Answer:
Explanation:
D
Answer:
placement of the main subject in relation to the other objects appearing on the screen
Explanation:
it's literally in the notes
Memory containing hardwired instructions that the computer uses when it boots up, before the system loads. In PCs the instructions are read from a small program in the read only memory, called the Bios.
options:
RAM
ROM
Processing
Flash drive
Answer:
RomExplanation:
ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads
PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
Answer:
C
Explanation:
The class declaration component declares the name of the class along with other attributes such as the class's superclass, and whether the class is public, final, or abstract. At minimum, the class declaration must contain the classkeyword and the name of the class that you are defining.
Unit 2: Lesson 6 - Coding Activity 1
Write code which takes inputs from the user for the number of sides (int) and side length (double), then creates a regular polygon with these characteristics. The program should then print a sentence with the name of the shape and the area and perimeter as shown in the sample run. You should use the appropriate RegularPolygon methods to obtain the perimeter and area of the shape rather than attempting to calculate these values yourself.
Sample run:
Enter number of sides:
> 5
Enter side length:
> 3.5
A regular pentagon with side length 3.5 has perimeter 17.5 and area 21.075848157214846
Hint: You can approach this problem by saving the int and double as variables, and then creating the RegularPolygon, or you can create the polygon and use methods to set the values of the sides and sidelength.
Answer:
easyy
Explanation:10 smaple runs and 2
10 computer and operating systems errors
Answer:
what is
Explanation:
Answer:System errors are caused by malfunctioning hardware components, corrupted operating system modules, etc. These are caused by corrupted or malfunctioning system files or software executables. Most runtime errors affect the application that caused it to shut down.
Explanation:
how do you open cosh
Answer:
Hit the cosine button on the calculator
Explanation:
How Powerpoint is useful in education aspect?
Answer:
(Hope this helps can I pls have brainlist (crown)☺️)
Explanation:
PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning. PowerPoint may be used to present graphics that would be difficult to bring to class otherwise. PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning.
It improves learning by giving pupils a greater comprehension of the subject and inspiring them. It meant that technology-based instruction had a considerable favourable impact on students' grades. Analyses revealed that the experimental group students outperformed the control group.
the term __________ refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.
the term objective function refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.
What is objective function?The objective function is a mathematical equation that describes the target production output that corresponds to profit maximization in relation to production.
It then uses the correlation of variables to calculate the final outcome value. Based on a collection of constraints and the relationship between one or more decision variables, an objective function attempts to maximize profits or minimize losses.
Therefore, In a linear programming model, the term objective function refers to the expression that defines the quantity to be maximized or minimized.
Learn more about the objective function, refer to:
https://brainly.com/question/29185392
#SPJ5
suggest me anime genre : adventure ecchi
PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
Answer:
span > : A generic container that can be used for styling specific portions of text.
please help me I have 5 mins
Answer:
Question 3 is c. (==). Question 2 cut off.
Explanation:
I can't read the full thing, so please comment here the full question for number 2, I'm waiting for your response.
Answer: what he said is true that's what i was going to say.
Explanation:
HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
Directions
In this assignment, you'll use a word processor to create a newsletter.
Choose from one of the following topics for your newsletter:
Science project
Science report
State report
Country report
Biography
Your newsletter should meet these requirements:
Fill one page.
Include the following:
two or three columns
a title
at least three graphics, but not more than six
When you've finished creating your newsletter, remember to spell check and proofread. Then save your newsletter and upload it.
Question # 1
File Upload
Submit your newsletter that includes the following:
two or three columns
a title
at least three graphics, but not more than six
Column One: Who was Henry Ford?
Henry Ford was the founder of Ford Motor Company and also the mass producer of the automobile. Henry Ford was born in 1863. At the age of 16, he worked as a machinist apprentice. Later, Henry began to work the family farm while still working on creating steam engines. Henry had a big interest in steam engines, which would later contribute to him building his first working automobile.
Column Two: How did Henry Ford contribute to our society?
After marrying in 1888, Ford was hired to work for Edison Illuminating Company. His position was an engineer, and Ford began to accelerate his position in the company quickly. After a while, Ford created his first operating vehicle. This was called the "Quadricycle." Ford wanted to improve on his models, so he founded the Company Ford with others. Ford then began to develop methods of mass-producing automobiles to sell to the public. After success in business, he bought the whole company and owned it all by himself. Ford began to mass-produce automobiles. It is said that " The mass production techniques Henry Ford championed eventually allowed Ford Motor Company to turn out one Model T every 24 seconds." Ford passed away in 1945. He decided to give ownership to his son Edsel Ford before he died, but Edsel sadly died before Henry Ford. The Ford company's ownership was given to Ford's grandson, Henry Ford II.
Please re-word so it isn't plagerized
What feature is essential for managing code iterations within the provisioning and deprovisioning processes
Answer:
Version control is an ID system for each iteration of a software product
The feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.
What is Code iteration?Code iteration may be defined as a set of instructions or codes that are significantly repeated until a specific end outcome is achieved. Iterative development is sometimes called circular or evolutionary development.
