In which link-building opportunity are you directly competing with another website in a ""win-win"" situation

Answers

Answer 1

Answer:

I'm kind of sorta am now with aboutblank.com but it doesn't matter now

Explanation:


Related Questions

3. Discuss microprocessor components, chips,
and specialty processors.


5. Define expansion slots, cards,including
graphics cards, network interface cards, wireless
network cards, and SD cards.​

Answers

Answer:

3

Microprocessor Components

Control Unit.

I/O Units.

Arithmetic Logic Unit (ALU)

Registers.

Cache.

The chips capacities express the word size, 16 bits, 32 bits, and 64 bits. The number of bits determined the amount of data it can process at one time

The specialty processors are specifically designed to handle special coprocessor and Graphics Processing Unit (GPU), like displaying 3D images or encrypting data.

5

slot machine, known variously as a fruit machine, puggy, the slots, poker machine/pokies, fruities or slots, is a gambling machine that creates a game of chance for its customers.

A video card (also called a graphics card, display card, graphics adapter, or display adapter) is an expansion card which generates a feed of output images to a display device (such as a computer monitor).

network interface controller is a computer hardware component that connects a computer to a computer network. Early network interface controllers were commonly implemented on expansion cards that plugged into a computer bus.

wireless network interface controller is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet.

The standard SD card has dimensions of 32 mm by 24 mm by 2.1 mm, a storage capacity of up to 4 GB. Typical levels of performance are not as high as the other types of SD memory card mentioned below.

good luck!!!

Which of the following does PXE use?
a) USB
b) DVD-ROM
c) CD-ROM
d) NIC

Answers

Answer:

The answer is d) NIC.

Explanation:

PXE Stands for Preboot Execution Environment and a PXE uses an NIC also know as Network Interface Controller. For an example: If you have a DELL Inspiron 8500 and you couldn't get it to work you would need to go through all boot-up system including a Preboot Execution Environment in the booting code protocols it would say connecting to NIC after 6 seconds it would say NIC connected then it would search for a boot device after a few munities since the DELL Inspiron 8500 is obsolete you would get this message:

No Boot Device found

Suppose a program is supposed to reverse an array. For example, if we have the array arr = {1, 2, 3, 4, 5}, after reversing the array we would have arr = {5, 4, 3, 2, 1}.

Most of the code for the program is shown here:
Const int SIZE = 5;
int arr[SIZE] = {1, 2, 3, 4, 5};
int firstindex =0, lastindex = SIZE-1, temp;

1 _______________________________

{
temp = arr[firstindex];
arr[firstindex] = arr[lastindex];
arr[lastindex] = temp;
firstindex++;
lastindex--;
}

All of the following options below could be correctly inserted at line 1 in the code shown above EXCEPT:

a. while(firstindex < lastindex)
b. while(firstindex <= lastindex)
c. for(int i=0; i<(SIZE/2-1); i++)
d. for(int i=0; i<(SIZE/2); i++)

Answers

Answer:

The answer is "Choice C".

Explanation:

In this question, the choice C is correct because all the other options will the output "5 4 3 2 1" and it will given "5 2 3 4 1" as output which is defined in the attached file. please find it.

Write the simulate method, which simulates the frog attempting to hop in a straight line to a goal from the frog's starting position of 0 within a maximum number of hops. The method returns true if the frog successfully reached the goal within the maximum number of hops; otherwise, the method returns false. TheFrogSimulationclass provides a method calledhopDistancethat returns an integer representing the distance (positive or negative) to be moved when the frog hops. A positive distance represents a move toward the goal. A negative distance represents a move away from the goal. The returned distance may vary from call to call. Each time the frog hops, its position is adjusted by the value returned by a call to thehopDistance method. g

Answers

Answer:

Explanation:

The following code is written in Python. It creates the simulate method which takes in an argument for the max number of hops and the goal distance. Then it loops the number for the max number of hops and asks the user for a hop input using the hopDistance() method (which was not included so it was made, this can be removed if wanted). Then it updates position. If after the max hops goal was reached it returns True, otherwise it returns False.

def simulate(max, goal):

   position = 0

   print("Goal is " + str(goal))

   for x in range(max):

       hop = hopDistance()

       position += int(hop)

   if position >= goal:

       return True

   else:

       return False

def hopDistance():

   return input("Frog Hop Distance this hop: ")

print(simulate(4, 20))

Which Save As element allows a user to save a presentation on a computer?
Add a Place
OneDrive
Recent
This PC

Answers

Answer:

Option D, This PC allows a user to save a presentation on a computer

Explanation:

If one choses the option C, the file will be saved in the folder in which the user is working. Hence, option C is incorrect.

