which animal is the computer to store data information and instruction ​

Answers

Answer 1

Answer:

human is the answwr of the quest


Related Questions

Which of these is a tool for creating mobile apps?

Appy Pie

C#

Apple Pie

C++

Answers

Answer:

C++

Explanation:

C++ is used in application development

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.

Justify your answer with one valid reason for both the scenarios given below.

Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.

Answers

The packets would be encapsulated in single frame in scenario A. In scenario B, it should be in multi frames.

In scenario A, given that this network has been said to be prone to error, the packets should be encapsulated in single frames.

The reason for this is because, using a single frame helps to decrease error. We have been told already that it is prone to error. If you use the multi frame, there would be very high likelihood of errors occurring.

In scenario B, given that the network is accurate and very reliable, the best packet is the multi frame.

It would give a quicker transmission and the likelihood of errors occurring is also low.

Read more on https://brainly.com/question/24373056?referrer=searchResults

If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?​

Answers

Answer:

When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.

Explanation:

An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on what tools the page should use. These items would best fit in which of the following sections

a. The element
b. The element
c. The

element
d. The

element

Answers

An HTML is made up of several individual tags and elements such as the head, body. form, frame and many more.

In an HTML page, the meta element and the title element are placed in the head element.

An illustration is as follows:

< head >

< title > My Title < /title >

 < meta charset="UTF-8" >

< / head >

The head element contains quite a number of elements and tags; some of them are:

metatitle stylescriptbase

And so on.

Hence, in order to use a meta-data element, the meta element has to be placed within the head element.

Read more about HTML elements at:

https://brainly.com/question/4484498

Why use LinkedIn automation for LinkedIn?

Answers

Answer:

Using LinkedIn automation tools to run successful outreach campaigns has become popular. It’s because these tools automate tedious networking tasks such as visiting profiles, collecting data, sending out bulk connection requests, messages, and follow-ups, etc.  

With the help of the latest LinkedIn automation tools, you can quickly perform all the repetitive tasks while saving yourself a lot of time that you can use on actual relationship building and lead nurturing tasks.  

However, LinkedIn isn’t really amused when using any bots or automation tools for LinkedIn.

Suppose we can buy a chocolate bar from the vending machine for $1 each. Inside every chocolate bar is a coupon. We can redeem six coupons for one chocolate bar from the machine. This means that once you have started buying chocolate bars from the machine, you always have some coupons. We would like to know how many chocolate bars can be eaten if we start with N dollars and always redeem coupons if we have enough for an additional chocolate bar.For example, with 6 dollars we could consume 7 chocolate bars after purchasing 6 bars giving us 6 coupons and then redeeming the 6 coupons for one bar. This would leave us with one extra coupon. For 11 dollars, we could consume 13 chocolate bars and still have one coupon left. For 2 dollars, we could have consumed 14 chocolate bars and have two coupons left.Write a program that inputs a value for N and outputs how many chocolate bars we can eat and how many coupons we would have left over. Use a loop that continues to redeem coupons as long as there are enough to get at least one chocolate bar.

Answers

Answer and Explanation:

Using JavaScript:

/* program should take N input which represents the dollar amount and output how many chocolate bars and how many coupons we have*/

function chocolatebar(dollars){

var dollaramt= dollars;

var i;

for(i=0; i <= dollaramt; i++){

i=i+6

?

Alert ("you have 1 extra chocolate bar");

:

Alert ("keep buying chocolate bars to get more coupons for a bonus chocolate bar")

}

}

*

what is the build in libary function to compare two strings?​

Answers

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

How to use the AI System ?

Answers

ANSWER:

· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.

What is the iterative procedure of recursive and nonrecursive?

Answers

Answer:

nonrecursive

Explanation:

They are correct? thank you!

Answers

Answer:

[OPINION]

First one is correct.

For the second one, I think the leader should accept the invitation and forward it to the entire team. [As the team experienced success due to group work, so every team member should be invited... as the success was a result of the hardwork of every member]

About the third one, I think it depends on the person so you may be correct. But, if I was asked to choose I would have been chosen.... rational approach

This is just my opinion. Hope it helps you:)

When we have signals within 1-2 MHz band, using a waveguide is the most preferred choice for a transmission line. T or F?​

Answers

Answer:

T

Explanation:

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.

Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?

Answers

The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.In this method, the subnetting separates the IP address between host and network addresses.The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]

Subnet numbers [tex]\bold{= 13}[/tex]

Calculating the borrow bits:

[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]

a)

Calculating the dotted decimal value for the subnet mask:

[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

advantages of computational skill

Answers

Explanation:

algorithmic thinking - developing a set of instructions or sequence of steps to solve a problem;

evaluation - ensuring a solution is fit-for-purpose;

decomposition - breaking a problem down into its component parts;

What is system software? Write its types.​

Answers

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Explanation:

thanks for question

Imagine that you wanted to write a program that asks the user to enter in 5 grade values. The user may or may not enter valid grades, and you want to ensure that you obtain 5 valid values from the user. Which nested loop structure would you use?
A. A "for" loop inside of a "while" loop
B. A "while" loop inside of a "for" loop
C. None of the above
D. Either a or b would work

Answers

The type of nested loop which I would use to write the program is:

B. A "while" loop inside of a "for" loop

What is a Loop?

