Answer:
I'm sorry the answer is really difficult to understand, could you explain?
Explanation:
What is the main advantage of an MILC?
Answer:
What is the main advantage of an MILC?
Explanation:
MILC cameras combine some of the advantages of DSLR cameras along side the compactness, features and ease of use of point-and-shoot cameras. The main advantages are: A relatively compact and lightweight interchangeable lens camera. Utilizes a relatively large sensor (Micro Four Thirds, APS-C)
Hope that helped.
Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?
Answer:
No because the computer is programmed to answer in such way as that the user properly understands with either yes or no
Explanation:
A computer cannot evaluate an expression to be between true or false.
Expressions in computers are usually boolean expressions; i.e. they can only take one of two values (either true or false, yes or no, 1 or 0, etc.)
Take for instance, the following expressions:
[tex]1 +2 = 3[/tex] [tex]5 > 4[/tex] [tex]4 + 4 < 10[/tex]The above expressions will be evaluated to true, because the expressions are correct, and they represent true values.
Take for instance, another set of expressions
[tex]1 + 2 > 3[/tex] [tex]5 = 4[/tex] [tex]4 + 4 > 10[/tex]The above expressions will be evaluated to false, because the expressions are incorrect, and they represent false values.
Aside these two values (true or false), a computer cannot evaluate expressions to other values (e.g. maybe)
Read more about computer expressions at:
https://brainly.com/question/16843003
Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants to modify the style of her headings.
Answer:
she want to modify the heading of her story so she can change the format
Explanation:
Answer:
1. Select one of the headings
2. Open the styles dialog box
Explanation:
Write an expression that will cause the following code to print "I am a teenager" if the value of userAge is less than 20. Zybooks won't let me edit any other line, and UserAge > 20 was marked wrong. It won't accept the ≥ symbol either.
Answer:
Replace
if userAge > 20
with
userAge > 19
Explanation:
if userAge > 20 checks if age is 21, 22, 23, 24........
The else condition which prints "I am a teenager" checks if age is 20, 19, 18....
Notice that 20 is inclusive of the else condition; this shouldn't be because for userAge to be less than 20, 20 isn't inclusive
To solve this,
Replace if userAge > 20 with userAge > 19
So that, the else
The else condition which prints "I am a teenager" checks if age is 19, 18, 17, 16....
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
Answer:
B. False.
Explanation:
Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.
Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.
In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.
Command-based operating systems include
Answer:
Cpu is the point of the computer
Explanation:
GOT IT REEEEEEEEEEEEE
Anyone who has an iPod touch and downloads apps from iTunes participates in Digital Commerce and is a digital consumer.
A(n) ____ is built only after an engineer can prove sound design through structural analysis.
Answer:
no se
Explanation:
pues no se
Answer:
a prototype
Explanation:
Write a program that calculates taxi fare at a rate of $1.50 per mile. Your pro-gram should interact with the user in this manner:TAXI FARE CALCULATOREnter beginning odometer reading=> 78602.5Enter ending odometer reading=> 78622.7You traveled a distance of 20.2 miles. At $1.50 per mile,your fare is $30.30.
Answer:
print("TAXI FARE CALCULATOR\n")
beginning = float(input("Enter beginning odometer reading => "))
ending = float(input("Enter ending odometer reading => "))
distance = ending - beginning
fare = 1.50 * distance
print("You traveled a distance of %.1f" % distance + " miles. At $1.50 per mile, your fare is $ %.2f" % fare)
Explanation:
*The code is in Python.
Print the title
Ask the user to enter beginning and ending of the odometer reading. Calculate the distance by subtracting these values
Calculate the fare, multiply the distance by 1.50
Print the distance and fare in required format
Microsoft word 365 allows cells to be split into how many columns
Answer:
Microsoft word 365 allows two columns
Carbon copy others who are..
1) directly aware of the content
2) aware of the content
3) are not aware of the content
Answer:
Is it Multiple Choice Question?
which of the following is an example of libraries online?
A. iSEEK Education
B. DuckDuckGo
C. WorldCat
D. Ref Seek
The one that is an example of libraries online is iSEEK education. The correct option is A.
What are online libraries?A digital library, also known as an online library, an internet library, a digital repository, or a digital collection, is an online database of digital objects such as text, still images, audio, video, digital documents, or other digital media formats.
