Answer:
Roof.
Explanation:
I don't know, lol.
what is a password attack?
Answer:
A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.
Answer:
A hacker trying to hack into your accounts/systems by cracking your password.
Binary to Denary
11101111=
1111111=
Answer:
1110111= 239
1111111=127
Explanation:
The method is 1 ,2 ,4 ,8 16, 32 ,64 let me know if this helped g
PLEASE I REALLY NEED HELP
I have an hp laptop and it is FROZEN!! I cannot press x out of any of my tabs and the whole thing is frozen but I can pull up my settings and I can move my mouse. Shutting it off/down didn't work and it's still frozen please tell me what to do. also, will restarting it log me out of my whole account(s)? I NEED HELP PLEASEE
First try shutting down your computer for 5 minutes.
Turn it on if tabs are still open, try to right click it and press delete if you have that.
if you have none of your acounts try to make anew accounts the add a account to the new account you just made. still having peroblems, let me know?
Answer:
wait to it dies or hold the shut down button till it turns off
Explanation:
Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is
this?
А. NIC
В. hub
C. modem
D. switch
E. bridge
What is the base of a number system?
A.
the minimum number of digits needed to represent a number in that system
B.
the place value of the leftmost digit in numbers written in that system
C.
the place value of the rightmost digit in numbers written in that system
D.
the number of symbols used to represent numbers in that system
Answer:
A
the minimum number of digits needed to represent a number in that system
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Answer and explanation:
There are many benefits of writing functions that use parameters and return. Some of them are:
1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.
public void showName(String name){
System.out.println("Your name is " + name);
}
To call this method (function), the programmer could use various values for the name parameter used in the function like so:
showName("John");
showName("Doe");
If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.
2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.
For example:
public String getDouble(int x){
int y = x * 2
return y;
}
The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.
Write a program to generate the following series using nested loop.
1
2
12345
22
1234
12
222
123
123
1234
2222
12
12345
22222
1
Answer:
12 3456 2.2 12 .222 234 806 227 6697
Answeete
Explanation:
17. What is something an employer might look for in person when hiring? (3
points)
A. Someone with a positive attitude
B. Someone with positive qualities such as honesty, tolerance, and
patience
C. Someone easy to work with
D. All of the above
Which pair of devices have the same input motion and different outputs?
scissors and adjustable wrench
nutcracker and can opener
musical instrument and adjustable wrench
salad tongs and nutcracker
Answer:
nutcracker and can opener
Explanation:
Search online for the various configuration processors available. Mention the brand names that are widely used.
Answer:
Some of the configuration processors that are available are:
Phenom X4: Phenom X4 is the first quad-core microprocessor family that depends on K10 microarchitecture. Phenom X4 CPUs make use of four-digit model numbers that begin with 9. The remaining three digits in the model number show relative processor performance.
Athlon: Athlon is a seventh generation x86 processor. Athlon dynamically buffers internal microinstructions at runtime. These microinstructions result from parallel x86 instruction decoding.
Sempron: The first Sempron CPUs depended on the Athlon XP architecture using the Thoroughbred or Thorton core. These models were equipped with the Socket A interface, 256 KiB L2 cache, and 166 MHz front-side bus (FSB 333). These models use different technologies and CPU socket formats.
Opteron: Opteron is AMD's x86 server and workstation processor line. It was the foremost processor to support the AMD64 instruction set architecture. The Opteron processor has an integrated memory controller that supports DDR SDRAM, DDR2 SDRAM, or DDR3 SDRAM (depending on the processor generation). This both decreases the latency penalty for accessing the main RAM and does not require a separate northbridge chip.
The brand names widely used are Intel and AMD.
The configuration processors available are
Phenom X4AthlonSempronOpteronIntel and AMD are the two most commonly utilized brand names.
What are configuration processors?The path through a business process or operation is represented by a processor. By selecting the Configure option with the right mouse click, you can configure a processor. A processor's type and name are automatically the same.
The computer needs both processing power and instructions, which the processor delivers. The clock speed of a processor should be your first consideration. Your computer will run faster if the clock speed is higher.
Different architectures are used to build the various CPU kinds. Processors with one, two, four, six, eight, or twelve cores are the most common types of CPUs.
Learn more about configuration processors, here:
https://brainly.com/question/10710240
#SPJ5
WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also change to tell more of the what?
Group of answer choices
game creation process
instructions
game story
animation
Answer:
Game story
Explanation:
Answer:
Game Story
Explanation:
What can we do to positive interaction online?
