Answer:
everything
Explanation:
cuz I use everything and they all work good
Which computer network component connects two different networks and allows them to communicate?
Answer:
Core network components interconnect other network components. Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols, codes, or security measures. Router: a networking device that forwards data packets between computer networks.
As the Social Media Strategist at a company, your coworker comes to you and asks you to explain that if your ads and products are all over the Internet, how would anyone ever find them? Which would be your best explanation?
Explanation:
They can find the ads all over the internet. The ads will be seen by people using all kinds of websites, and of all age groups.
Lucy was bucking for a promotion. She paid careful attention to the e-mails she sent out to make sure they did not violate netiquette guidelines. All the items below describe something she should do when using e-mail except_____.
pls help me i know somone did this
Include lots of exclamation marks to get your point across.
Use a relevant subject line.
Include a signature.
Use spell check in addition to proofreading to reduce mistakes.
Answer: Include lots of exclamation marks to get your point across
Explanation:
When sending an e-mail, we should note that the subject line that should be used should be relevant with regards to the message being passed.
A spell check is also vital in order to reduce mistakes. The use of many exclamation is wrong. That's not professional and should be avoided.
Convert these denary numbers to binary
I’ll give Brainly please
Answer:
17 = 10001 . 62 = 111110 183 = 10110111 . 200 = 11001000
21= 10101 . 49= 110001
Explanation:
tell me if wrong
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
a thousand people on here and no answer
Answer:
I think its A but not 100% sure
Two students are trying to combine their decks of Battleémon cards (a knock off version of another famous card game) so that they make one large deck of cards that contains exactly one of each unique type of Battleémon card that they own - in alphabetical order. In order to do this, the students start with two lists, deck1 and deck2, which are lists of all Battleémon cards each student owns (duplicates included) and the following available procedures.
Answer:
combinedDeck ← Add(deck1, deck2)
combinedDeck ← RemoveDups(combinedDeck)
combinedDeck ← Alphabetize(combinedDeck)
Explanation:
Uisng a the set of instructions below, a list of sorted cards without duplicates can be obtained by following the set of instructions below :
1. START
2. Read in cards of student A and student B into a set :
3. Using the union function merge, the two set of cards.
4. Since a set will contain no duplicates, then duplicate cards are automatically removed.
5. Convert the set to a list and apply the sort function.
A code snippet in python is given below :
card_A = {'meal', 'peal', 'deal', 'spin'}
#enter the values of student's A card into a set
card_B= {'skill', 'lift', 'spin'}
#Enter the values of student's B's card into a set
merge = card_A.union(card_B)
#using the union function, merge the cards
merge = list(merge)
#convert the mergers set into a list
sorted_cards = sorted(merge)
#using the sorted function, sort the values in the merged cards
print(sorted_cards)
#display the sorted cards
Learn more :https://brainly.com/question/15745784
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
Answer:
distributed denial of service
Explanation:
Answer: DDoS
Explanation:
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.
1. Write the syntax of the following HTML commands by using any one attribute
a) Font
b) Table
c) OL
d) Marquee
e) Img
Answer:
The answer is table
Explanation:
If u do not know what a syntax is, its a system where it helps u make ur sente shorter cuz if its like i wanted to go out in the rain my mum said i cant to play in the rain the fixed sentence would be I wanted to go play in the rain but my mum said no
Please help with this code!
import random
months = ["jan", "feb", "mar", "apr", "may", "june", "july", "aug", "sept", "oct", "nov", "dec"]
pick1 = random.choice(months)
pick2 = random.choice(months)
if months.index(pick1) < months.index(pick2):
print(pick1)
print(pick2)
else:
print(pick2)
print(pick1)
Since the months are already in chronological order in the list, we can compare their index and print the string with the smaller index first. I wrote my code in python 3.8. I hope this helps.
When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly?
A. Press the DELETE key THREE times
B. Finish typing the word, and then run a spell check
C. Press the BACKSPACE key four times
D. Triple-click the word to select it, then retype it correctly
Answer:
C. press the Backspace key four times
Explanation:
When you are entering text, what is the most efficient way to remove the previous four characters to correct a word that you entered incorrectly is to Press the BACKSPACE key four times
Most times people do delete a character to the right of the insertion point by pressing delete and a character to the left of the insertion point by pressing backspaceIt is often better to select the text you want to remove, then press the Delete key.
Conclusively, to quickly move an insertion point up to the start of the previous paragraph, just Press Ctrl+Up Arrow (Windows).
Learn more from
https://brainly.com/question/19286999
8. Why is it important not to download pictures to your school or workplace network if you do not plan to use them?
Answer:
not appropriate use of technology.
Explanation:
float('3.66') converts the string "3.5" to a float. Which statement is true? You need to import the float() method from the math module. When you first open IDLE, you can use the float() function. You need to import float() from the random module. There is no float() function. You need to write your own.
Answer:
When you first open IDLE, you can use the float() function
Explanation:
i bellive this is the rigtht anser but i am not 100%
What educational site could I make a screen capture tutorial on? I need ideas for a school project.
You Need Software To Screen Capture
The Software You can use is OBS its free and there are watermarks
Which of the following is the shortcut to quickly save a PowerPoint presentation?
