the shadows she fancied has tricked her. what does that mean

Answers

Answer 1

Answer: the room had been dark, she had not been able to see him clearly

Explanation:

Answer 2

The word FANCIED means desire or  fancied would mean supposed, believed, or imagined.

So it means that she might think that the shadow (assuming the shadow was a person who was invisible) was just her imagination or hallucination but in reality, the shadow (invisible person) tricked her.

_________________

Brainliest would be greatly appreciated!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK


Related Questions

∉∉∉⊆αβ∞∞the life of me

Answers

Answer:

?

Explanation:

I honestly agree to this statement
So poetic

Careers emerge solely to make profit for the industry.


False

True

Answers

Explanation:

Careers emerge solely to make profit for the industry: False

Brainliest and follow and thanks

morning dude

draw a flowchart and write the algorithm to find even number between 1 to 50​

Answers

Answer:We Explain the flowchart in following images given below..

Please hit a like and thanks

The EDI ____________layer describes the business application that i
driving EDI
a)EDI Semantic Layer c) EDI Transport Layer
b) EDI Standard Translation Layer d) Physical Layer

Answers

Answer:

a) EDI Semantic Layer

Explanation:

EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.

This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.

Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).

What is the role of science and technology in achieving human’s ultimate goal or the good life?

Answers

Answer:

The role that science and technology has played in improving the life conditions across the globe is vivid, but the benefit has to been harvested maximum by all countries. Hope This Helps!

Explanation:

The essence of how science and technology contributes to society is the creation of new knowledge, and then utilization of that knowledge to boost the prosperity of human lives, and to solve the various issues facing society.

Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after the shift operation. Does your system place 0s or 1s in the vacated bits?

Answers

Solution :

#include<[tex]$\text{stdio.h}$[/tex]>

#include<conio.h>

void dec_bin(int number) {

[tex]$\text{int x, y}$[/tex];

x = y = 0;

for(y = 15; y >= 0; y--) {

x = number / (1 << y);

number = number - x * (1 << y);

printf("%d", x);

}

printf("\n");

}

int main()

{

int k;

printf("Enter No u wanted to right shift by 4 : ");

scanf("%d",&k);

dec_bin(k);

k = k>>4; // right shift here.

dec_bin(k);

getch();

return 0;

}

You work at the headquarters of an international restaurant chain. The launch of your mobile ordering app has been well received in your home country, increasing sales and customer satisfaction while decreasing order wait time and operating expenses. Your team is now ready to expand the mobile app into a handful of international markets. However, you first need to strategize what kinds of adjustments and adaptations will be needed to help ensure the app's success in these various cultural environments. Marketing director: Frankly, I'm a little surprised at the success we've seen with this app here at home. But it makes sense to keep buiding on that momentum You Yes, I think today's customers are indigenously comfortable with internet based technologies, an________ is a natural extension of that phenomenon. The challenge is to figure out how easily the app can be adapted to markets
a. e-business
b. global purchasing
c. language diversity
d. model networking

Answers

Answer: E-business

Explanation:

Based on the information given, a natural extension of that phenomenon is the E-business. E-business which means electronic business is when business is done through the internet.

It should be noted that e-business processes consist of the purchase and sale of goods and services, the processing of payments, servicing customers, sharing information regarding products, managing production control, etc.

How can you ensure that the website you are using is secured?
A.
website begins with http://
B.
website begins with https:// and has a green padlock
C.
website doesn’t have any padlock icon
D.
website has a red padlock icon

Answers

The answer is B: website begins with https:// and has a green padlock

One way to add a table to a presentation is to click on Clip Art under the Insert tab. click on WordArt under the Insert tab. right-click on an existing page with content and choose Add Table. add a new slide and left-click on the Table symbol in an empty area.

Answers

Huh? What is this? …..

What is the main fuction of command interpreter​

Answers

The command interpreter or the command-line interface is one of the ways a user can interface with the operating system. The command interpreter's main task is to understands and executes commands which it turns into system calls. The kernel is the central module of an OS.

_________________

Brainliest would be greatly appreciated!