This refers to the control flow statement which is used to iterate and lets a particular line(s) of code execute repeatedly

With this in mind, we can see that the type of nested loop which I would use to write the program is a "while" loop inside of a "for" loop because it is a conditional statement that continues to ask for the certain valid grades until it gets the right one.

Therefore, the correct answer is option B

Read more about loops here:
https://brainly.com/question/26098908

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

Neymar machine that Run on electricity

Answers

"Neymar" = "name a"?

if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo

if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.

I need someone to explain gor me python coding!

Answers

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

Identify the statement about Windows tasks that is FALSE.


To launch an application, click the Windows icon, select "All Programs," and then click an application.


The boot process is the process for powering off a computer.


A common way to shut down the computer’s operating system is by using the Start menu.


Users log into their accounts on the Welcome screen, before Windows is ready to use.

Answers

The statement about Windows tasks that is FALSE is

The boot process is the process for powering off a computer.

According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.

As a result of this we can see that  in launching an application;

we need to click on Windows iconselect "All Programs," click an application.

Therefore, The boot process is not the process for powering off a computer.

Learn more about Windows tasks .

https://brainly.com/question/1594289

The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.

The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.

Learn more about the boot process here.

https://brainly.com/question/24355262

#SPJ6

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be

Answers

558c::d367:7c8e:1216:0:66be

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents

Answers

Answer:

D. Excessive disk space consumption due to storing large documents.

Explanation:

When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.

To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure

Answers

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

Other Questions
Read the paragraph. Then answer the question that follows.Perhaps you wanted pizza for dinner, but were out voted by the rest of the family who wanted chili. This is similar to what happens in a community. One person has to give up a right for the good of the group. Sometimes citizens' duties and rights conflict with each other. A good example is a public protest. People have the right to meet in groups and share ideas. However, a protest can disrupt traffic or other normal activities. A city must provide extra police protection to keep people safe. Therefore, the city has the right to require permission in advance for a protest. Government must make laws to balance the rights of individuals and different groups of people.Which of the following statements best describes this paragraph? The paragraph contains categories of comparison. The paragraph contains a simile. The paragraph contains no text connections. The paragraph contains an analogy. Is u=12 a solution of 8u1=6u? Solve the following formula for a. 1) Esses textos tm em comum o fato de * 1 ponto A) serem textos informativos. Ambos os textos esto centralizados em fatos/acontecimentos. B) serem textos argumentativos. Ambos os textos narram histrias envolvendo personagens. C) serem textos epistolares. O TEXTO 01 uma carta pessoal e o TEXTO 02 uma carta aberta. D) serem textos epistolares. O TEXTO 01 uma carta aberta e o TEXTO 02 uma carta pessoal. 2) No TEXTO 01, a expresso "Muito cordialmente," utilizada na despedida tpica da linguagem * 1 ponto A) cientfica. B) coloquial. C) formal. D) regional. why are ghost always hungry? Triangle DEF has sides of length x, x+3, and x1. What are all the possible types of DEF? using Euclids division algorithm, find the largest number that divides 475 and 871 leaving 7 as the remainder in each case Hy tm hm gc f(t) c hm nh Laplace nh di y:F(p)=6/p(2p^2+4p +10) A space ship has four thrusters positioned on the top and bottom, and left and right as shown below. The thrusters can be operated independently or together to help the ship navigate in all directions.Initially, the Space Probe is floating towards the East, as shown below, with a velocity, v. The pilot then turns on thruster #2.Select one:a.Space ship will have a velocity to the West and will be speeding up.b.Space ship will have a velocity to the East and will be speeding up.c.Space ship will have a velocity to the East and will be slowing down.d.Space ship will have a velocity to the West and will be slowing down.e.Ship experiences no change in motion. Verify that (-x) is the same as x , for x = 4/5 why is important to have less children per teacher in a classroom? find the value of trigonometric ratio Which statement best describes the function h(t) = 210 - 15t?Oh is the function name; h(t) is the input, or independent variable; and t is the output, or dependent variable.O h is the function name; t is the input, or independent variable; and h(t) is the output, or dependent variable.O t is the function name; h(t) is the input, or independent variable; and h is the output, or dependent variable.Ot is the function name; h is the input, or independent variable; and h(t) is the output, or dependent variable. write the professional education of :i. JTAii. Foresteriii. Ranger ng vua u tin ca nc php l ai ? Why did the Russian Empire collapse? Question 7 of 20Which strategy best represents one way a writer can keep readers engaged?A. Move the narrative along as fast as possibleB. Include as many details as possibleC. Order the events from most interesting to least interestingD. Provide transitions for shifts in topic, mood, and timeSUBMIT I need help plss ( math ) SOMEONE ASAP few Grammer tick Questioncan you solve it Q.5(b) The population {(P) in millions} of a country is estimated by the function, P=125e0.035t, t = time measured in years since 1990. (a) what is the population expected to equal in year 2000 (b) determine the expression for the instantaneous rate of change in the population (c) what is the instantaneous rate of change in the population expected to equal in year 2000.