Answer:
bg color stands for background color while SKYBLUE is the color assigned to it.
Explanation:
It is setting the background color of the body tag to sky blue.
A technology ____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.
Answer:
A technology __cycle __ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.
Explanation:
Hope its help
Conceptually, a page table is an array. What is found in each element of the page table array, and how is it interpreted?.
An array is the group of data structure which has a similar data elements of the same data type. In this type of data structure, the information can be quickly recalled by making use of the index number so that each individual data can be retrieved.
With this in mind, we can see that a page table has to do with the data structure which is stored in a virtual memory so that the Operating System can access their virtual and physical address.
See attached image for a better visual description.
Please note that your question is incomplete so I gave you a general overview so that you would better understand the concept.
Read more about page table here:
https://brainly.com/question/15409133
What is the complete path and filename of the file where ports and their associated protocols are defined
The /etc/services is often found in Linux/Unix.
The complete path and filename of the file where ports and their associated protocols are defined by /etc/services.
Linux Services files is known to save a lot of well-known ports. UNIX operating systems is known to save a services file at /etc/services.It does save information about a lot of services that client applications can use on the computer.
Looking into the file, you will find the service name, port number, and protocol it uses, and other applicable aliases.
the work of the configuration file /etc/services is to help programs to be able to do a getportbyname() sockets call in their code so as to know what port they can use.
Learn more about Computer services from
https://brainly.com/question/3837126
What are web protocols.
Answer:
Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.
Answer:
The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.
Explanation: i hope this helps
Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change the messages if you like). Once this works, add other pets. (Iguana, Pig, Rabbit...)
Answer:
Explanation:
a = input("what kind of pet the user has")
if a == 'cat':
print("Too bad")
elif a == 'dog':
print("Lucky you!")
Six months ago, you purchased a new laptop. Since then, you notice that the battery life has been steadily going down. When it was new, and full charge lasted about three hours. Now your lucky to get two hours before the battery charge level drops the 5%. What should be your first step to correct the problem?a. Calibrate the batteryb. Replace the power meter chip on the batteryc. Clean the contacts on the batteryd. Buy a new battery
Answer:
A. Calibrate the battery
Explanation:
It is unlikely that the battery has deteriorated significantly in the timespan of six months. The laptop is likely being shut down due to inaccurate battery levels to protect the laptop. Battery calibration will ensure accurate battery information is reported.
does anyone know how to make a astronaut hop while using loop?
Answer:
In Java
Explanation:
package application;
import java.util.Scanner;
import entities.Astronaut;
public class Main {
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
System.out.print("How is the astronaut's energy in a scale of 0 to 100? ");
int energy = sc.nextInt();
Astronaut fakeArmstrong = new Astronaut();
while (energy > 0) {
fakeArmstrong.hop();
energy--;
}
System.out.println("The astronaut is tired eh? Let him rest you psychopato");
sc.close();
}
}
----------------------------------------------------------------------------------------------
package entities;
public class Astronaut {
private int bodyEnergy;
public Astronaut() {
}
public int getBodyEnergy() {
return bodyEnergy;
}
public void hop() {
System.out.println("up and down!");
}
}
Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do
Answer:
bobo
Explanation:
_____ is a privacy issue relating to the responsibility of those who collect data must ensure that the data is correct.
Answer:
Virtual private network
Pedestrians, bicyclists, and skateboarders _____ the rules of right-of-way when they use the road.
Pedestrians, bicyclists, and skateboarders must follow the rules of right-of-way when they use the road.
An agile team has which two characteristics? (choose two. ).
A SAFe Agile teams are often known to be Scrum Master and Product Owner. An Agile team characteristics are:
A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value.A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value.
A SAFe Agile team is a cross-functional group as they are made up of about of 5-11 people who set apart, build, test, and deliver an increment of value in a short time box.
Agile team are known to be cross functional as they can define, build , test and Deploy.
See full question below
An Agile team has which two characteristics? (Choose two.)
A) A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value
B) A stand-along unit of individuals who do not require input fro other teams to complete their tasks
C) A large group of individuals who all work together to create value for the client
D) A group of dedicated individuals that work in phase-gate steps to complete their PI Objectives
E) A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value
Learn more from
https://brainly.com/question/24390635
What are the names of the methods which are used to control an i/o device??.
Answer: 1
Explanation:
i took the quiz and it was correct
5. The Shape Fill drop-down menu is used to
A b or c or d
Answer:
Change the color of the shape.
Explanation:
In the sentence, you must look at keywords, like "Fill" and "Shape".
The fact that it said shape fill means the tool would fill the inside of a shape.
Make sure to look at the definition of keywords to figure out what they mean.