I found this!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK

LAB: Contact list A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Assume that the list will always contain less than 20 word pairs. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309

Answers

Answer:

The program in Python is as follows:

n = int(input(""))

numList = []

for i in range(n):

   word_pair = input("")

   numList.append(word_pair)

name = input("")

for i in range(n):

   if name.lower() in numList[i].lower():

       phone = numList[i].split(" ")

       print(phone[1])

   

Explanation:

This gets the number of the list, n

n = int(input(""))

This initializes list

numList = []

This iterates through n

for i in range(n):

This gets each word pair

   word_pair = input("")

This appends each word pair to the list

   numList.append(word_pair)

This gets a name to search from the user

name = input("")

This iterates through n

for i in range(n):

If the name exists in the list

   if name.lower() in numList[i].lower():

This gets the phone number associated to that name

       phone = numList[i].split(" ")

This prints the phone number

       print(phone[1])

How are status reports useful

Answers

Answer:

Project managers use status reports to keep stakeholders informed of progress and monitor costs, risks, time and work. Project status reports allow project managers and stakeholders to visualize project data through charts and graphs.

Write a program that randomly (using the random number generator) picks gift card winners from a list of customers (every customer has a numeric ID) who completed a survey. After the winning numbers are picked, customers can check if they are one of the gift card winners. In your main function, declare an integer array of size 10 to hold the winning customer IDs (10 winners are picked). Pass the array or other variables as needed to the functions you write. For each step below, decide what arguments need to be passed to the function. Then add a function prototype before the main function, a function call in the main function and the function definition after the main function.

Answers

Answer:

Explanation:

Since no customer ID information was provided, after a quick online search I found a similar problem which indicates that the ID's are three digit numbers between 100 and 999. Therefore, the Java code I created randomly selects 10 three digit numbers IDs and places them in an array of winners which is later printed to the screen. I have created an interface, main method call, and method definition as requested. The picture attached below shows the output.

import java.util.Random;

interface generateWinner {

   public int[] winners();

}

class Brainly implements generateWinner{

   public static void main(String[] args) {

       Brainly brainly = new Brainly();

       int[] winners = brainly.winners();

       System.out.print("Winners: ");

       for (int x:winners) {

           System.out.print(x + ", ");

       }

   }

   public int[] winners() {

       Random ran = new Random();

       int[] arr = new int[10];

       for (int x = 0; x < arr.length; x++) {

           arr[x] = ran.nextInt(899) + 100;

       }

       return arr;

   }

}

________________risk in payment system requires improvements in the security framework. [ ]
a)Fraud or mistakes b)Privacy issues c)Credit risk d) All of the above.

Please write the answer for 15 points

Answers

Answer:

D. all of the above

Explanation:

sana nakatulong

answer any one: write a computer program:​

Answers

Answer:

hope this helps you look it once

Given that
f(x) = 5x +3.
Find f (4)​

Answers

Answer:

Given that

f(x) = 5x +3.

f (4)=5×4+3=23

Explanation:

hope it's helps you have a good day☺

recent trends on operating system

Answers

Answer:

Windows 10 if this is what I think u mean

You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. Canonical, the company that owns and maintains Ubuntu just releases an update to patch a security vulnerability in the system.

Required:
What BEST action you should take?

Answers

Answer:

Explanation:

I believe that the best course of action would be to divide the companies computers and run the critical applications on half of the systems while the other half update to the latest Ubuntu release. Once that half is done updating, you run the applications on the updated systems and update the other half of the systems. This will allow the company to continue its operations without any downtime, while also updating to the latest Ubuntu release on all systems and making sure that all systems do not have any security vulnerabilities due to outdated software.

True or false question :)

Handware can be tracked back to ancient times. Over six centuries ago.
°true
°false

Answers

Answer:

false and it's a recent technology

i would say the answer is false!

Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.

If the user entered a valid oligo sequence consisting only of the characters A, C, G, or T, the program should then display the reverse complement of that sequence, in this case TACGGGCTCATA, along with text indicating that it is the reverse complement .

After displaying the reverse complement, the program should then prompt the user to enter another sequence. The program should continue this pattern of prompting the user for a new oligo sequence and displaying its reverse complement until the user enters a sequence with at least one character that is invalid (i.e. a character other than A, C, G, or T).