According to the context of this question, version control represents an ID system for each code iteration with respect to its software products. This governs all the processes of code iteration as per the user's instruction and executes the entire process before revealing the outcome or output of that code.
Therefore, the feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.
To learn more about Code iteration, refer to the link:
https://brainly.com/question/26995556
#SPJ6
Your question seems incomplete. The most probable complete questin is as follows:
What feature is essential for managing code iterations within the provisioning and de-provisioning processes?
Version control.Secure tagging.Software diversity.Continuous monitoring.what actions can be performed via voice commands using 2022 sentra’s siri® eyes free?
New mobile cars produce nowadays often have new features that follows it. The actions that can be performed via voice commands using 2021 Sentra's Siri® Eyes Free are;
Send and receive text messagesMake and receive calls
Select and play music
Siri® Eyes Free command can be used to play music, report on the news, show movies, play games, and give us navigation from one place to the other.
It ha been made available in some selected cars and it often use one's voice to control features of your iPhone without viewing or touching the phone.
Learn more from
https://brainly.com/question/13429053
A type of user interface that features on- screen objects, such a menus and icons, manipulated by a mouse.
options:
GUI (Graphical User Interface)
Sticky
Circuits
RAM
Explanation:
What want help with i just see answer there maybe if you want to know the meaning of Gui it is : A graphizal user interface (GUI) is a type of user interface through which users interact with electronic devices via visual indicator representations.
and next time please make yourself clear with your sentence no Offense
your network settings prevent content from loading privately
Answer:
what what what what what what
What value is displayed as a result of executing the code segment?
Answer:
A: 3
Explanation:
The MOD operator is used to calculate the remainder of dividing two numbers, so by the end of this operation, we are adding the MODs of each integer in this list, because this program ends once each integer in list has gone through the steps, and the result of calculating the MOD of each integer is then added back because of the third step. So it should look like this: (4 MOD 2) + (2 MOD 2)...(1 MOD 2) and the result of adding these values should then result in 3.
The value which is displayed as a result of executing the code segment is equal to: A. 3.
What is MOD?MOD is an abbreviation for modulo operation and it can be defined as a mathematical technique that is used in computer science to determine the remainder of an arithmetic operation such as the division of two numbers.
Based on the code segment, the value which is displayed as a result of executing the modulo operation would be equal to 3 at the end of the iteration or operation.
Read more on computer codes here: brainly.com/question/25619349
Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phone
class 6
Answer:
c
Explanation:
What is gaining of unauthorized access to data in a system or computer
Answer:
when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”. so they are doing something that they are not suppose to do and or the do something that someone else was not ok with and or they didnt ask to do it.
Explanation:
b. Differentiate Operation System from other software. give me 4-5 sentences pls.
Answer:
An operating system or OS is system software that manages computer hardware, software resources, and provides common services for computer programs. All operating systems are system software. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device while on the other hand The System software is a type of computer program that is designed to run a computer’s hardware and application programs it controls a computer’s internal functioning, chiefly through an operating system. It also controls peripherals devices such as monitors, printers, and storage devices.
Explanation:
compare the four ways of regulating the internet
Answer:
the four is all the same way that can harm people through the internet
Explanation:
Helppppppppppppppppppp
 drag the tiles to the correct boxes to complete pairs match the graphic design tool to its purpose/definition
Answer:
1, layers
2. lasso
3.Drawing
4. magic wand
Explanation:
trust
Which of the following is not considered a secondary storage device? (choose 1 only)
flash drive
cd
magnetic tape
hard drive
ROM
external hard drive
i need help
Answer:
Read-Only Memory
Explanation:
ROM is a primary memory storage device. Secondary memory is not CPU addressable, and ROM is. Secondary memory would be a storage drive.
A collection of programs or tools that give cybercriminals complete control over a computer or a network of Internet-connected devices.
Answer:
Acunetix. Netsparker. Intruder. Nmap. Metasploit. Aircrack-Ng. Wireshark.A lot of these software are used in Kali Linux. I hope it helped. :)
Please help, no links.
Explanation:
1gigabyte= 1000kilobytes
Answer:
1st one - 2; 2nd - 1; 3rd -3
Explanation:
The motherboard is the computer's main circuit board. This board holds the CPU, memory, connectors for the hard drive.
options:
True
False
25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
Some disadvantages of ethical codes are that _____.
!!!!!!!!!!Select 3 options!!!!!!!!!!!!!!
A. there is no legal authority to prosecute offenders
B. the code is broad enough to cover all issues
C. people can abuse intellectual property law
D. the ethical code can be changed at anytime
E. specific details are not covered in the code
Answer:
the person above me is right
Explanation:
Which of the following uses the proper syntax for creating an HTML comment?
a.
b. Home page for my personal website
c. // Home page for my personal website
d.
Answer:
c
Explanation:
write a q basic program to find the sum of all the even numbers from 1 to 50
Answer:
CLS
M=2
SUM=0
DO WHILE M<=50
SUM=SUM+M
M=M+2
LOOP
PRINT " The sum of all even numbers between 1 and 50 is"; sum
Can anyone lend me a computer?
Answer: No
Explanation:
Answer:
no
Explanation: