What are the drawbacks of electronic and web-based output?

Answers

Answer 1
Need to know the how to read circuits

Related Questions

What is the main advantage of an MILC?

Answers

Answer:

What is the main advantage of an MILC?

Explanation:

MILC cameras combine some of the advantages of DSLR cameras along side the compactness, features and ease of use of point-and-shoot cameras. The main advantages are: A relatively compact and lightweight interchangeable lens camera. Utilizes a relatively large sensor (Micro Four Thirds, APS-C)

Hope that helped.

Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more traffic than software VPNs.C) have more security vulnerabilities than software VPNs.D) create a gateway-to-gateway VPN.

Answers

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

a range of cells from the fifth row in column A to the twelfth row in column G is written as​

Answers

Answer:

A5:G12

Hope it helps yuh

Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and 100, inclusive. The program will make guesses and the user will tell the program to guess higher or lower. A sample run of the program might look like this: Ready to play (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 75. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 88. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 81. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 25. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 37. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? n The strategy that the program will use goes like this: Every time the program makes a guess it should guess the midpoint of the remaining possible values. Consider the first example above, in which the user has chosen the number 81: On the first guess, the possible values are 1 to 100. The midpoint is 50. The user responds by saying "higher" On the second guess the possible values are 51 to 100. The midpoint is 75. The user responds by saying "higher" On the third guess the possible values are 76 to 100. The midpoint is 88. The user responds by saying "lower" On the fourth guess the possible values are 76 to 87. The midpoint is 81. The user responds "correct" Additional Requirements The purpose of the assignment is to practice writing functions. Although it would be possible to write the entire program in the main function, your solution should be heavily structured. Most of the point penalties given on this assignment will be for not following the instructions below carefully. The main function must look exactly like this. Copy and paste this code into your file, and don't edit it: int main() { char response; cout > response; while (response == 'y') { playOneGame(); cout > response; } } The playOneGame() function should implement a complete guessing game on the range of 1 to 100. The lower and upper bounds of the range should be assigned to global named constants and then not used again in your code. In addition, you should implement the following helper functions to be invoked inside your playOneGame() function: void getUserResponseToGuess(int guess, char& result) The getUserResponseToGuess() function should prompt the user to enter 'h', 'l', or 'c' (as shown in the sample output). It should set its "result" parameter equal to whatever the user enters in response. It should do this ONE time, and should not do anything else. Note that printing the guess is part of the prompt. int getMidpoint(int low, int high) The getMidpoint() function should accept two integers, and it should return the midpoint of the two integers. If there are two values in the middle of the range then you should consistently chose the smaller of the two.

Answers

Answer:

the question is too long. dear

.mate

that’s too much to understand, could you make it more simple to read and understand?

Microsoft word 365 allows cells to be split into how many columns

Answers

Answer:

Microsoft word 365 allows two columns

Yep it’s that I agree with him because I agree with him because I agree with him because I know his answer is right so I agree with him:)

Which of the following is NOT a result of use of the assembly line?A. More security B.higher productivity C. Greater efficiency D. Lower prices

Answers

Answer: D

Explanation:

An assembly line is where many people work together to make products. Like for a wooden toy train, one group carves the wood, another group glues the wood together, etc.

Answer: More Security.

Explanation: You're Welcome.

A(n) ____ is built only after an engineer can prove sound design through structural analysis.

Answers

Answer:

no se

Explanation:

pues no se

Answer:

a prototype

Explanation:

List two items that are required to make a text file into a bash script.

Answers

Answer:

Explanation:

First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text

In order for the system to recognise the file as an executable file rather than a text file, a header indicating which bash will be used is first required (sh, zsh, bash, etc.).

What is bash script?

A file containing a succession of commands is called a bash script. The bash programme reads and processes these.

The computer programme runs line by line. For instance, you can use the command line to travel to a specific path, create a folder, and spawn a process inside of it.

