Answer:
its D
Explanation:
took the test
Answer:
d
Explanation:
Which was the first computer network in the world
Answer:
ARPAnet in 1969
Explanation:
hope this helps :)
Suppose you wanted to quickly take a photograph of a dew drop on a rose petal before it rolled off. Which camera mode would be most
appropriate?
A: landscape
B: L
C: macro
D: M
Answer:
The answer is M
Explanation:
EDGE 2022
When comparing systems software and application software, what is the main difference?
Answer:
it is a
Explanation:
i did the test
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
please help me
...
....
Answer:
formal information searches
Explanation:
Answer:
informal information source
hope it will help if it helps please ask me in comment
Which is an email protocol that retrieves email without deleting the email and its attachments from the server?
Simple Mail Transfer Protocol (SMTP)
Internet Message Access Protocol (IMAP)
Post Office Protocol version 3 (POP 3)
Simple Network Management Protocol (SNMP)
Answer:
Internet Message Access Protocol (IMAP)
Explanation:
The "Internet Message Access Protocol" or IMAP was created by Mark Crispin at the Stanford Knowledge Systems Laboratory. It allows a person to access his email from his local server. In comparison to the Post Office Protocol Version 3 (POP 3), which deletes the emails once they are downloaded, the IMAP allows the contents to be saved on the server. The email will only be deleted if the user intends to do so.
Answer:
It is Pop 3 not IMAP
Explanation:
Correct on edg 2022
This is your data.
A= [5, 10, 15]
B = [2, 4, 6]
C = ['dog','cat', 'bird']
You can implement an array of this data with
Answer:
This is your data.
A = [5, 10, 15]
B = [2, 4, 6]
C = ['dog','cat', 'bird']
You can implement an array of this data with
either by using lists or by using the array module
ALSO
This is your code.
>>> A = [ 'dog', 'red']
>>> B = [ 'cat', 'blue']
>>> C = [ 'fish', 'green']
You can implement an array of this data by using
by using lists but not by using the array module
Explanation:
Edge2020
A= [5, 10, 15], B = [2, 4, 6], C = ['dog','cat', 'bird']. You can implement an array of this data either by using lists or by using the array module.
What is an Array?An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognized by at least one array index or key. Each element of an array is recorded such that a mathematical formula may be used to determine its location from its index tuple.
Indexed arrays, multidimensional arrays, and associative arrays are the three types of arrays.
A procedure called indexing selects a subset of values from an array. A value's position inside an array is indicated by its index. The location of the value in an array differs from the value itself.
To read more about Array, refer to - https://brainly.com/question/14375939
#SPJ2
Which of the following is a palette of colors, fonts and special effects which complement one another?
O Placeholders
O Theme
O Background
Slide Masters
Answer:
Theme
Explanation:
a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance
Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) were found ("The characters were found at ____ index.") or it says, "Those characters could not be found." The String to be searched (phrase) and the characters that are being looked for (chr) are passed in as arguments. (9 points) public static String stringSearch (String phrase, String chr) { ** Complete the code ** }
Do you need a internet browser to go to the intrnet?
Answer:
No you do not need a interent browzer to get to the internet.
Explanation:
explain how do compare and contrast graphic organizers help you to synthesize information?
Answer:
Answer: Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set.
Explanation:
Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set
What might the Internet of Things do in the future?
The future of IoT has the potential to be limitless. Advances to the industrial internet will be accelerated through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at hyperscale.
Use the drop-down menus to complete the steps to open the Lookup Wizard.
1. Open the table in ___
view.
2. Click in the ___
column of the desired field.
3. Click the ___
, and then click Lookup Wizard.
Answer: 1. design view 2. data type 3. arrow
Explanation:
I just did it :)
Using this feature keeps the message thread intact.
Reply
Opt out
New message
Signature
Answer:
Option 1: Reply is the correct answer.
Explanation:
Emails are used for business and official communications.
Let us look at the options one by one
Reply:
The reply option opens the email editing window. When the reply option is used the emails then are arranged in the form of a message thread. So the reply option keeps the message thread intact.
