To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on the Arduino board.

Answers

Answer 1

Answer bobobobobobobobo


Related Questions

explain why the computer is powerful working tool???​

Answers

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

Use the ________ predefined formats to quickly format cells.

Style Formats
Cell Styles
Cell Definitions
Cell Formats

Answers

Cell formats because I took it aboit 5 times and that was the answer so yeah

Answer:

I think choose (2)

Cell styles

Choose the term that matches each description.

_____________ allows users to interact with computer hardware and application software.

______________allows users to complete specific tasks, such as creating a document.

______________allows programmers to create new applications.

Answers

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:

The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.

Thus, the answer is "operating systems, word software, and end-user computer concepts".

Learn more:

brainly.com/question/17798901

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

whats the answer :)?
i will give brainslist​

Answers

Answer:

Transmission medium is the answer

write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​

Answers

Answer:

The program is as follows:

10 INPUT RADIUS, BASE, HEIGHT

20 CIRCLE = 3.142* RADIUS * RADIUS

30 TRIANGLE = 0.5* BASE * HEIGHT

40 PRINT CIRCLE

50 PRINT TRIANGLE

60 STOP

Explanation:

The program description doesn't tally;

In other words, it is impossible to calculate the area of a triangle using the radius of a circle.

So, I designed the program to get input for radius, base and height.

Get input for radius, base and height

10 INPUT RADIUS, BASE, HEIGHT

Calculate area of circle

20 CIRCLE = 3.142* RADIUS * RADIUS

Calculate area of triangle

30 TRIANGLE = 0.5* BASE * HEIGHT

Print area of circle

40 PRINT CIRCLE

Print area of triangle

50 PRINT TRIANGLE

End of program

60 STOP

what is the best programming language

Answers

Answer:

Ther are 8 best programming language :

• Javascript

• Swift

• Scala

• Go

• Python

• Elm

• Ruby

• C#

Two use of dovetail saw

Answers

Answer:

They are particularly use when it is use for cutting small or very precise cut. They are particularly use in joint making mostly dovetail joints

hope it helps

PLEASE I NEED HELP FAST

Answers

Answer:

your answer will be src=

pls any one what is pheumatic and hydrautic ​

Answers

Answer:

pheumatic is a branch of engineering that make use of gas

hydraulic is a technology and aplied science using engineering

The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this queue, returning null if this queue is empty retrieves and removes the head of this queue, or null if this queue is empty retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty retrieves and removes the head of this queue and throws an exception if this queue is empty

Answers

Question:

The remove() method in the Queue interface ________.

A. retrieves, but does not remove, the head of this queue, returning null if this queue is empty

B. retrieves and removes the head of this queue, or null if this queue is empty

 

C. retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Answer:

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Explanation:

In Java, the Queue interface is found in the java.util package and inherits from the Collection interface. It is used to store elements which are processed in the order in which they are inserted. This means that the first element will be processed first.

The Queue interface has many methods. Some of them are;

i. add(): allows elements to be added to the queue.

ii. remove(): retrieves and removes elements from the head of the queue. The head of the queue points to the first element of the queue. If the queue is empty, the remove() method throws an exception called the NoSuchElementException

iii. poll(): retrieves and removes the element at the head of the queue. Unlike the remove() method, if the queue is empty, a null is returned.

iv. peek(): retrieves but does not remove the element at the head of the queue. Just like the poll() method, a null is returned if the queue is empty.

how is a trade off best described ?

dilema
compromise
demand
complication

Answers

I think the answer is compromise <3

alguien me prestta una cuenta de osu!, porfa

Answers

Answer:

english please........

E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?

Answers

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

what are the advantages of saving files in a cloud?
Please help!! ​

Answers

When using cloud storage, one of its main advantages is the accessibility and its ability to not get deleted as easily. Once a file is uploaded to the cloud, you can access it from almost any device as long as you have connection. And it’s not as easy from something to get accidentally deleted, as there is a backup.

list 5 uses of computer​

Answers

Answer:

if you a student..then you need it for sure

Explanation:

Microsoft Office

Doing assignment

doing report

answer online test/quiz

movie

make money

typing

play game

A channel or path through which the data or information is transferred form one place to another in a computer network is called

Answers

Answer: Data Transmission mode defines the direction of the flow of information between two communication devices.

Explanation:

It is also called Data Communication or Directional Mode. It specifies the direction of the flow of information from one place to another in a computer network.

A channel or path through which the data or information is transferred form one place to another in a computer network is called communication channel.

What is communication channel?

Information is transported from one network device to another over a communication channel.

Data is transported across wired channels using cables and wires. Without using cables or wires, wireless channels transmit data from one device to another.

