Answer:
Bridge
Explanation:
8. What should one do in order to gain the most benefit from the concept of learning styles?
a. Be rigid
b. Be persistent
c. Be imaginative
d. Stay flexible
D stay flexible
The thing that a person should do in order to gain the most benefit from the concept of learning styles is option D: stay flexible.
What does learning styles mean?Learning styles can be categorized, identified, and described in a variety of ways. They are, in general, broad patterns that give teaching and learning direction.
Another way to think of learning style is as a set or a given group of elements, actions, as well as attitudes that support a person's learning in a specific circumstance.
Therefore, based on the above, The thing that a person should do in order to gain the most benefit from the concept of learning styles is option D: stay flexible.
Learn more about learning styles from
https://brainly.com/question/3274282
#SPJ1
1. How are you going to apply proper selection of tools in your daily life?
2. Do you think knowing each tool used for computer systems servicing will be a big help for you in the future?
3. How important for a student like you to know the scope of work you should properly accomplish?
Answer:
PROPER TOOLS SELECTION 2. Tool •Is a handheld device that aids in accomplishing a task •Range from a traditional metal cutting part of a machine to an element of a computer program that activates and controls a particular function. 3. Preparing for the task to be
Explanation:
Difference between us 2.0
and 3.0 flash drive
USB 2.0 offers a transfer rate of about 480 Mbps, whereas USB 3.0 offers a transfer rate of about 4,800 Mbps
Write a C++ program which reads a given integer n and prints its twin
prime.
"A twin prime is a prime number that is either 2 less or 2 more than another prime
number" for example, either member of the twin prime pair (41, 43). In other
words, a twin prime is a prime that has a prime gap of two".
Sample Output:
Enter an integer:
11
Twin prime number of 11 is:
13
The C++ program that reads a given integer n and prints its twin prime is given below:
The Program#include <iostream>
#include <cmath>
using namespace std;
int main() {
const int num_primes = 10005;
bool primes[num_primes];
for (int i = 2; i != num_primes; ++i) {
primes[i] = true;
}
for (int i = 2; i != int(sqrt(num_primes)); ++i) {
if (primes[i]) {
for (int j = 2; i * j < num_primes; ++j) {
primes[i*j] = false;
}
}
}
int n;
cout << "Input an integer:\n";
cin >> n;
cout << "Twin primes are:\n";
for (int i = n; i - 2 >= 0; --i) {
if (primes[i] && primes[i-2]) {
cout << i-2 << " " << i << endl;
break;
}
}
return 0;
}
The OutputInput an integer:
Twin primes are:
11 13
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Write the contribution of baise pascal and dr herman hollerith in the histroy of computer
Answer:Computers truly became a revolutionized invention during the last part of the 20th century. They have already helped win wars, solve seemingly insoluble problems, saved lives and launched us into space. Their history spans more than 2500 years to the creation of the abacus. This resource provides a brief history of computers.The Pascaline
In 1642, an eighteen year old French scientist, writer and philosopher, Blaise Pascal (1623–1662), invented the very first mechanical calculator. It was named the Pascaline.
It had been created as an aid for Pascal’s father, who was a tax collector. Pascal built fifty of these gear driven calculating machines and couldn’t manage to sell many due to their expensive cost.
Explanation:
Classify the following devices as input or ourput. Draw a line from the picture to the correct name of the device.
Answer:
input: keyboard + mouse
output: monitor + printer
What are Thear Platforms?
Answer:
A conglomerate technology company.
Explanation:
Thear Platforms is commonly known as Thear. It is a conglomerate technology company with different platforms.
Some platforms by Thear are as follows
1. Thear Blog (Blogging Site)
2. Thear Library (Educational Site)
3. Thear Updates (News Site)
and many others....
You may access these at https://thear.me/
Besides UEFI, what other type of firmware might you see on a motherboard?
Besides UEFI, the other type of firmware that you might see on a motherboard is BIOS.