Hence,
Option 1: Reply is the correct answer.
What genre do games that involve physical challenges and make use of hand-eye coordination, speed, accuracy, and precision fall into?
adventure
action
simulation
puzzle
Answer:
flexiblity
feedback
playin outdoor game
Answer:
I think simulation not 100% sure though.
How did you generate a random number for the user to guess? by using the built-in randint function by using the built-in random function by using the random method from the random module by using the randint method from the random module
Answer:
by using the randint method from the random module
Explanation:
The randint() method is a method or function in the random python module. It is used to get or return an integer number within a specified range.
To use the method, the module must be imported into the python file with the "import random" statement, then the method is referenced using dot notation and specifying the range of integer numbers.
syntax: random.randint(first_number, last_number)
Note that the last number in the range is inclusive in the selection.
Answer:
A. randint
Explanation:
I got it right on a quiz
Software that requires excessive disk space or memory.
A. Malware
B. Excessware
C. Ransomware
D. Bloatware
Which technology will a business use to figure out who accessed confidential files on a company's computer system
Answer:
insaj cdsjl ljhwbalfhb
Explanation:
Any device that uses light to read and write information.
A. Optical Drive
B. Peripheral Device
C. Laser Device
D. Optical Device
Answer:
the answer is optical drive
Explanation:
hope that helps thanx optical drive uses reflected light to read data.
Match the example with the type of collection.
{'casa': 'house'}
[3, 5]
(3, 5, 'dog')
Answer: First is a dictionary, second is a list, and third is a tuple
Explanation:
Identify and summarize the features of the Windows 7 backup utility.
Answer:it is slow
Explanation: slow
Answer:
IT can create a backup it can restore a backup and probably more
Explanation:
Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play?
Group of answer choices
pseudostory
metagame
ludonarrative
iambic pentameter
Answer:
Explanation:
The answer is ludonarrative.
Please mark me brainliest.
Explaining AutoCorrect
How is the AutoCorrect feature useful in Outlook 2016? Check all that apply.
It checks for common typing errors.
It can automatically fix the error while you are typing.
It suggests email recipients that might be interested in your message.
It underlines words that need spelling and grammar corrections.
It ensures that you are emailing the correct recipients.
Answer:
1, 2 and 4
Explanation:
How Much did a case of soda (any kind your choice ) cost in 2004?
PLS HELP!!!!!!
Answer:
2004 88 cents for 2 cans
Explanation:
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
Answer:A
Explanation:
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.
PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(
Answer:
You need to first use the Sum function to add up all the costs of September.
Then divide each September cost by the grand total that you got. After that format the last column to be percentages.
Look at the attached file for the formulas used.
Drop a paper of A-4 size and a
piece of wood/plastic about 2-3
inches long, from a height more
than 10 feet. Note the time for both
to hit the ground. Now repeat the
experiment by folding the paper
once, twice, thrice... (as many
time as you can). Why every time
the travel time reduces for paper
and remains the same for
wooden/plastic piece. Does the
paper at any stage hit ground
before wooden/plastic piece? If
yes,
describe a tsunami when it is far from the coast
I hope it is helpful for you ......
Mark me as Brainliest ......Tsunamis are marine phenomena, created by the abrupt displacement of large amounts of water into an aquatic formation. Tsunamis manifest as waves, which travel in the deep waters of the oceans at an average speed of 756 kilometers per hour.
While in deep water the tsunami, due to its characteristics there, is not considered a serious danger to the floating structures, reaching the shores has particularly devastating consequences.
Learn more in https://brainly.com/question/15964056
So my teacher asked us to predict who would win in a death match, and we could choose the two characters, so Alastor from Hazbin Hotel vs Blackhat from villinous, who would win?
Answer:
I think alastor from Hazbin Hotel.
Answer:
alastor
Explanation:
i mean alastor is a demon and blackhat we dont know if he is a demon or not but i mean alastor would win he took down a flying ship that was trying to kill them