Answer:
Energy
Explanation:
While reviewing a Web site about a medical condition your aunt was just diagnosed with, you decide to check on the writer of the site. You verify that the writer is a well-known doctor and is a frequent television expert on this medical condition. What characteristic of an effective Web site does this show?
reputable author
verified
unbiased
relevant
Answer:
This is a characteristic of a reputable author
Which audio editing effect removes distortions from the audio composition?
A.
amplify
B.
normalize
C.
fade in
D.
compressor
E.
fade out
Answer:
The answer is normalize for my plato family.
Explanation:
When normalizing you can use this option to remove distortions in the recorded sound. Ideally, you should normalize a track before using the amplify effect. Otherwise, the amplify effect would amplify the decibel levels of the distortions too.
Tier 1 networks form the internet ____.
Answer:
Internet Backbone
Explanation:
The internet is a network of networks, no single tier 1 network (ISP companies like Sprint, IBM, Verizon, AT&T for example, they provide the cables and routers that connect the networks) can reach the entire internet on its own, so they merge together to form the Internet Backbone, a backbone network enables all users and companies to connect with each other.
Amara created a workbook to track the number of minutes she reads each week. Each day, she entered the number of minutes into the workbook. Identify the types of data in the workbook using the drop-down menus. 25: 105: Wed:
Answer:
25: Value
105:Formula
Wed: Label
Explanation:
Answer:
C- Value
A- Formula
B- Label
Explanation:
What is the output?
answer = 0
for numB in [1,4]
for numA in [2,3]
answer = answer + numA + numB
print (answer)
Answer:
20
Explanation:
Answer:
its 20 edg 2021
Explanation:
What is one benefit of using a web clipping tool?
It can be used to reuse text and images.
It has a drawing-to-notes feature.
It may provide a personal organizer.
It may have different alarm settings.
Answer:
the correct answer is A I took the quiz
Explanation:
Answer:
a
Explanation:
What is the power of 3 shch that it's power is 1/3 ?
Answer:
3/1-1
Explanation:
Critical Thinking Questions
You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.
Answer:
One example of syntax in Logo is “[”. Two examples of Java are “;” and “{“or “}”. If you don’t use these parts of syntax then you could get a Syntax error, this will make you have to stop the code and debug.
Explanation:
Answer:
I am giving this answer so the other person can get brainliest
Explanation:
Which of the following was the primary purpose of muckraking, sensationalism, and yellow journalism in the early 1900s?
to improve literacy rates
to expose government corruption
to make a profit
to influence social reform
Answer:
C
Explanation:
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer development by dates (chronologically)
Answer:
The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.
Explanation:
The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were five generations of computer development. They were :
1. First Generation computers
In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.
2. Second Generation computers
These are transistors based computers. This generation ranges from 1959 to 1965.
3. Third Generation computers
This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.
4. Fourth Generation computers
The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.
5. Fifth Generation computers
The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.
please help in this question
Answer:
A loop statement is used to execute one of more statement depending on whether.
HELP ASAP IF YOU KNOW PYTHON 2!!!
Please use the attached files for the assignment and understanding it. Note: You can only see the files on the computer version of Brainly.
Answer:
Thats one long assignment, hard to get answers as we are given a 19 min limit to reply, atleast sub divide the assignment and we'll help you in any walls across yor journey. SORRY
What is the value of the variable? (1 point)
double dNum =
(int) 38.78;
1) 38
2) 38.0
3) 38.78
4) 39
5) Error: incompatible types
Jim wants to shoot a video. This requires him to move from one place to another. Which type of camera support should Jim use?
Answer:
I think Jim should use a movement tracker camara
Explanation:
since he is moving around the camera would follow him around
Answer:
shoulder mount
Explanation:
A picture drawn in 3 d is called?
Answer:
autostereogram
Explanation:
that^
Help me please (⌒-⌒; )
Answer:
raise the prices
Explanation:
Hope this helped, Have a Great Day/Night!!
How many types of sharing of Google Forms are possible?
Answer:
Open a form in Google Forms.
In the top right, click More .
Click Add collaborators.
Under "Invite people," type the names or email addresses of the people you want to work with.
Click Send.
wanna play pubg
ill send u my id
Answer:
Nah ill pass
Explanation:
because I don't have module data so I am very sorry
What would this look like if you were to write the pseudocode but for c++?
Answer:
when make a task list you would not include commands that are for any specific language like C++
Explanation:
pseudocode should be universal. So when creating the task list, you would not include commands that are for any specific language like C++, java, C#, or perl. The point of pseudocode is to design a program that can be translated in to any language.
Calculate and express your answer in decimal form.
12⋅17
34⋅200
(0.2)⋅40
(0.25)⋅60
Answer:
ポイントが欲しいだけなのかわからない
Explanation:
何語を話していますか
Can someone please help me?
