Answer:11
Explanation:
.
define client and.server
Answer:
Client-server model is a model is a distributed application structure that partitions
tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce
E. Non of the above
Answer:
c.B2b digital transaction
Explanation:
yan lang po sana makatulong
Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?
Answer: Rainforest
Explanation:
A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.
Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.
Describa las etapas del arranque de viruta
Answer:
Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.
A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.
Answer:
It means that users can only read or, depending on that platform, read and edit files in the folder
An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?
Answer:
You should use an "if" statement to check whether the number is greater than 18 or less than 65.
Explanation:
You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!
Select the three reasons that the gaming industry is set to grow.
A) more colleges offering jobs in game design
B) a decrease in the average age of gamers
C) an expanding market on mobile phones
D) expanding markets in Asia
E) new accessories that will attract more players
Answer:
expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones
Explanation:
Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432
Answer:
The Logitech ones.
Explanation:
Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.
Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool
Answer: Adjustment layer
Explanation:
The image editing tool or technique that should be used by Carter use is an adjustment layer.
The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.
By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.
Answer: B: an Adjustment Layer
Explanation: Correct for Edmentum/Plato
what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super
Answer:
B: micro
Explanations
a small computer that contains a microprocessor as its central processor.
In terms of technology, wich of the four devices is the most recent?
a. keyboard
b. joystick
c. scanner
d. camera
Recently mobile phones have been used to pay for goods in stores and supermarkets.
One methodof payment involves holding the phone close to a reader in the store.Discuss the advantages and disadvantages of this method of payment compared with other methods of credit/debit card transactions.
Answer:
The advantages of using mobile phones to pay for goods in stores are;
1) The ability to pay for goods and/or services without having to carry a physical wallet, thereby making payments faster, more convenient, and safer as the contents of a money wallet or purse cannot be seen
2) The generation of security codes for each transactions, the use of PIN input and finger sprint scanning for payment, ensures access to payment authorization is limited and requires definitive authentication and that payment transactions will not need to be scrutinized by merchants to detect fraudulent transactions
3) Paying with the mobile phone increases privacy as the card used for payment will be known only to the person doing the payment, thereby a person can use a credit card with low limit without displaying them
The disadvantages of using mobile phones to pay for goods in stores includes;
1) The possibility of breach in security of the mobile phone during payment. Sensitive information of the mobile phone can be collected during payment and then used in other places without the permission of the owner of the phone
2) Mobile phone payment may not be suitable to people who prefer card or cash payment
3) The different mobile phone payment applications and platforms are not entirely compatible and can lead to payment challenges
Explanation:
what is the most improved Android robot
Answer:
They are the humanoid robots.
Which option is not available in the Presenter view of a presentation?
Group of answer choices.
A. Next Slide Preview
B. Pen/Laser Pointer tools
C. Open Slide Show
D. Navigation Controls
Answer:
C. Open Slide Show
Explanation:
PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.
Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.
Basically, the views that are available on the Microsoft PowerPoint application includes;
1. Slide Sorter.
2. Notes Page.
3. Reading Pane.
4. Presenter view.
Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.
Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;
I. Next Slide Preview.
II. Pen/Laser Pointer tools.
III. Navigation Controls.
However, Open Slide Show is an option which is not available in the Presenter view of a presentation.
1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *
Answer:
Retailing.
Explanation:
La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.
An investment bank has a distributed batch processing application which is hosted in an Auto Scaling group of Spot EC2 instances with an SQS queue. You configured your components to use client-side buffering so that the calls made from the client will be buffered first and then sent as a batch request to SQS. What is a period of time during which the SQS queue prevents other consuming components from receiving and processing a message
Answer: Visibility timeout
Explanation:
The period of time during which the SQS queue prevents other consuming components from receiving and processing a message is known as the visibility timeout.
It is the length of time when a message will be hidden after such message has been grabbed by a consumer. It is essential as it prevents others from processing such message again.
Full from of Computer
: )
Answer:
COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.
Explanation:
In you question, it isn't from! it is form(;
Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.
But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.
Edhesive lesson practice 8.3, question 5
Answer:
3
Explanation:
Following are the correct python code to find the length of the given parameter value.
Python code to find length:print(len("stuff"))#printing length
Output:
please find the attached file.
Program Explanation:
In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.
Find out more about the length method here:
brainly.com/question/13527881
The smallest piece of information a computer can store is
Answer:
bit
Explanation:
confia
Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.
Answer:
2nd statement is True dear!!!
Answer:
Deques can contain lists.
A deque is a type of collection.
Deques can be created empty.
Explanation:
Answers can be found in Edge instructions
"You can make a deque whose members are lists."
"You can create an empty deque or create a deque with a list or a string."
"You have used lists and deques, which are two types of collections used by Python. "
PLEASEEEE HELPPP!!!!! Which graphic design tool should you use to achieve the effect in the image shown here?
A. Move
B. color and painting tools
C. Layers
D. Marquee
E. Crop
Will give brainlist if right!!! Thx
Answer:
I think the answer is b yep b
Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>
Answer:
<html>
<head> Cyber Bullying Tips </head>
<body>
Don't Respond, Talk to a trusted adult
</body>
</html>
In order to preview an attachment in an e-mail, click the attachment in the ______
Pane.
Help ASAP!!!!
Answer:
preview
Explanation:
plz mark it as brainliest answer as it will also give you 3 pts
Answer: I love you, I hope you figured it out. Thank your for being alive.
Explanation:
describe the uses of computer in different fileds? please help me
Answer:
Computers are used to perform several industrial tasks. They are used to design products, control manufacturing processes, control inventory, manage projects, and so on. Computers are used to control and manage different manufacturing systems and continuous running of the industry.
A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.
Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
DISPLAY(numFreezing/numDays)
}
B.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
C.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp < 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
D.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
numDays ← numDays + 1
}
}
DISPLAY(numFreezing/numDays)
Answer:
B.
Explanation:
The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.
numFreezing ← 0
numDays ← 0
FOR EACH temp IN temps {
IF (temp ≤ 32) {
numFreezing ← numFreezing + 1
}
numDays ← numDays + 1
}
DISPLAY(numFreezing/numDays)
One type of emerging technology that is used to track packages, manage inventory, and even identify pets is _____.
ASCI
EPD
Smart Card
RFID
Answer:
rfid
Explanation:
................
Answer:
e
Explanation:
e
When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology
Answer:
All of these answers
Explanation:
Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network
Port a number used within a computer to identify a specific process.
IP Address a numerical reference to a particular device in a network.
Server a computer that handles requests and returns data to other computers in a network.
Explanation:A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;
i. a file transfer protocol (FTP) could use a port number of 20 or 21.
ii. a simple mail transfer protocol (SMTP) could use a port number of 25
Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90
A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.
Answer:
IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network
port: a number used within a computer to identify a specific process
server: a computer that handles requests and returns data to other computers in a network
Explanation:
edge 2022
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.
He experienced phishing
Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Here are some measures to avoid phishing. You can pick up the one you liked the most
Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social mediaTelemedicine is the use of medical information exchanged from one site
to another via:
A.Written communication
B.Verbal communication
C.Print communication
D.Electronic communication
Answer:
D. Electronic communication
Explanation:
Telemedicine is the term given to the method of distributing the services and information related to the health through the means of electronic communication. This practice helps patients in the remote areas or geographically far areas to reach to the medical sources. The patients can get assistance and in touch with the doctors through video-conferencing or telephonic means.