Like wise option A is also incorrect as it will require user to provide a location as option for saving the file

Option B is also incorrect as it will allow the user to save files in the C drive/D drive or one drive

Option D is correct because if the user choses this option file will be saved on the computer.

Hence option D is correct

Answer:

Option D : This PC allows a user to save a presentation on a computer

Explanation:

Edg 2021

______ lets people access their stored data from a device that can access the Internet.
______ are programs that help people work and play online.

Answers

Answer:

Cloud computing and applications

Explanation:

Answer: Cloud computing

Applications

Explanation:

what is java programing

Answers

Answer:

Explanation:

Java is a class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. ... Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture

Answer:

The Java programming language was developed by Sun Microsystems in the early 1990s. Although it is primarily used for Internet-based applications, Java is a simple, efficient, general-purpose language. Java was originally designed for embedded network applications running on multiple platforms.

Explanation:

1.   Microsoft Office is ?​

Answers

Answer:

What do you mean?

Explanation:

Microsoft office is a good tech company

I just the question what

Define a function below, filter_only_strs, which takes a single argument of type list. Complete the function so that it returns a list that contains only the strings from the original list and no other data. It is acceptable to return an empty list if there are no strings in the original list.

def filter_only_strs(1st):
for x in lst:
if isinstance(x,str)==False:
lst.remove(x)
return ist Restore original file

Answers

Answer:

Explanation:

The code provided aside from some minor errors (fixed version down below) is correct, but it will never be able to accomplish what is being asked in the question. This is because this code is simply copying and returning the exact same list that is passed as an argument, because it is looping through it and comparing its own elements. In order to accomplish what is asked in the question, two lists need to be passed as parameters. The first would be the original list, and the second would be a list of test elements that will be used to compare and see if they exist in the original list. This would allow us to create a new list with only the elements that existed in the original list.

def filter_only_strs(lst):

   for x in lst:

       if not isinstance(x, str):

           lst.remove(x)

   return lst

I am the combination of keys used to write data in multiple lines in the same cell​

Answers

Answer:

Explanation:

The answer is keyboard

Which of the following is not part of the four ways you can avoid problems with email communication?
a.
Be brief.
b.
Proofread your message.
C.
Reply right away after you get an email.
d.
Seek other ways to relay your message

Answers

Answer:

d is the correct answer for this problem

StreamPal is an audio-streaming application for mobile devices that allows users to listen to streaming music and connect with other users who have similar taste in music. After downloading the application, each user creates a username, personal profile, and contact list of friends who also use the application.

The application uses the device’s GPS unit to track a user’s location. Each time a user listens to a song, the user can give it a rating from 0 to 5 stars. The user can access the following features for each song that the user has rated.

A list of users on the contact list who have given the song the same rating, with links to those users’ profiles
A map showing all other users in the area who have given the song the same rating, with links to those users’ profiles
A basic StreamPal account is free, but it displays advertisements that are based on data collected by the application. For example, if a user listens to a particular artist, the application may display an advertisement for concert tickets the next time the artist comes to the user’s city. Users have the ability to pay a monthly fee for a premium account, which removes advertisements from the application.

Which of the following statements is most likely true about the differences between the basic version and the premium version of StreamPal?

Group of answer choices
a. Users of the basic version of StreamPal use less data storage space on their devices than do users of the premium version of StreamPal.
b. Users of the basic version of StreamPal are more likely to give songs higher ratings than are users of the premium version of StreamPal.
c. Users of the basic version of StreamPal indirectly support StreamPal by allowing themselves to receive advertisements.
d. Users of the basic version of StreamPal spend more on monthly fees than do users of the premium version of StreamPal.

Answers

Answer:

Users of the application may have the ability to determine information about the locations of users that are not on their contact list.

Using a tag, set the color to green for all tags.

Answers

Answer:

<style>

p {

background-color: rgb(255, 0, 0);

}

h1 {

background-color: rgb(0, 255, 0);

}

ol {

background-color: rgb(97,51,47);

}

</style>

Explanation:

Put this at the top of your code. It should target the paragraph tag, the header h1 tag, and the Ordered List (OL) tag individually and set their background colors respectively.

It's been a while since I've done CSS so you might have to tweak the syntax a bit, but it should look something like that.