Run the "cat" command and then use the redirection operator ">" and the filename to create a new file. You will now be asked to add data to this just created file. To save the file, type line and then hit "Ctrl+D."

A header stating which bash will be used is first necessary for the system to recognise the file as an executable file as opposed to a text file (sh, zsh, bash, etc.).

Thus, these are the two items that are required to make a text file into a bash script.

For more details regarding bash script, visit:

https://brainly.com/question/27962326

#SPJ2

_________ graphic applications are used today on a variety of devices, including touch-screen kiosks and mobile phones.

Answers

Answer:

Explanation:

Adobe Illustrator is the graphic application, that can be used to smartphones to design graphical projects.

Which of the following statements best represents the impact vaudeville had on the film industry? Early silent films were more realistic than vaudeville shows and less expensive for audiences to see, therefore, silent films became more popular than vaudeville shows. Early silent films used many of the same storylines as vaudeville performances and incorporated vaudeville music. Early silent film producers used many of the same acting techniques popularized in vaudeville performances, even using popular vaudeville stars as actors in their productions. Early silent films were poorly produced and audiences did not enjoy the lack of sound, therefore, it would be some time before films overtook the popularity of vaudeville.

Answers

Answer:

Answer is B: Early silent film producers used many of the same acting techniques popularized in vaudeville performances, even using popular vaudeville stars as actors in their productions.

Explanation:

Answer:

Early film used elements of vaudeville to draw in audiences.

Explanation:

edg2021

Vaudeville were silent films and came first so they did not use early film stars in their theatre.

Create the code that will find
the longest word of the given
string. You are not allowed to
use split() method

(python)

Answers

Answer:

function findLongestWord(str) {

 var longestWord = str.split(' ').sort(function(a, b) { return b.length - a.length; });

 return longestWord[0].length;

}

findLongestWord(InputHere);

Explanation:

Replace InputHere with the input

Select all of the uses of presentation software in the workplace.

to introduce a new project
to sell a product
to train employees
to store large amounts of data
to inspire people
to persuade management
to share information from a report
to call another employee across the country
to raise money for a cause

Answers

Answer:

uhm 1, 2, 3, 4, 6, 7, and 8.

Explanation:

because those are all the uses of presentation software in a workplace.

Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dynamic instruction count of 1.0E9 and has an execution time of 1.1 s, while compiler B results in a dynamic instruction count of 1.2E9 and an execution time of 1.5 s. a. Find the average CPI for each program given that the processor has a clock cycle time of 1 ns. b. Assume the compiled programs run on two different processors. If the execution times on the two processors are the same, how much faster

Answers

Answer:

1.1

1.25

Clock rate A = 0.733 clock rate B

Explanation:

Given the following :

Clock cycle time = 1ns = 10^-9 s

COMPILER A:

Instruction count = 1.0E9

Execution time = 1.1 s

COMPILER B:

Instruction count = 1.2E9

Execution time = 1.5 s

Using the relation :

CPI = [Execution time / (instruction count × cycle time)]

CPI for compiler A :

[1.1 / (10^9 × 10^-9)] = 1.1 / 10^0 = 1.1 / 1 = 1.1

CPI for compiler B:

[1.5 / (1.2 ×10^9 * 10^-9)]

(1.5 / 1.2 * 1) = 1.5 / 1.2 = 1.25

b. Assume the compiled programs run on two different processors. If the execution times on the two processors are the same, how much faster

Since, execution time is the same on both processors

Execution time = [(Instruction count × CPI) / clock rate] ;

[(Instruction count × CPI) / clock rate] A = [(Instruction count × CPI) / clock rate] B

Make clock rate of A the subject of the formula :

(Instruction count A * CPI A * clock rate B) / (instruction count B * CPI B)

= (10^9 * 1.1 * clock rate B / 1.2 × 10^9 * 1.25)

1.1 × 10^9 clock rate B / 1.5 × 10^9

Clock rate A = 0.733 clock rate B

In the motivational video we watched today, why did R.B.G say that she and The Notorious B.I.G were similar?

