and secure society, people should give up certain rights to a centralized power?A. Leonardo da VinviB. John LockeC. Peter the GreatD. Thomas Hobbes what are irrational numbers? f(4) = ______If g(x) = 2, x = _____