Consider the following method:
public static String joinTogether(int num, String[] arr)
{
String result = "";
for (String x : arr)
{
result = result + x.substring(0, num);
}
return result;
}

The following code appears in another method in the same class:
String[] words = {"dragon", "chicken", "gorilla"};
int number = 4;
System.out.println(joinTogether(number, words));

What is printed when the code above is executed?
a. dragonchickengorilla
b. drachigor
c. dragchicgori
d. dragochickgoril
e. There is an error in the program, it does not run

Answers

Answer: b.

Explanation:

What is the molar mass of AuCI2

Answers

Answer:267.8726

Explanation:

how can a computer be used by a manager of a shopping mall​

Answers

Answer:

- used to look at security cameras

- used to buy supplies for the mall (maintenance)

- billing

Answer:

With growing square footage of shopping malls, however, comes the challenge of managing these super structures. Shopping mall managers need to take care of all tenant and building services, including physical security hardware of both the individual tenants’ spaces, the general facility and common areas.

What are some of the security and access control challenges unique to shopping centers and malls?

Multiple tenants across multiple buildings. Access for tenants with their own set of employees needs to be managed efficiently.

Tenant turnover.  When a tenant terminates his lease, his ability to access the space should be completely revoked.  Mall management must be able to do this in a timely manner for the security of the shared property and for the safety of the next tenant.

Expansion, reduction and relocation of tenants within facilities.  While this does not entail revocation of access, mall management must be able to provide smooth transition, in terms of access control to the new space, and denial of access to the previously-occupied space where a new tenant will be moving in.

Security for Shared Entrances and Spaces. Managing access privileges for shared facilities like that in a mall can be challenging. For instance, if a tenant in a mall hires or fires an employee, mall management needs to be informed so they can update access privileges to common entrances and shared spaces. This also applies for maintenance workers, cleaning crews and the like. An efficient access control system allows mall management to control access privileges with ease.

Explanation:

Charles wants to work for himself in the Transportation and Logistics career cluster. Which lists the jobs with the best
chance self-employment from highest to lowest?
O Brownfield Redevelopment Specialists – Taxi Drivers - Mechanics - Logisticians
O Taxi Drivers - Brownfield Redevelopment Specialists - Logisticians - Mechanics
O Logisticians - Mechanics - Taxi Drivers - Brownfield Redevelopment Specialists
O Mechanics - Logisticians - Brownfield Redevelopment Specialists – Taxi Drivers

Answers

Answer:

i think its b

Explanation:

makes the most sense

Answer:

B: offices

Explanation:

Hope you get 100 on your test

Write a program that calculates the average rainfall for three months. The program should ask the user to enter the name of a data file that that contains rainfall data for three months. The file consists of three lines, each with the name of a month, followed by one or more spaces, followed by the rainfall for that month. The program opens the file, reads its contents and then displays a message like:

Answers

Answer:

Explanation:

The following Python program reads the file called text.txt and loops through each line, removing whitespace and seperating the month and rainfall. Then it prints each Month with its corresponding rainfall amount. Finally it calculates the average rainfall and outputs that.

file = open('text.txt', 'r')

total_rainfall = 0

for line in file:

   line = line.replace('\n', '')

   info = line.split(' ')

   info = [i for i in info if i != '']

   print(info[0] + " will have a total of " + info[1] + " inches of rainfall.")

   total_rainfall += int(info[1])

average = total_rainfall / 3

print("Average Rainfall will be " + str(average) + " inches")

Choose a problem that lends to an implementation that uses dynamic programming. Clearly state the problem and then provide high-level pseudocode for the algorithm. Explain why this algorithm can benefit from dynamic programming. Try to choose an algorithm different from any already posted by one of your classmates.

Answers

Answer:

Explanation:

The maximum weighted independent collection of vertices in a linear chain graph is a straightforward algorithm whereby dynamic programming comes in handy.

Provided a linear chain graph G = (V, E, W), where V is a collection of vertices, E is a set of edges margins, and W is a weight feature function applied to each verex.  Our goal is to find an independent collection of vertices in a linear chain graph with the highest total weight of vertices in that set.

We'll use dynamic programming to do this, with L[k] being the full weighted independent collection of vertices spanning from vertex 1 \to vertex k.

If we add vertex k+1 at vertex k+1, we cannot include vertex k, and thus L[k+1] would either be equivalent to L[k] when vertex k+1 is not being used, or L[k+1] = L[k-1] + W[k+1] when vertex k+1 is included.

[tex]Thus, L[k+1] = max \{ L[k], \ L[k-1] + W[k+1] \}[/tex]

As a result, the dynamic programming algorithm technique can be applied in the following way.