What stuck out to you most about this video?

Does being notorious relate to you in any way?

its all together.
What was something R.B.G said that related to you or stuck out to you?

In what ways are you going to attempt to be "notorious?"

Answers

Answer:

Both were well known, or notorious.

Explanation:

Both the Rapper and the Supreme Court Justice were famous based on their accomplishments , being notorious because of how she Won and argued so many cases , and how B,I.G. had made many popular or famous Rap songs.

i think this might help !!!

Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants to modify the style of her headings.

Answers

Answer:

she want to modify the heading of her story so she can change the format

Explanation:

Answer:

1. Select one of the headings

2. Open the styles dialog box

Explanation:

A restaurant manager wants to advertise that his lunch special offers enough choices to eat different meals every day of the year. He doesn't think his current special actually allows that number of choices, but wants to change his special if needed to allow at least 365 choices.

A meal at the restaurant includes 1 entree, 2 sides, and 1 drink. He currently offers a choice of 1 entree from a list of 6 options, a choice of 2 different sides from a list of 6 options, and a choice of 1 drink from a list of 2 options.
Write a function that takes a number of side choices and returns the number of meal combinations possible given 6 entree choices, 3 drink choices, and a selection of 2 sides from the specified number of side choices.
- Use sapply() to apply the function to side counts ranging from 2 to 12.
What is the minimum number of side options required in order to generate more than 365 combinations

Answers

2 to 12 options for each customer

Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.

Answers

Answer:

Superposition

Explanation:

Quantum units of information also known as qubits or quantum bits are very important in analyzing complex data. They deploy the properties of entanglement and superposition to offer exponentially greater computing power. The concepts of entanglement and superposition are both aspects of quantum phenomena.

Entanglement involves the uniting of two quantum particles, thus ensuring that they are perfectly bonded and would not be torn apart by any amount of distance. Superposition entails that quantum particles such as the digits used in binary calculations can take on different conditions concurrently. So, these two properties help to improve computational power.

The principle of quantum computing is proposed on the theory of entanglement and superposition. Hence, the missing phrase is superposition.

The principle of superposition often uses a combined probabilistic approach when dealing with systems which are capable of existing in more than one possible state.

The principle combines the possibility of each of the possible occurences, hence resulting in a dynamic and broadened computation capability.

Hence, the quantum information operates on the principle of entanglement and superposition.

Learn more : https://brainly.com/question/16179216

Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false

Answers

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

The fractional_part function divides the numerator by the denominator, and returns just the fractional part (a number between 0 and 1). Complete the body of the function so that it returns the right number. Note: Since division by 0 produces an error, if the denominator is 0, the function should return 0 instead of attempting the division. 1 point  1 2  3 4 5 6 7 8 9 10 11 def fractional_part(numerator, denominator): # Operate with numerator and denominator to # keep just the fractional part of the quotient return 0 print(fractional_part(5, 5)) # Should be 0 print(fractional_part(5, 4)) # Should be 0.25 print(fractional_part(5, 3)) # Should be 0.66... print(fractional_part(5, 2)) # Should be 0.5 print(fractional_part(5, 0)) # Should be 0 print(fractional_part(0, 5)) # Should be 0

Answers

Answer:

part a

Explanation:

Anyone who has an iPod touch and downloads apps from iTunes participates in Digital Commerce and is a digital consumer.

Answers

Problem can be solved if you know the problem and what the consumer looking for

Why is timbre an important musical element?

Answers

it’s used to define the color or sound of a tone .

The timbre is important musical element because different timbres can create different emotions in the listener.