What is a computer hardware?A computer hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched.
The hardware components of a computer.Some examples of the hardware components of a computer system and these include:
MonitorMouseRandom access memory (RAM).Read only memory (ROM).Central processing unit (CPU)KeyboardMotherboard BIOS chipIn Computer technology, the two types of of firmware that you might see on a motherboard are Basic Output-Input system (BIOS) and Unified Extensible Firmware Interface (UEFI).
Read more on motherboard BIOS chip here: brainly.com/question/17373331
#SPJ1
A design team is working on a design project for an event ticketing app to reduce paper tickets. They suggest the following design problem statement: Ricki is an avid sports fan and wants to avoid printing tickets that will be discarded once they’re in the stadium. What element is missing in the problem statement? (UX)
User name
User need
Insight
User characteristics
The element that is missing here are users characteristics. The correct option is D.
What is problem statement?A problem statement is a succinct description of an issue that needs to be addressed or a condition that needs to be improved.
It determines the difference between the current and desired states of a process or product. The problem statement should address the Five Ws while focusing on the facts.
The problem itself, plainly stated and with enough please start to establish why it is crucial; the method of solving the problem, often asserted as a claim or a working thesis; and the purpose, statement of objective, and scope of the document the author is preparing.
As in the given scenario, Ricki is an avid sports fan and wants to avoid printing tickets that will be discarded once they’re in the stadium it requires user characteristics.
Thus, the correct option is D.
For more details regarding problem statement, visit:
https://brainly.com/question/11657822
#SPJ1
What is the relationship between the ask phase of the data analysis process and the plan phase of the data life cycle?
Answer:
The data analytic lifecycle is intended for use with data science initiatives and Big Data issues. The cycle reflects a real project by being iterative.
4.15 LAB: Convert to reverse binary
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x / 2
Please help me!!
A program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary is
num = int(input())
while num > 0:
y =(num % 2)
print(y, end='')
num = (num//2)
print()
num = int(input("Enter a number"))
string = ""
while num > 0:
y =str(num % 2)
string+=y
num = (num//2)
reverse=string[::-1]
print(reverse)
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Describe the differences between power and authority
Answer:
power is authjority
Explanation:
Write an expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values.
The expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values is total1+total2.
What is double variable?The double data type is built into the compiler and is used to define numeric variables that hold numbers with decimal points.
Many programming languages, including C, C++, C#, and others, recognize the double as a type.
A variable can be declared as double by prefixing it with the double keyword. You mostly used this data type, which has 14 or 15 decimal digits.
However, it must be used with caution because it requires 8 bytes of memory storage and is an expensive method.
total1+total2 is the expression that computes the sum of two double variables total1 and total2, which have already been declared and assigned values.
Thus, this can be the expression that computes the sum of two double variables total1 and total2.
For more details regarding double variable, visit:
https://brainly.com/question/1979738
#SPJ1
"As a busy professional and avid book lover, I want to be able to reserve books in advance, so that I can pick them up based on my schedule.” (ux)
What component of the user story addresses the persona’s goal to access books they want to read when they arrive at the library?
Demographic
Benefit
Action
Role
Answer:
The answer is benefit
that it
Help please♀️
What is the name for the different RULES that are specific to each programming
language? These languages use commands and logic statements to make the
computer accomplish its intended purpose.
Software
Programs
Syntax
Binary
Answer:
syntax
Explanation:
Each programming language follows a specific set of “grammar” rules called syntax; Every programming language is designed to serve a specific purpose, i.e. to allow you to build websites, do data analysis, or create desktop software etc.
Im in 7th grade :D
What statement is an example of the specific requirements of smart goal?
Answer:
Specific: I’m going to write a 60,000-word sci-fi novel.
Measurable: I will finish writing 60,000 words in 6 months.
Achievable: I will write 2,500 words per week.
Relevant: I’ve always dreamed of becoming a professional writer.