This means that students can consult online books, images, videos, and other educational content without having to wait for a physical library to open.
They can do it in a formal setting, such as school, or they can relax at home and get instant access to the information they require.
The benefits of a library management system include online and offline storage, automated backups, and simple upgrades that simplify and improve the learning process.
Thus, the correct option is A.
For more details regarding online libraries, visit:
https://brainly.com/question/6036261
#SPJ3
Which statements about Excel's FV function are correct?
A. The FV function has five arguments, and their abbreviations are rate, nper, pmt, pv, and type.
B. If the number for the pmt argument is entered as a positive value and the pv value is zero, the FV value is negative.
C. If the interest rate is 10%, the rate argument can be entered as .1 or 10%.
D. All of the options are correct.
Answer:
. D)All of the options are correct.
Explanation:
Excel's FV function can be regarded as financial function that bring about the analysis and calculation of an investment Future's value.
It should be noted that it posses arguments,with abbreviations: rate, nper, pmt, pv, and type.
an Excel's FV function will have negative value If the number for the pmt argument is entered as a positive value and the pv value is zero,
Hence, all the given options are correct.
Which class describes a container for an application?
Answer:
The "container class" would be the correct approach.
Explanation:
A class is known to have become a container class used to keep objects throughout memory via permanent networks, containing appropriate solutions of primitive functions and perhaps other containers This tends to have become a strong combination of predefined behavior and has a well-known framework.Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
Answer:
Superposition
Explanation:
Quantum units of information also known as qubits or quantum bits are very important in analyzing complex data. They deploy the properties of entanglement and superposition to offer exponentially greater computing power. The concepts of entanglement and superposition are both aspects of quantum phenomena.
Entanglement involves the uniting of two quantum particles, thus ensuring that they are perfectly bonded and would not be torn apart by any amount of distance. Superposition entails that quantum particles such as the digits used in binary calculations can take on different conditions concurrently. So, these two properties help to improve computational power.
The principle of quantum computing is proposed on the theory of entanglement and superposition. Hence, the missing phrase is superposition.
The principle of superposition often uses a combined probabilistic approach when dealing with systems which are capable of existing in more than one possible state. The principle combines the possibility of each of the possible occurences, hence resulting in a dynamic and broadened computation capability.Hence, the quantum information operates on the principle of entanglement and superposition.
Learn more : https://brainly.com/question/16179216
We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries. What are one advantage and one disadvantage of byte-oriented API versus having the API explicitly recognize and preserve application-defined message boundaries
Answer:
One advantage of byte-oriented APIs is that all byte of the data sent by the API is retrieved but for APIs with application-defined message boundaries, some bytes of data could be lost in the streaming process.
One disadvantage of byte-oriented APIs is the time it takes to resend a byte increases its propagation delay, while the is an advantage of the APIs with application-defined message boundaries as it does not have to resend any lost bytes of data, making it faster.
Explanation:
Note that byte-oriented APIs uses the TCP socket which resends lost bytes of data and application-defined message boundaries APIs uses the UDP protocol to send data but does not resend if lost.
In the motivational video we watched today, why did R.B.G say that she and The Notorious B.I.G were similar?
What stuck out to you most about this video?
Does being notorious relate to you in any way?
its all together.
What was something R.B.G said that related to you or stuck out to you?
In what ways are you going to attempt to be "notorious?"
Answer:
Both were well known, or notorious.
Explanation:
Both the Rapper and the Supreme Court Justice were famous based on their accomplishments , being notorious because of how she Won and argued so many cases , and how B,I.G. had made many popular or famous Rap songs.
i think this might help !!!
Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.
Answer:
D. Using images posted online by another student without permission or citation.
Explanation:
When Lucy uses Images without sourcing the original author, that is a form of plagirism/ copyright.
The most likely among the statements to lead to legal consequence is using images posted online by another student without permission or citation.
For better understanding, lets understand why it is the most likely to face legal consequences.
The act of using an individual's work or intellectual property such as articles, pictures videos etc without permission from them is regarded as plagiarism. It therefore means that you are claiming someone else work as yours. It is highly prohibited and can lead to some legal consequence. It is better you cite the person to whom has the work.From the above, we can therefore say that the MOST LIKELY among the statements to lead to legal consequence is Using images posted online by another student without permission or citation is true.