Answers

Answer:

Explanation:

The following code is written in Python. It continues looping and asking the user for an oligonucleotide sequence and as long as it is valid it outputs the reverse complement of the sequence. Otherwise it exits the loop

letters = {'A', 'C', 'G', 'T'}

reloop = True

while reloop:

   sequence = input("Enter oligonucleotide sequence: ")

   for x in sequence:

       if x not in letters:

           reloop = False;

           break

   if reloop == False:

       break

   newSequence = ""

   for x in sequence:

       if x == 'A':

           newSequence += 'T'

       elif x == 'T':

           newSequence += 'A'

       elif x == 'C':

           newSequence += 'G'

       elif x == 'G':

           newSequence += 'C'

   print("Reverse Complement: " + newSequence)

What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point

Answers

Answer:

A plus sign

Explanation:

EDGE 2021

Answer: or in other words B

Explanation: on edg hop this helps

Crop-Harvesting robots manage harvest automation, seeding, and weeding.
True
False

Answers

Answer: False

Explanation: I think there are specific robots for seeding, weeding and harvest automation. Unless its a multi purposed crop-harvesting robot I would assume it would only be related to harvesting tasks. (picking)

More info here: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7273211/

Use the drop-down menus to explain how to set up a lookup field to use a combo box control with a list of options. 1. Open a table in Design view, and right-click a field. 2. Select Change To in the drop-down menu, then select . 3. On the Data tab of the , make a number of choices. 4. For the Row Source Type, choose . 5. For Limit to List, select . 6. For Row Source, click the ellipsis and enter the values in the dialog box that opens. 7. Close the Property Sheet, and save the form.

Answers

Answer:

Combo Box, Property Sheet, Value List, Yes

Explanation:

Use the drop-down menus to explain how to set up a lookup field to use a combo box control with a list of options are the combo box, vause lkist.

What is the distinction between a mixture container and a drop-down listing?

A drop-down listing is a listing wherein the chosen object is constantly seen, and the others are seen on call for via way of means of clicking a drop-down button. A combo container is a mixture of a listing container or a drop-down listing and an editable textual content container, as a consequence permitting customers to go into a fee that isn't always withinside the listing.

A drop-down listing in Access 2013 gives a listing of values to useful resources in statistics access in tables or forms. Although you could permit customers to manually input values that do not exist withinside the drop-down listing, you will want to disable this selection to limition alternatives to tiered values.

Read more about the combo box control:

https://brainly.com/question/17238933

#SPJ2

answer any one: write a computer program:​

Answers

Answer:

hope this helps you look it once.

I have some true or false questions I need help with. 9th grade.**

Handware can be tracked back to ancient times. Over six centuries ago.
True or false.

Hardware is only found in computers.
True or false. I know

Instruments and weaving looms where some of the first pieces of hardware.
True or false.

Computers and hardware is the same thing
True or false.

Answers

Answer:

Hardware can be traced back to ancient times. False

Hardware is only found in computers. False

Instruments and weaving looms were some of the first pieces of hardware. False

Computers and hardware is the same thing. This question is a bit broad but there's many different types of hardware. From keyboards to printers to speakers.

I tried my best not exactly sure though.

A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another? Explain.

Answers

Here you go.....................

Can someone plz answer these questions

Answers

Answer:

11001100 = 204

11111111 = 255

Explanation:

For 11001100:

1*2⁷ + 1*2⁶ + 0*2⁵ + 0*2⁴ + 1*2³ + 1*2² + 0*2¹ + 0*2⁰ = 204

Just replace 1's by 0's in the following calculation to do it for every 8 bit number:

1*2⁷ + 1*2⁶ + 1*2⁵ + 1*2⁴ + 1*2³ + 1*2² + 1*2¹ + 1*2⁰ = 255

If you don't want to do the calculation yourself, you can set the windows calculator in programmer mode, then select binary and key in the number.

Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain how they are used in a program.
PLSSSS HELLP MEEE ASAP!!!!​

Answers

Explanation:

Object Oriented Programming (OOPS or OOPS for Object Oriented Programming System) is the most widely used programming paradigm today. While most of the popular programming languages are multi-paradigm, the support to object-oriented programming is fundamental for large projects. Of course OOP has its share of critics. Nowadays functional programming seems the new trendy approach. Still, criticism is due mostly to misuse of OOP.

Sorting Records in a Form
Use the drop-down menus to complete the steps for sorting records in a form.
1. Open the form in the standard form view.
2. Put the cursor in the
to use for sorting.
3. Open the
4. In the Sort & Filter group, click
v tab.

Answers

Answer:

1. Open the form in the standard form view.

2. Put the cursor in the field to use for sorting.

3. Open the Home tab

4. In the Sort & Filter group, click ascending or descending

Explanation:

Took the test :)

The complete forum to complete the steps for sorting records in a form is discussed below:

What do you mean by speed records?

You can specify the order of the records that are returned for each navigation query by sorting. It can be adjusted either globally or for each query. You can specify the number of characteristics and the ascending or descending order of pairs of values when submitting a simple navigation request.

Launch the default form view by opening the form.