Time-bound: I will start writing tomorrow on January 1st, and finish June 30th.
Explanation:
I did this mark brainiest
Amed is utilizing a feature that will use two tables. The first table contains a primary key matched to a foreign key in the second table. The query results will include all entries from the first table. Which feature is he using?
left outer join
right outer join
self join
inner join
Answer:
left outer join
Explanation:
Provide a code example for a shape with no outline. What can you do to ensure this is the
outline that will be used?
A code example for a shape with no outline or one that its borders has been removed has been given below:
The CodeDim rngShape As InlineShape
For Each rngShape In ActiveDocument.InlineShapes
With rngShape.Range.Borders
.OutsideLineStyle = wdLineStyleSingle
.OutsideColorIndex = wdPink
.OutsideLineWidth = wdLineWidth300pt
End With
Next rngShape
Read more about shapes and borders here:
https://brainly.com/question/14400252
#SPJ1
Find the following measures of central tendency for the given set of data. {1, 3, 9, 11, 2}
Answer:
(1+3+9+11+2)/5=26/5=5.2
MC Qu. 05 The most common way to access the Internet i...
The most common way to access the Internet is through
What question should you ask when deciding which device to design for first? (UX)
Where will users go once they access the app or website?
Where will users be when they access the product?
When will users access the product?
How much do users pay for internet access, cellular access, or wi-fi signal?
Answer:
I think it's either "Where will users go once they access the app or website?" or "How much do users pay for internet access, cellular access, or wi-fi signal?"
This one's tricky
Karen has a discrete analog clock in the shape of a circle. Two hands rotate around the center of the circle, indicating hours and minutes. The clock has 60 marks placed around its perimeter, with the distance between consecutive marks being constant.
The minute hand moves from its current mark to the next exactly once every minute. The hour hand moves from its current mark to the next exactly once every 12 minutes, so it advances five marks each hour. We consider that both hands move discretely and instantly, which means they are always positioned exactly over one of the marks and never in between marks.
At midnight both hands reach simultaneously the top mark, which indicates Zero hours Zero minutes. After exactly 12 hours or 720 minutes, both hands reach the same position again, and this process is repeated over and over again. Note that when the minute hand moves, the hour hand may not move; however, when the hour hand moves, the minute hand also moves.
Karen likes geometry, and she likes to measure the minimum angle between the two hands of the clock at different times of the day. She has been writing some measures down, she noticed that some angles were repeated while some others never appeared. For instance, Karen noticed that both at three o'clock and at nine o'clock the minimum angle between the two ands is 90 degrees, while an angle of 65 degrees not appear in the list.
Karen decided to verify, for any integer number between 0 and 180, if there exists at least one time of the day such that the minimum angle between the two hands of the clock is exactly A degrees. In this lab you will code a program to help Karen to answer this question and display which hour meet the angle.
NOTE: Your program needs to perform operation(s) and use control statements to solve the problem. Solutions that imply to create a switch-case or if-else for all 181 (or 91) possible values (Hard Coding) automatically will be scored with 0.
Input:
The program gets as input an integer value A s.t. (0<= A <= 180), which represents the angle to be verified. Validate that this input is within the valid range.
Output:
If there exist at least one time of the day such that the minimum angle between the two hands of the clock is exactly A degrees, then display how many hours met the specified angle and those hours in ascending order (24-hour military time clock). Otherwise display "There is no hour where the hands are A degrees apart".
Answer:
no idea
Explanation:
but I want you to know, you are a great person
Marc is a gamer and is in the market for a new computer to support a lot of graphics. He needs to find a computer with a high amount of RAM, because the higher the RAM, the faster it will function.
A: True
B: False
Since Marc is a gamer and is in the market for a new computer to support a lot of graphics. He needs to find a computer with a high amount of RAM, because the higher the RAM, the faster it will function is option A: true statement.