Answer:
We can help eachother out with things.
Explanation:
Eg. Schoolwork and homework because our stress level will decrease.
On December 9, 1698, computer inventor Douglas Engelbart demonstrated many new computing technologies, including the computer mouse. His demonstration was so important that it became known as “The Mother of All Demos”. It would be at least two decades before some of the technologies he demonstrated saw widespread use, but all of them are used by people today. Here is a list fo some of Engelbart’s technologies. Which ones do you use today? The computer mouse, video conferencing hypertext links, word processing, or collaborative real-time editing
Answer:
all of them
Explanation:
Answer: All trust guy above
Explanation:
.
Help me please. I'LL MARK BRAINIEST
Answer:
A and B
Explanation:
yes
When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС
Answer:
c,becauses she is helping
Explanation:
thank me later
Answer:
A
Explanation:
i got a 100
In the human digestive system, which mechanism is responsible for cutting and grinding food?
A) organ
B) stomach
C) teeth
D)
intestines
Answer:
teeth
Explanation:
Approximately how many tweets are posted on Twitter each day? 500 500 thousand 500 million 500 billion
Answer:
around 500 million
Explanation:
navy use sonar method to locate the position of submarine under water .the waves used in sonar are
is this very epik or not?
Answer:
e p i k ༼ つ ◕_◕ ༽つ
Answer:
much epic
Explanation:
Where do the projection lines converge in a perspective sketch?
Answer:
Option B, Vanishing point
Explanation:
The complete question is
Where do the projection lines converge in a perspective sketch?
A. the ground line
B. the vanishing line
C. the eye point
D. the horizon line
Solution
A point lying on the image of a perspective drawing where the drawings ( two-dimensional perspective projections) of two parallel line meet in three dimensional space is known as Vanishing point
Ugh these are hard questions
Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
After skimming a message, you can mark it as
if you want to come back to it later.
Categories are color coded and can be renamed and sorted in the
pane.
The Outlook command for “flagging” a message is called
.
Flagged messages can be viewed in the
and can be customized for name, due date, and reminders.
Answer:
unread
message
follow up
to-do bar
Explanation:
what is the mass of a cookbook
Answer:
it varies on the size of the cookbook
Explanation:
Which of the following types of information can be stored in an electronic database?
-Text
-Alphanumeric
-Date
-All of the above
The types of information that can be stored in an electronic database is text, alphanumeric, and also date. The correct option is D.
What is a database?A database is a structured collection of information or data that is typically stored electronically in a computer system. A database management system is usually in charge of a database (DBMS).
Any collection of data or information that has been specially organized for rapid search and retrieval by a computer is referred to as a database.
Databases are designed to make it easy to store, retrieve, modify, and delete data in conjunction with various data-processing operations.
Text, alphanumeric, and date information are all examples of information that can be stored in an electronic database. A database's five major components are hardware, software, data, procedures, and database access language.
Thus, the correct option is D.
For more details regarding a database, visit:
https://brainly.com/question/6447559
#SPJ3
Answers are 1-11, 3 is wrong
Answer:is the python
Explanation:
Use repl .it
The image shows a bar graph.
A bar graph shows a series of 4 vertical bars along an x and y axis.
In which scenarios would using this graph be best for a presentation? Check all that apply.
showing change in a community’s average median age over a century
comparing the percentages of the types of pets owned in a community
showing how the world’s shark population has changed over 50 years
comparing the number of men and women who earned engineering degrees in a decade
showing the percentages of the various religions practiced in Indonesia
Answer:
showing change in a community’s average median age over a century
showing how the world’s shark population has changed over 50 years.
comparing the number of men and women who earned engineering degrees in a decade
Explanation:
Rebecca's school has planned an excursion to the nearest TV production studio. Rebecca noticed cameras on stands that send signals directly to
the production control room for collaboration with other cameras. Which camera is the production house using for recording?
OA
prosumer camera
OB
studio camera
OC.
DSLR camera
OD
Glidecam
Erin would like to add a photo to a presentation. However, she only has the printed copy of the photo. She does not have a digital copy. What should Erin do?
Answer:
Erin should scan the photo.
Took it on Edge <3
Answer:
Erin should scan the photo.
Explanation:
That´s what I thought :)
Select the correct answer.
Which of these factors can be created as a physical model?
OA
a next-generation car
OB.
software code
OC. website address
OD.
conversion of energy
O E knowledge of a product
A. a next generation car
Your ____ should always be bigger than your gutters