What is the length of the following array: byte[] data = { 12, 34, 9, 0, -62, 88 };a. 1b. 5c. 6d. 12

Answers

Answer:

C: 6

Explanation:

The values are separated by ` ,`  with this it is enough to count all the numbers that are separated by ` , ` making it have 6 elements

Following are the program to calculate the length of the array:

Program Explanation:

Defining a header file.Defining the main method.Defining an integer type array "data" that holds a given value.In the next step, a print method is declared that uses the sizeof method that calculates the length of the array.

OR

In the given array all the element is separated by the "," symbol, and when the user counts the array value that is equal to 6.

Program:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int data[] = { 12, 34, 9, 0, -62, 88 };//defining an integer array that hold given value

   cout<<sizeof(data)/sizeof(data[0])<<endl;//using print method calculate and print the size of array

   return 0;

}

Output:

Please find the attached file.

Therefore, the final answer is "Option c".

Learn more:

brainly.com/question/4506055

Which nmap switch is used to detect target OS and services?
a -S
b -p
c -F
d -A

Answers

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

2

What combination of keys turns the value in a cell into a percentage?

Answers

Answer:

Ctrl + Shift +%

Explanation:

A Microsoft Excel, which is a Microsoft Office software application that allows the computation of data in tables for analysis amongst other functions.

Hence, in Microsoft Excel, in order to turn the entered figure data to percentage without using a mouse to access the menu button on the application window page, a combination of keys can be used to turn the value in a cell into a percentage. This combination is simply "Ctrl + Shift +%." This will be pressed simultaneously.

We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries. What are one advantage and one disadvantage of byte-oriented API versus having the API explicitly recognize and preserve application-defined message boundaries

Answers

Answer:

One advantage of byte-oriented APIs is that all byte of the data sent by the API is retrieved but for APIs with application-defined message boundaries, some bytes of data could be lost in the streaming process.

One disadvantage of byte-oriented APIs is the time it takes to resend a byte increases its propagation delay, while the is an advantage of the APIs with application-defined message boundaries as it does not have to resend any lost bytes of data, making it faster.

Explanation:

Note that byte-oriented APIs uses the TCP socket which resends lost bytes of data and application-defined message boundaries APIs uses the UDP protocol to send data but does not resend if lost.

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.

Answers

Answer:

D. Using images posted online by another student without permission or citation.

Explanation:

When Lucy uses Images without sourcing the original author, that is a form of plagirism/ copyright.

The most likely among the statements to lead to legal consequence is using images posted online by another student without permission or citation.

For better understanding, lets understand why it is the most likely to face legal consequences.

The act of using an individual's work or intellectual property such as articles, pictures videos etc without permission from them is regarded as plagiarism. It therefore means that you are claiming someone else work as yours. It is highly prohibited and can lead to some legal consequence. It is better you cite the person to whom has the work.

From the above, we can therefore say that the MOST LIKELY among the statements to lead to legal consequence is Using images posted online by another student without permission or citation is true.

Learn more about plagiarism from:

https://brainly.com/question/19872406

Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?

Answers

Answer:

No because the computer is programmed to answer in such way as that the user properly understands with either yes or no

Explanation:

A computer cannot evaluate an expression to be between true or false.

Expressions in computers are usually boolean expressions; i.e. they can only take one of two values (either true or false, yes or no, 1 or 0, etc.)

Take for instance, the following expressions:

[tex]1 +2 = 3[/tex] [tex]5 > 4[/tex] [tex]4 + 4 < 10[/tex]

The above expressions will be evaluated to true, because the expressions are correct, and they represent true values.

Take for instance, another set of expressions

[tex]1 + 2 > 3[/tex] [tex]5 = 4[/tex] [tex]4 + 4 > 10[/tex]

The above expressions will be evaluated to false, because the expressions are incorrect, and they represent false values.