What is the statement of the higher the RAM, the faster it will function about?In regards to computing, when the RAM is known to be faster, one can say also that the faster will be the computer the processing speed.
Note that when there is a faster RAM, a person or a computer user can be able to increase the speed through which the computer memory moves information to other parts of the system.
This implies that there is a fast processor and thus an equally faster means of talking to the other areas of the system, making the computer to be much more good.
Therefore, Since Marc is a gamer and is in the market for a new computer to support a lot of graphics. He needs to find a computer with a high amount of RAM, because the higher the RAM, the faster it will function is option A: true statement.
Learn more about RAM from
https://brainly.com/question/13196228
#SPJ1
what is network security and why we need it?
Answer:
Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection.
Explanation:
brainliest please
To tell an audience a story about a data set, it is best to use a _____________.
A) memo
B) graph
C) dashboard
D) report
why is this happening and how do I fix it?
Answer:
who is known as prophet of the computer?why?
characteristics of third generation of computer
Answer:
1. Use of Integrated Circuits (IC) instead of transistors.
2. Use of Semi-conductor memory.
3. Small size than previous generation computers.
4. Use of magnetic storage devices.
5. Improved faster operations and more dependable output.
6. Use of mini computers.
7. Use of monitors and line printers.
What can a programmer expect when writing a modular program for a game
Answer:
That it's gonna be hard.
Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the programs and apps that Wendy might use in her degree program and recommend a computer with sufficient hardware specifications to adequately support her through the degree program. Provide a link to the computer you locate and justify why you feel the computer will best meet her needs. Why did you choose the central processing unit? Why did you choose the amount of RAM? Why did you choose the storage device?
Some of the programs and apps that Wendy might use in her degree program of architecture are:
AutoCAD Mobile AppMorpholio Trace Pro.ARki. ArchiSnapper 5.MagicPlan.Shapr3DA recommended computer that Wendy Patel can use in her university study of obtaining a degree in architecture is an ASUS ZenBook S Ultra Slim Flip Laptop.
The RAM is 16GB RAM and the CPU is an 11th Generation Core i7-1165G7 chip that would help her navigate through her design projects.
What is Architecture?This refers to the process of designing and constructing buildings with the aid of software.
Hence, we can see that Some of the programs and apps that Wendy might use in her degree program of architecture are:
AutoCAD Mobile AppMorpholio Trace Pro.ARki. ArchiSnapper 5.MagicPlan.Shapr3DA recommended computer that Wendy Patel can use in her university study of obtaining a degree in architecture is an ASUS ZenBook S Ultra Slim Flip Laptop.
The RAM is 16GB RAM and the CPU is an 11th Generation Core i7-1165G7 chip that would help her navigate through her design projects.
Read more about architecture here:
https://brainly.com/question/9760486
#SPJ1
(7) Accept a 4-digit number from a user. Your task is to create a simple encrypted corresponding value
of this number. First separate each number into its individual digits. For each individual digit, if the
individual digit is greater than or equal to 5, subtract that value from 9. Output the new value (in its
individual digits) which would now represent the encrypted corresponding value. For example, if the
user entered 5678, the encrypted corresponding value would be 4 2 3 1. (Required: IPO chart,
Pseudocode, C-program and Python)
Using the knowledge in computational language in python it is possible to write a code that create a simple encrypted corresponding value
of this number.
Writting in the C code:#include<stdio.h>
int main()
{
int num,r,rev=0;
scanf("%d",&num);
while(num!=0)
{
r=num%10;
rev=rev*10+r;
num=num/10;
}
while(rev!=0)
{
r=rev%10;
if(r>=5)
{
r=9-r;
}
printf("%d ",r);
rev=rev/10;
}
return 0;
}
Writting in python code:num=int(input("Enter number:"))
rev=int(str(num)[::-1])
while rev!=0:
r=rev%10
if r>=5:
r=9-r
print(r,end=" ")
rev=rev//10
See more about python at brainly.com/question/12975450
#SPJ1