Pressing Ctrl+Shift+S will save the slides.
Pressing Ctrl+S will save the slides.
Pressing F12 will save the slides.
Pressing Shift+S will save the slides.
Answer:
Pressing Ctrl+S
Explanation:
Pick all the correct answers
Computerized machines have taken the place of most __________.
A.
teachers
B.
IT specialists
C.
order clerks
D.
graphic designers
Answer:
B??
Explanation:
I feel like B. is the correct answer.
If i'm wrong plz let me know :>
Answer:
B
Explanation:
Anna is concerned about the lack of communication among the members of her team. Which risk can result from a lack of communication within a team?
______ risk can result from a lack of communication within a team.
The answer is Operational
PLATO
Answer:
The appropriate approach is "Operational".
Explanation:
Operational risk pretty much sums up the complexities and challenges that an organization operates when something intends to carry out its daily operations business operations throughout a provided field of work. The whole risk could sometimes be categorized here as the number of different risks that are specific to a particular market or organization.How many syllables does snail have
!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.
Answer:
word = input()
if word > "apple" and word < "pear":
print("Word is valid.")
else:
print("Word is out of range.")
How can you reduce the Impact of Hacking?
pls help with this <3
Answer:
Explanation:
To reduce the impact of hacking firstly dont ever give anyone your PASSWORD even to ur friends coz one day they can snake u off and use ur personal email/accounts.Try to use websites which are protected from hackers and anti-virus.Never use your personal details if u do make sure u write the user/password in a save place and LOG OUT your accounts when ur not using them.If u have a child you should install i child protecting apps.And make sure you block all anonymous websites/browsers/apps.Dont leave personal information on websites just to stay on the safe side.
Hope this helps
Complete the following sentence.
Tony ___________ is considered an expert in the field of mind mapping.
Answer:
The answer is Buzan.
Answer:
Buzan
Explanation:
How are Earth's plates made?
1
Select the correct answer.
Which tool will select the lines of a sketch in digital software?
A.
Gradient
B.
Magic Wand
Ос.
Edge Detect
OD.
Paint Bucket
Reset
Next
Answer:
gradient
Explanation:
If you were asked to make a presentation to your class that requires you to show pictures, text and video, which program would be the best choice? A. Internet explorer B. Photoshop C. Microsoft word D. Microsoft PowerPoint
Answer:
D
Explanation:
Microsoft PowerPoint is a presentation program.
Print even numbers till 50 in python coding.
In python, you can use a simple list comprehension to solve this problem.
print([x for x in range(51) if x % 2 == 0])
This code prints all the even numbers from 0 to 50 including 0 and 50.
In Java I’m having trouble with variables. When I try to call a variable from my while loop it says, “finger cannot be resolved to a variable.” The error is on line 49.
You're declaring variable finger inside your while loop so it only exists inside your while loop. You're then trying to use your finger variable outside your while loop, which is impossible because finger only exists inside your while loop.
Try declaring total at the beginning of your program, adding finger to total before you break from your while loop and then adding randNum to your total at the end.
To better understand why you can't use finger outside your while loop, look up "java scope". This will explain why you can only use variable in the regions they're declared in.
hey plz help me with this
What is malware short for?
Answer:
Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.
Explanation:
_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning
Answer: it’s A, social media
Explanation:
Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.
What is Social Media?Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.
Social media includes the technologies used to support virtual communities and the sharing of content.
Hence, the correct option is 1.
Learn more about Social Media:
https://brainly.com/question/18958181
#SPJ2
What type of result does the MATCH function, when used on its own, return?
It returns the lookup value located in a specific location.
It returns a value that is the same as the lookup value.
It returns the cell reference of the lookup value.
It returns the relative position of a lookup value, either as a row or column number, within the selected array.
Answer:
D: It returns the relative position of a lookup value, either as a row or column number, within the selected array
Explanation:
In Microsoft, the MATCH function is a function that is easily used to look for a specific item in a range of cells, and thereafter it now returns the relative position of that item in that same range of cells.
Thus, the correct answer is Option D
Answer:
d
Explanation:
Why did we decide to send a message as a sequence of two options rather than modifying our devices to represent more options?
Answer:
Following are the solution to this question:
Explanation:
Please find the complete question in the attachment file.
The binary message is also an XML text SMS, which is used to represent in binary character. It may also flag the binary text as binary, and it can attach the UDH as just the start of its message. In this question, we assume that you can include A and B because there could be no more than 2 choices in such a binary message.
We decided to send a message as a sequence of two states (A and B) rather than modifying our devices to represent more states (State C, State D, State E, etc.) primarily for simplicity and efficiency.
Using a binary communication system with just two states is straightforward and easier to implement than introducing more complex modifications for additional states.
Binary communication allows for clear and unambiguous encoding and decoding, making it more reliable and less prone to errors.
While using more states could potentially convey more information, it would also require more complex hardware and software, increasing the risk of communication errors and complicating the overall system design and operation.
Know more about binary communication:
https://brainly.com/question/32447290
#SPJ3
Your question is incomplete, but most probably your full question was.
Why did we decide to send a message as a sequence of state (A and B) rather than modifying our devices to represent more State (State C, State D, State E,....)?