Answer:
Im pretty sure its a
Explanation:
Monica needs to assess the slide sequence and make quick changes to it. Which view should she use in presentation program?
Answer:
Slide Sorter View. Using the slide sorter view, Monica can view and change slide position that she prefer quickly. Slides are presented in series of 3 columns that she can drag and drop to a different position whichever she likes.
Explanation:
Someone please help will mark as brainliest
Answer:
The word is "short"
Explanation:
when you add the two letters "er" to "short" it becomes the word "shorter"
I hope this helps.
Answer:the word short?...
Explanation:
All dogs = 199999990158161231
A = B
B = C
C = D
Please help this question makes 0 sense but my teacher asked me it so I gotta figure it out
Answer:
C=D cause d spells dogs jk I really dont know
Answer:
B
Explanation:
please elp i will give you brainelst answer the question and answer please!!!!!!!!!!!!!!!!
I GIVE YOU BRAINELST 5 STARS AND HEART!!!!
Answer:
I'd so like one of the Presidents.
Explanation:
research some facts. make sure to use your resources. Put some facts on who their vice president was a stuff
An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?
A 5
B 6
C 7
D 8
Answer: I believe the answer is: A, 5.
Explanation:
The minimum number of bits required to assign a unique bit sequence is 7.
Binary numbers are represented as 0's and 1's
Let n = number of bits [tex] {2}^{n} = required \: sequence[/tex]Therefore,
[tex] {2}^{n} \geqslant 100[/tex]The whole number value of n, which is greater than or equal to 100;
[tex] {2}^{7} = 128[/tex]The value of n which satisfies the inequality is 7
Therefore, the minimum number of bits required is 7.
Learn more : https://brainly.com/question/20865548?referrer=searchResults
Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod). Displays the sum.
Answer:
Following are the code to this question:
#include <iostream>//defining header file
using namespace std;
int main()//defining main method
{
int x[]={2,3,4,6,7,8,9,1,11,12};//defining 1-D array and assign value
int i,sum=0;//defining integer variable
for(i=0;i<10;i++)//defining loop for count value
{
if(x[i]%2==1)//defining if block to check odd value
{
sum=sum+x[i];//add value in sum variable
}
}
cout<<sum;//print sum
return 0;
}
Output:
31
Explanation:
In the above-given program, an integer array "x" is declared that holds some integer values, and in the next line two integer variable "i and sum" is defined which is used to calculate the value.
In the next line, a for loop is declared, that counts all array value, and it uses the if block to check the odd value and add all the value into the sum variable.
The code is in Java.
It uses for loop, if-else structure, and mod to calculate the sum of odd numbers in a list.
Comments are used to explain each line of code.
You may see the output in the attachment.
//Main.java
import java.util.*;
public class Main
{
public static void main(String[] args) {
//create a list with some numbers
List<Integer> lotsOfNumbers = Arrays.asList(7, 20, 1002, 55, 406, 99);
//initialize the sum as 0
int sumOfOdds = 0;
//create a for each loop to iterate over the lotsOfNumbers list
//check each number, if it is odd or not using the mod
//if it is odd, add the number to the sum (cumulative sum)
for (int number : lotsOfNumbers){
if(number % 2 == 1)
sumOfOdds += number;
}
//print the sum
System.out.println("The sum of odd numbers: " + sumOfOdds);
}
}
You may check out another question at:
https://brainly.com/question/24914609
Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are neatly trimmed. What habit does Carla demonstrate with these preparations?
motivation
punctuality
personal hygiene and grooming
interpersonal skills
Answer:
C.) Personal Hygiene and Grooming
Explanation:
PLEASE HELP ASAP!!!!!!!
Is this statement true or false?
You can apply only one of these at a time: underline, bold, or italics.
true
false
Answer:
i am pretty sure that is false
Explanation:
1. Select the Volatile Memory *
RAM
ROM
Secondary Memory
2. A Malware is a *
program that enables the computer to run faster.
software in a computer that fights against VIRUS.
Harmful software to the computer
3. The full form of LAN is *
Locally Area Network
Local Area Network
Local Area Networking
4. The smallest Unit of data is called as *
Bit
Byte
Megabyte
5. The permanent memory built in your computer is *
Monitor
ROM
RAM
6. Which one of the following is a VIRUS *
Morris Malware
ILOVEYOU Malware
Mellisa malware
7. Which of the following storage devices are found inside the computer? *
Hard disk drive
SSS Drive
Magnetic Tape
8. The full form of ROM is *
Read Only Memory
Reading Only Memory
Read On Memory
9. Choose the Highest Unit of Data from the following. *
Megabyte
Gigabyte
Answer:
1 no.
ram
2
harmful software to the computer
3
local area network
4
bit
5
ram
6
morris malware
7
hard disk drive
8
read only memory9
gigabyte
hope this will help u