Data communication is the process of transferring data from one device to another via a transmission medium of some kind.

The system bus is a network of wires and connectors that carries data between a computer's primary memory and its processors.

For data and control signals travelling between the main parts of the computer system, the bus offers a communication path.

Thus, communication channel is the path for data transfer.

For more details regarding communication channel, visit:

https://brainly.com/question/13649068

#SPJ6

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST

Answers

Answer:

C

Explanation:

WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.

A customer in a store is purchasing five items. Write a program that asks for the price of each item, and then displays the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 7 percent. Display all results, properly labeled, as numbers with two digits after the decimal point.

Answers

Answer:

Program approach:-

Using the header file.Using the standard namespace I/O.Define the main function.Display the enter price of 5 terms.

Explanation:

Program:-

//header file

#include<iostream>

#include<iomanip>

//using namespace

using namespace std;

//main function

int main(){

       const double SALES_TAX=0.07;

       double subTotal=0,total=0,taxAmount = 0,x;

       

       cout<<"Enter price of 5 items"<<endl;

       for(int j=0;j<5;j++){

               cin>>x;

               subTotal += x;

       }

       taxAmount = subTotal * SALES_TAX;

       total = taxAmount + subTotal;

       cout<<fixed<<setprecision(2)<<endl;

       cout<<"Sub total: "<<subTotal<<endl;

       cout<<"Sales Tax: "<<taxAmount<<endl;

       cout<<"Total: "<<total<<endl;

       

       

}

_______ are pre-defined formats used to quickly format cells.

Cell formats
Cell styles
Style formats
Cell definitions

Answers

Answer:

Cell format

Explanation:

Cell formats refers to the various styling options which can be applied to cells in other to change the appearance and the way data is being presented. A number of cell formats are predefined in excel spreadsheet which can be applied directly to data in other to change it's appearance without applying manual changes. With predined cell formats gives several alignment option, Font size, color and setting, the fill color and border options. This can be directly applied to cells or tables to gives a good appearance of the data.

write an algorithm to find perimeter of circle

Answers

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false​

Answers

Answer:

The correct answer is True.

Explanation:

The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.

Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.

Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.

Cheers

Write a structured algorithm that prompts the
user to input two numbers. The algorithm should
multiply both numbers and then prompt the
user to enter the answer. The algorithm should
compare the answer entered with that calculated
and output "correct answer" or "incorrect answer"
accordingly. At the start, input how many sums
will be done.

Answers

Answer:

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

Explanation:

Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.

Required :

Two inputs ; num1 and num2

Expected output

Algorithm :

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;

Both are compared and the output of the comparison is displayed (either correct oe incorrect)

Identify characteristics of object-oriented programming design. Choose all that apply


-It breaks the solution into independent objects.


-it is a simple, uncomplicated approach to programming.


-It uses objects that send data to other objects.


-It supports a modular design that encourages the reuse of code.

Answers

Answer:

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Explanation:

Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program

An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code

Therefore, the correct options are;

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Answer:

all expect b

Explanation:

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]

a. style lines

b. edge lines

c. borders

d. underlines

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

5 QUESTIONS, BRAINLIEST, PLEASE ANSWER

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?

input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number with a decimal?

float()
int()
print()
string()

Answers

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

Answer:

Cheri's should use  input()

A way to store a sequence of letters, numbers, or symbols

Jabari hould  use float()

Which function converts the user's input to a number with a decimal it is float()

candyCost = input("How much is the candy?")

What is machine level language ?​

Answers

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.

how many sections of a job description are there

Answers

Answer:

6

Explanation:

job title, job purpose, job duties and responsibilities, required qualifications, preferred qualifications and working conditions.