Aside these two values (true or false), a computer cannot evaluate expressions to other values (e.g. maybe)

Read more about computer expressions at:

https://brainly.com/question/16843003

Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders. Each object of the class contains a private instance variable savingsBalance indicating the amount the saver currently has on deposit. Provide method calculateMonthlyInterest to calculate the monthly interest by multiplying the savingsBalance by annualInterestRate divided by 12- this interest should be added to savingsBalance. Provide a static method setInterestRate that sets t

Answers

Answer:

Class SavingsAccount( ):

annual_interest_rate

def.__init__(self, savings_balance):

self.savingsBalance = savings_balance

def calculatMonthlyInterest( ):

self.savingsBalance += (self.savingsBalance * annual_interest_rate) /12

return self.savingsBalance

def setInterestRate_(self, value):

self.annual_interest_rate = value

Explanation:

The python class above is used to create a savings account data for a customer, with methods to change the static interest rate and to calculate the monthly interest rate.

Carbon copy others who are..
1) directly aware of the content
2) aware of the content
3) are not aware of the content

Answers

Answer:

Is it Multiple Choice Question?

Def 3 not aware of the content

Can you give an example of mail merge (letter) pls​​

Answers

Answer:

yes a mail merge letter is almost the same as a mail you write to someone but slightly different here is an example

Explanation:

Dear Spiderman

We have the following address on file for you

spiderman

Other Questions
What happens and who was affected by the 3-Mile Island Incident? If the line px -5y = 60 has a slope of -23 then p equals .... So, I have strict parents & need help, if u dont know how to fix this after u read it, leave. I dont want u getting points for nothing Im deleting ur answer if u do it for points. Anyways, I want to get Spotify on my phone, but it says Enter the password for (my email). How do I sign back into it if I dont know the password. My dad has the password, but I dont want to get in trouble for stealing his phone to fix mine. Please help, Ill give the brainliest! If 7x 7 = -21 then 12x=____? Fill the blanks with the correct present tense form of the verb in parenthesis. A train traveled 10 miles in 6 minutes.At this rate, how far will it travel in 20minutes? It takes 4 1/2 cups of cherries to make a cherry pie. Russell wants to make 4 cherry pies. How many cups of cherries will Russell need? can someone help me please! :) I cant figure out the answer to x/3-9=0 What does this passage show about Jews during the Babylonian Captivity?Answer : C : They missed their home of Jerusalem. Does selling a product at below cost make business sense? 3(x+1) = 2(x-5)Solve for x A 75 ! coaxial transmission line has a length of 2.0 cm and is terminated with a load impedance of 37.5 j75 !. If the relative permittivity of the line is 2.56 and the frequency is 3.0 GHz, find the input impedance to the line, the reflection coefficient at the load, the reflection coefficient at the input, and the SWR on the line A line has this equation: y= -9x-2Write an equation for the parallel line that goes through (2, -3). What role do convection currents play inplate tectonics? Researchers have found that mitochondria and chloroplasts in eukaryotic cells have their own DNA. This DNA is different from the DNA in a eukaryotic cell's nucleus. Chloroplasts and mitochondria use their own DNA and ribosomes to make some organelle-specific proteins. Select the correct answer.Which word correctly completes this sentence?Prefiero ___ camisas que estn en la mesa.A. esosB. esoC. esasD. sos The sum of 16 and a number x is equal to 19 What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.Meeting responses can be tracked.Free/busy settings can be enabled.Multiple calendars can be managed.One extra time zone can be created.Display and theme settings can be changed.Options are accessed through the Backstage view. PART B: Which quote from the text best supports the answer to Part A?A. Matt Hale, a notorious racist, was recently asked to speak at the University ofIllinois at Springfield. (Paragraph 15)B. Hale is the leader of the World of the Creator, a white supremacist group. Hispresence on campus was controversial. (Paragraph 15)C. Several students, faculty, and community members thought that the universityshould cancel his appearance. (Paragraph 15)D. By allowing Hale to speak, the university recognized free speech rights but alsoprovided a means for community members to respond. (Paragraph 16)