Learn more about plagiarism from:
https://brainly.com/question/19872406
Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and 100, inclusive. The program will make guesses and the user will tell the program to guess higher or lower. A sample run of the program might look like this: Ready to play (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 75. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 88. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 81. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 25. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 37. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? n The strategy that the program will use goes like this: Every time the program makes a guess it should guess the midpoint of the remaining possible values. Consider the first example above, in which the user has chosen the number 81: On the first guess, the possible values are 1 to 100. The midpoint is 50. The user responds by saying "higher" On the second guess the possible values are 51 to 100. The midpoint is 75. The user responds by saying "higher" On the third guess the possible values are 76 to 100. The midpoint is 88. The user responds by saying "lower" On the fourth guess the possible values are 76 to 87. The midpoint is 81. The user responds "correct" Additional Requirements The purpose of the assignment is to practice writing functions. Although it would be possible to write the entire program in the main function, your solution should be heavily structured. Most of the point penalties given on this assignment will be for not following the instructions below carefully. The main function must look exactly like this. Copy and paste this code into your file, and don't edit it: int main() { char response; cout > response; while (response == 'y') { playOneGame(); cout > response; } } The playOneGame() function should implement a complete guessing game on the range of 1 to 100. The lower and upper bounds of the range should be assigned to global named constants and then not used again in your code. In addition, you should implement the following helper functions to be invoked inside your playOneGame() function: void getUserResponseToGuess(int guess, char& result) The getUserResponseToGuess() function should prompt the user to enter 'h', 'l', or 'c' (as shown in the sample output). It should set its "result" parameter equal to whatever the user enters in response. It should do this ONE time, and should not do anything else. Note that printing the guess is part of the prompt. int getMidpoint(int low, int high) The getMidpoint() function should accept two integers, and it should return the midpoint of the two integers. If there are two values in the middle of the range then you should consistently chose the smaller of the two.
Answer:
the question is too long. dear
.mate
Select all of the uses of presentation software in the workplace.
to introduce a new project
to sell a product
to train employees
to store large amounts of data
to inspire people
to persuade management
to share information from a report
to call another employee across the country
to raise money for a cause
Answer:
uhm 1, 2, 3, 4, 6, 7, and 8.
Explanation:
because those are all the uses of presentation software in a workplace.
Which nmap switch is used to detect target OS and services?
a -S
b -p
c -F
d -A
Answer:
d -A
Explanation:
The -S switch is used to use a fake source address, and it can mask your ip.
The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically
The -F switch is used as the quick scan mode, scanning the surface
The -A switch is used to check the operating system.
Which kind of photography takes attractive photos of products to make them stand out?
Answer:
See there are multiple ways to get a perfect shot of products to stand out but the most affective according to me are explained below :-
Macro shooting - These are close shots u can say really close just to show the product more attractive and u can see these types of shots in every advertisement. Background shooting/shots - Opposite of macro shots. 3d shots - These are 360° shots.Tip :- Use wide aperture like F2 and right aperture for right shots.
Hope it helps!
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more traffic than software VPNs.C) have more security vulnerabilities than software VPNs.D) create a gateway-to-gateway VPN.
Answer:
C) have more security vulnerabilities than software
Explanation:
Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.
However, some of the characteristics of Hardware VPN is the following:
1. It is expensive compared to software VPN
2. It is generally faster
3. It requires more than a beginner to handle
4. With an in-built firewall, it is generally more secure compared to a software VPN.
Hence, in this case, the correct answer is option C.
A restaurant manager wants to advertise that his lunch special offers enough choices to eat different meals every day of the year. He doesn't think his current special actually allows that number of choices, but wants to change his special if needed to allow at least 365 choices.
A meal at the restaurant includes 1 entree, 2 sides, and 1 drink. He currently offers a choice of 1 entree from a list of 6 options, a choice of 2 different sides from a list of 6 options, and a choice of 1 drink from a list of 2 options.
Write a function that takes a number of side choices and returns the number of meal combinations possible given 6 entree choices, 3 drink choices, and a selection of 2 sides from the specified number of side choices.
- Use sapply() to apply the function to side counts ranging from 2 to 12.