2. Position the cursor within the field you want to sort.

3. Click on the Home tab.

4. Select either ascending or descending in the Sort & Filter group.

Learn more about sorting records here:

https://brainly.com/question/13130958

#SPJ1

Viruses and Malware Complete the case project on page 82 of the textbook by researching two types of viruses, two types of malware, and two types of denial of service attacks using the internet or any other type of resource available to you. Next, write at least a two page paper in current APA format that lists each of the researched items, how they are used to attack a system or network, and what types of defenses can be put in place to protect against those attacks. Find an article which describes the compromise of a company organization through a virus or malware. Write a one page paper in APA format summarizing the security incident and how it was resolved or what actions could have been taken to prevent it.

Answers

Hi, I provided you a general guide on how to go about your writing your research paper.

Explanation:

Note, the current APA (American Psychological Association) format is the APA 7th Edition. This format details how a researcher should state the findings, sources, conclusion, etc.

Hence, you can begin writing the assigned paper only after gathering the needed data.

Other Questions
where would a car traveling on a roller coaster have the most kinetic energy ? and why? HELPPP W TRIANGLE ABC graph!!?? What was school like during the civil war in the north? Glucose supplies your muscles with which of the following:bloodOxygenwaterenergy Which statement about the linear factors and zeros of a quadratic function is alwaystrue?A. The constants of the linear factors are the opposite of the function's zeros.B. A function's zeros can be determined by setting each linear factor equal to 0 andsolving.C. If a function's zero is an integer, then the coefficient of the variable in the linear factormust be one.D. Multiplying the constants of the linear factors gives one of the function's zeros, andadding the constants gives the other zero. What is Wiesel trying to do in this passage?A. Define what the word indifference means to himB. Remind his audience of the horrors of the 20th centuryC. Show his excitement for advancements in technologyD. Thank the United States for fynghting against suffering in kasovo 9. Pandemics occur when a disease is spread through large populations. Which is the bestexample of a pandemic that has impacted the human population?a. Strep throatb. The common coldc. Chicken poxd. Small pox The value of a piece of land in a town is increasing every year . Its value, in dollars, t years after 1970 and until 2001 can be modeled by the function 31, 000(1.001) ^ t . What is the domain of the function ? A. All whole numbers greater than or equal to 1971 and less than or equal to 2001 . B. All real numbers greater than or equal to 1971 and less than or equal to 2001 . C . All non - negative real numbers less than or equal to 31. D. All whole numbers less than or equal to 31 Help me PLEASE i will give brainlyestWhich claim best responds to the writing prompt? Writing prompt: In 1945, the United States dropped atomic bombs on the cities of Hiroshima and Nagasaki in Japan. Some historians say that these attacks ended the war. Other historians say that Japan would have surrendered anyway. Do you think the dropping of atomic bombs was justified? Support your reasoning. A. Some historians think that millions more Americans and Japanese would have died had the United States invaded Japan instead of dropping the bombs. B. There are arguments for and against the dropping of atomic bombs on Japan, and it is not clear if the United States was justified in using such weapons C. The dropping of atomic bombs on Japan was justified because there was no guarantee that Japan would have surrendered otherwise D. Over 200.000 Japanese people were likely killed because of the atomic bomb attacks on Hiroshima and Nagasaki, and many more were wounded ced-vfrj-yiuev.eyo.ne joi.n.thro.ugh goog.le m.eet HELP ME PLEASEEEEEEEE Find the shaded area. Read the sentences.Many vegetables are the roots of plants. Carrots are roots. Beets are as well. However, carrots are usually long and slender, while beets are red and round.Which word or words signal that two things are being compared? Which describes the effect of the transformations on the graph of f(x) = x^2 when changed to f(x) = 3(x+2)^2 - 4 A garage door code has 5 digits. If no digit is repeated, how many codes are possible?Hint: the possible digits are 0-9 I need help with this . Briefly describe the simplest heat treatment procedure that would be used in converting a 0.76 wt% C steel from one microstructure to the other, as follows: (a) Martensite to spheroidite (b) Spheroidite to martensite (c) Bainite to pearlite (d) Pearlite to bainite (e) Spheroidite to pearlite (f) Pearlite to spheroidite (g) Tempered martensite to martensite (h) Bainite to spheroidite Find the gradient of the line segment between the points (-2,7) and (1,5). Give your answer in its simplest form. The sum of twice a number, n, and 14 is 30. Write an equation that models thisstatement. Then explain how you might use reasoning to find the value of n. Which best describes the error in finding the surface area of the cylinder? T^T