Therefore, "Change the color of the shape" would be the correct answer.
-kiniwih426
Amelie is planning a gingerbread house making workshop for the neighborhood, and is writing a program to plan the supplies. She's buying enough supplies for 15 houses, with each house being made out of 5 graham crackers. Her favorite graham cracker brand has 20 crackers per box. Her initial code:
The line of code that successfully calculates and stores the number of leftover crackers in the final box is extras ← crackersPerBox - (neededCrackers MOD crackersPerBox).
From the complete information, her initial code is given as:
numHouses ← 15
crackersPerHouse ← 5
crackersPerBox ← 20
neededCrackers ← crackersPerHouse * numHouses
It was depicted that Amelie realizes that she'll need to buy more crackers since the crackers come in boxes of 20. Therefore, to calculate how many graham crackers will be leftover in the final box, the line of code from the options will be extras ← crackersPerBox - (neededCrackers MOD crackersPerBox).
Read related link on:
https://brainly.com/question/25663035
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage
The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.
System design involves the process of determining an overall system architecture, which typically comprises the following:
Hardware.End users.Physical processing components.Software.Communication channel.Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:
1. Planning.
2. Analysis.
3. Design.
4. Development.
5. Testing.
6. Implementation.
7. Maintenance.
From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.
During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.
Read more: https://brainly.com/question/20813142
Modems communicate data by using which method?.
Considering the modem technology, Modems communicate data by using Radio frequency method.
What is Radio frequency method?The radio frequency method in modem communication allows modems to communicate or transfer data through wireless over a distance of tens of kilometers.
The essence of Radio frequency in modemsWith radio frequency, modems can easily communicate without telecommunication or satellite network operators. It usually performs at 300 MHz to 900 MHz range.
Hence, in this case, it is concluded that the correct answer is the Radio frequency method.
Learn more about modem technology here: https://brainly.com/question/9617717
When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.
Answer:
Virtualisation
Explanation:
The correct answer would be virtualisation software, this is because it allows more computers to be "created" in the form of virtual machines. These virtual machines contain everything that a regular computer would have, i.e networks, storage devices, and processors except that it is virtual. You just need to have hyper v enabled in system settings.
Hope this helps!
five types of conflict in the school
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data [
Explanation:
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data
Explanation:
follow me please
________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup
Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.
Definition of Structured Programming Technique.This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.
Configurations of Structured Programming Technique.Structured Programming Techniques generally takes three structures body which include the following:
IF THEN ELSE DO WHILESequenceHence, in this case, it is concluded that the correct answer is option B. "Structured."
Learn more about programming techniques here: https://brainly.com/question/17180300
Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built
Answer:
Iterative
Explanation:
is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.
Do you think should give credit to people who invented viral dances?
Answer:
michal jackson i think who credit to people invented viral dances.
Answer:
Yes
Explanation:
Well, they added some taste to life.
How to square a number in java.
Answer:
num**2
Explanation:
To square a number in Java, you just take the number and use two asterisks (**) to denote an exponent, and then connect a 2 to it.
For example, if your number is 5:
5**2 in Java means 5^2, which is 25.
Just like how 5**3 in Java means 5^3.
Hope this helps.
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False
Answer:
False
Explanation:
The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.
Choose the response that best completes the following statement.
"If you're not sure if you should be on a site or signing up for a profile, ________."
ask permission
consider the outcome
don't say it online
use the 5-second pause
Answer:
probably the 5 second pause
poob bn vbyfcfgxfc jghjg jhgh
Answer:
Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.
Explanation:
Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attached. Which setting must molly change?.
A computer is made up of different network. The setting that molly must change is network type.
A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.
A computer network can be classified based on their sizes. A computer network is of four types. They are:
LAN(Local Area Network)PAN(Personal Area Network)MAN(Metropolitan Area Network)WAN(Wide Area Network)Learn more from
https://brainly.com/question/14200752
TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.
Answer:
True
Explanation:
"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."
Chapter 20 reading and vocab review
Explain the subtractive and additive approaches to editing.
Answer:
Essentially additive editing and stringing “the good stuff” together, whereas subtractive is more about stringing all your raw footage together and “removing the bad stuff”
Additive editing feels confident and concerned with the pursuit of a specific, existing vision. And it’s faster. Subtractive editing feels like a deeper listening to what the footage is saying, and holding on to many potential permutations.
Explanation:
Addictive editing - creating a program from raw footage by starting by starting with nothing and adding selected components
Subtraction editing - creating a program by removing redundant or poor quality material from the original footage
Choose the correct function to yield the shown result.
>>>____(3)
3.0
- int
-round
-float
-str
Answer:
int
Explanation:
Correct on edg test 2021
5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False