What is the minimum number of side options required in order to generate more than 365 combinations
Can you give an example of mail merge (letter) pls
Answer:
yes a mail merge letter is almost the same as a mail you write to someone but slightly different here is an example
Explanation:
Dear Spiderman
We have the following address on file for you
spiderman
A customer in a store is purchasing five items. The prices of the five items are Price of item 1 = $15.95 Price of item 2 = $24.95 Price of item 3 = $6.95 Price of item 4 = $12.95 Price of item 5 = $3.95 Write a program that holds the prices of the five items in five variables. Display each item’s price, the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 7%
Answer:
Follows are the code to this question:
#include<iostream>//defining a header file
using namespace std;
int main ()//defining a main method
{
float SubTotal,SalesTax,Total;//defining float variable for calculate the value
float item_1 = 15.95, item_2 = 24.95,item_3 = 6.95, item_4 = 12.95,item_5 = 3.95;//defining float variable and assign value
SubTotal = item_1+item_2+item_3+item_4+item_5;//use SubTotal to calculate the sum
SalesTax = SubTotal * 0.07;//use SalesTax to calculate 7% of SubTotal
Total = SubTotal + SalesTax ;//use Total to addd SubTotal and SalesTax
cout << "Price of item 1 : $"<< item_1 << endl;//print item_1 Price
cout << "Price of item 2 : $"<< item_2 <<endl;//print item_2 Price
cout << "Price of item 3 : $"<< item_3 <<endl;//print item_3 Price
cout << "Price of item 4 : $"<< item_4 <<endl;//print item_4 Price
cout << "Price of item 5 : $"<< item_5 <<endl;//print item_5 Price
cout <<"The SubTotal value is: $"<< SubTotal << endl;//print SubTotal value
cout <<"The SalesTax value is: $"<< SalesTax << endl;//print SalesTax value
cout << "The Total value is: $" << Total << endl;//print Total value
return 0;
}
output:
please find attached file.
Explanation:
In the above-given code, three float variable that are "SubTotal, SalesTax, and Total" is define for calculating and store its value, and in the next line, another five float variable " item_1, item_2, item_3, item_4, and item_5" is declared that stores a float value which is defined in the question.
In the next line, the "SubTotal" variable is used to add the value of all items, and in the next line, the SalesTax is used to calculate the 7% of SubTotal and store its value. At the last, the "Total" variable is defined that adds the "SubTotal and SalesTax" value and uses the print method to print all variable values.List three things you would do if you were not forced to work.
Answer:
i would play with my friends and fish and watch movies
Explanation:
2
What combination of keys turns the value in a cell into a percentage?
Answer:
Ctrl + Shift +%
Explanation:
A Microsoft Excel, which is a Microsoft Office software application that allows the computation of data in tables for analysis amongst other functions.
Hence, in Microsoft Excel, in order to turn the entered figure data to percentage without using a mouse to access the menu button on the application window page, a combination of keys can be used to turn the value in a cell into a percentage. This combination is simply "Ctrl + Shift +%." This will be pressed simultaneously.
List two items that are required to make a text file into a bash script.
Answer:
Explanation:
First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text
In order for the system to recognise the file as an executable file rather than a text file, a header indicating which bash will be used is first required (sh, zsh, bash, etc.).
What is bash script?A file containing a succession of commands is called a bash script. The bash programme reads and processes these.
The computer programme runs line by line. For instance, you can use the command line to travel to a specific path, create a folder, and spawn a process inside of it.
Run the "cat" command and then use the redirection operator ">" and the filename to create a new file. You will now be asked to add data to this just created file. To save the file, type line and then hit "Ctrl+D."
A header stating which bash will be used is first necessary for the system to recognise the file as an executable file as opposed to a text file (sh, zsh, bash, etc.).
Thus, these are the two items that are required to make a text file into a bash script.
For more details regarding bash script, visit:
https://brainly.com/question/27962326
#SPJ2
The principal object of a hash function is __________ .
a. data integrity
b. compression
c. collision resistance
d. mapping messages
Answer:
a. data integrity
Explanation:
In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.
Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.
Some of the properties of a hash function are;
1. Pre-image resistance: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.
2. Second pre-image resistance: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.
3. Collision resistance: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.
Hence, with the aforementioned properties, the principal object of a hash function is data integrity.
Hash functions in the computer world includes;
1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.
2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.
3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.
4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.