Other Questions
The values used in the scale of pH and pOH are derived from a system designed by ______.CurieGordonsenDaltonSorenson Find the Pythagorean triplets whose one number is 24. Statement of Cash Flows (Indirect Method)Use the following information regarding the Lund Corporation to (a) prepare a statement of cash flows using the indirect method and (b) compute Lund's operating-cash-flow-to-current-liabilities ratio.Accounts payable increase $13,500Accounts receivable increase 6,000Accrued liabilities decrease 4,500Amortization expense 9,000Cash balance, January 1 33,000Cash balance, December 31 22,500Cash paid as dividends 43,500Cash paid to purchase land 135,000Cash paid to retire bonds payable at par 90,000Cash received from issuance of common stock 52,500Cash received from sale of equipment 25,500Depreciation expense 43,500Gain on sale of equipment 6,000Inventory decrease 19,500Net income 114,000Prepaid expenses increase 3,000Average current liabilities 150,000a. Use negative signs with cash outflow answers.LUND CORPORATIONStatement of Cash FlowsFor Year Ended December 31Cash Flow from Operating ActivitiesNet Income AnswerAdd (deduct) items to convert net income to cash basisDepreciation AnswerAmortization AnswerGain on Sale of Equipment AnswerAccounts Receivable Increase AnswerInventory Decrease AnswerPrepaid Expenses Increase AnswerAccounts Payable Increase AnswerAccrued Liabilities Decrease AnswerCash Flow Provided by Operating Activities AnswerCash Flow from Investing ActivitiesSale of Equipment AnswerPurchase of Land AnswerCash Used by Investing Activities AnswerCash Flow from Financing ActivitiesIssuance of Common Stock AnswerRetirement of Bonds Payable AnswerPayment of Dividends AnswerCash Used by Financing Activities AnswerNet Decrease in Cash AnswerCash at Beginning of Year AnswerCash at End of Year Answerb. Operating-cash-flow-to-current-liabilities ratio (Round answers to two decimal places.) Assume that you purchased a new car today and financed $55,000 of the price on a 72-month payment contract with a nominal rate of 6.00%. Further, assume that you plan on paying off the balance of the car loan after you make your 48th payment. How much will your loan balance be when you pay off the car? How many milliliters of a 0.40%(w/v) solution of nalorphine must be injected to obtain a dose of 1.5 mg? which rock layer is the youngest? The three steps which will create triangular arbitrage profit are as follows: first step, convert ____; second step, convert _______, and third step, convert ______. a) USD to GBP; CHF to GBP; CHF to USD b) USD to GBP; GBP to CHF; CHF to USD c) USD to CHF; GBP to CHF; GBP to USD d) USD to CHF; CHF to GBP; GBP to USD The triangle on the right is a scaled copy of the triangle on the left. Identify the scale factor. Express your answer in simplest form. as a student what can be your greatest contribution to the community? what is the value of a+bc when a=4, b=6 and c =2? also please include how to do it step by step :) Explain whether each of the following statements is true or false. The marginal rate of substitution (MRS) diminishes as an individual moves downward along the demand curve. Assume the statement refers to good X with price Upper P Subscript Upper X , where good X is measured on the horizontal axis of an indifference map and good Y is measured on the vertical axis. A 17-kg sled is being pulled along the horizontal snow-covered ground by a horizontal force of 33 N. Starting from rest, the sled attains a speed of 1.6 m/s in 9.8 m. Find the coefficient of kinetic friction between the runners of the sled and the snow. Two identical ambulances with loud sirens are driving directly towards you at a speed of 40 mph. One ambulance is 2 blocks away and the other is 10 blocks away. Which of the following is true? [Note that pitch = frequency.]a) The siren from the closer ambulance sounds higher pitched to you.b) The siren from the farther ambulance sounds higher pitched to you.c) The pitch of the two sirens sounds the same to you.d) The siren from the farther ambulance sounds higher pitched, until the closer ambulance passes you. solar panels use which form of energy pls help being timed 20 pointsThe Governors Office of Indian Affairs has the responsibility ofoverseeing the operation of Washingtons Indian casinos.establishing the borders of tribal nations in Washington.helping the tribes and the state of Washington work together.writing laws and regulations for Washingtons tribal nations. A certain smelting plant operates 24 hours per day, with three shifts of 200 workers per shift. Due to a flu epidemic, 1/4 of the workers on the first shift, 10 percent of the workers on the second shift, and 100 of the workers on the third shift are unable to work on a given day. If each worker and each shift has the same productivity, what is the approximate percent decrease in productivity due to the flu epidemic? The present value of a perpetual tax shield increases as the firm's tax rate ________ and as the amount of the debt ________. a. increases; increases b. increases; decreases c. decreases; decreases d. decreases; increases In September, the Intertropical Convergence Zone is shifted to:________a. the north of the Isthmus and winds blow across the Isthmus from the northeast. b. the north of the Isthmus and winds blow across the Isthmus from the southwest. c. the south of the Isthmus and winds blow across the Isthmus from the northeast. d. the south of the Isthmus and winds blow across the Isthmus from the southwest Equilibrium constants for gases can be expressed in terms of concentrations, Kc, or in terms of partial pressures, Kp. Which one of the following statements regarding Kc and Kp is correct?a. Kc and Kp are equal when all stoichiometric coefficients in the balanced reaction equation equal one. b. Kc and Kp are equal when the conditions are standard (P= 1 atm, T=298 K) c. Kc and Kp are equal when the sum of the stoichiometric coefficients for the products equals the sum of the stoichiometric coefficients for the reactants. d. Kc and Kp can never be equal. e. Kc and Kp have the same values but different units. In a non-mutated DNA strand, what base pairs with guanine?