ALGO(V, W, n) // V is a linearly ordered series of n vertices with such a weight feature W

[tex]\text{1. L[0] = 0, L[1] = W[1], L[2] = max{W[1], W[2]} //Base cases} \\ \\ \text{2. For i = 3 to n:- \\} \\ \\\text{3........ if ( L[i-1] > L[i-2] + W[ i ] )} \\ \\ \text{4............Then L[ i ] = L[i-1]} \\ \\ \text{5.........else} \\ \\ \text{6................L[i] = L[i-2] + W[i] }\\ \\ \text{7. Return L[n] //our answer.}[/tex]

As a result, using dynamic programming, we can resolve the problem in O(n) only.

This is an example of a time-saving dynamic programming application.

A DNS TTL determines what?

Answers

Answer:

its time lapse and nod of serviaciation in between A and B. Each device connected will minus 1

What career opportunities are available within the floral industry?

Answers

Answer: The floral industry has quite an array of possible occupation pathways. You can do flower production, design, publishing, marketing, home design, engineering, retailing, commercial, research, and lots more.

Which one is the result of the output given by a computer?

Answers

Answer. Answer: Instruction,Data,Information all of these

True or false you cannot get a computer virus is you instal antivirus

Answers

Answer: F

Explanation: There are many ways hackers can get into your computer, and many ways can bypass an antivirus so it is False

This is true because if you instal antivirus is no way the computer get virus then

Write a program which simulates the result of a person choosing 3 objects in a random order out of a box containing 3 objects in total. The box contains the following 3 objects: apple, ball, cat. A single selection pass of your program describes the random selection of 3 objects out of the box, without replacement. This means that a particular object can only be selected from the box once. At the beginning of a pass, the box is full, so it contains all 3 objects. After an object is selected from the box, your program will print the name of the object and then choose another object without replacing the previous object. The selection process repeats 3 times until the box is empty

Answers

Answer:

Explanation:

The following code is written in Python, it loops through a list (box) of the objects and randomly choosing one of the objects. Prints that object out and removes it from the list. Then repeats the process until the box is empty.

import random

box = ['apple', 'ball', 'cat']

print(box)

for x in range(len(box)):

   pick = random.randint(0,len(box)-1)

   print("Pick " + str(x+1) + ": " + box[pick])

   box.remove(box[pick])

print(box)

BIOS programs are embedded on a chip called ​

Answers

Explanation:

BIOS software is stored on a non-volatile ROM chip on the motherboard.

what is the full from of CPU?​

Answers

Answer:

CPU is known as Central Processing Unit.

Full form? Like CPU meaning central processing unit?

Create a public class called Catcher that defines a single class method named catcher. catcher takes, as a single parameter, a Faulter that has a fault method. You should call that fault method. If it generates no exception, you should return 0. If it generates a null pointer exception, you should return 1. If it throws an illegal argument exception, you should return 2. If it creates an illegal state exception, you should return 3. If it generates an array index out of bounds exception, you should return 4.

Answers

Answer:

Sorry mate I tried but I got it wrong

Explanation:

Sorry again

Which describes the third step in visual character development?

Answers

3d model of a character is the third step

What transport layer protocol does DNS normally use?

Answers

Explanation:

DNS uses the User Datagram Protocol (UDP) on port 53 to serve DNS queries. UDP is preferred because it is fast and has low overhead. A DNS query is a single UDP request from the DNS client followed by a single UDP reply from the server.

The transport layer protocol that DNS normally use is the User Datagram Protocol (UDP).

What is transport layer protocol?

The Internet Protocol (IP) is a network layer protocol, and the Transmission Control Protocol (TCP) is a transport layer protocol.

A network communication between applications is established and maintained according to the Transmission Control Protocol (TCP) standard. The Internet Protocol (IP), which specifies how computers send data packets to one another, works with TCP.

User Datagram Protocol (UDP) on port 53 is how DNS serves DNS requests. Due to its speed and low overhead, UDP is recommended. A single UDP request from the DNS client and a single UDP response from the server makes up a DNS query.

Therefore, the transport layer protocol used by DNS is User Datagram Protocol (UDP).

To learn more about transport layer protocol, refer to the link:

https://brainly.com/question/4727073

#SPJ12

Because filling a pool/pond with water requires much more water than normal usage, your local city charges a special rate of $0.77 per cubic foot of water to fill a pool/pond. In addition, it charges a one-time fee of $100.00 for filling. This water department has requested you, as a programmer, write a C program that allows the user to enter a pool's length, width, and depth, in feet measurement. The program will then calculate the pool's volume, the volume of water needed to fill the pool with the water level 3 inches below the top, and the final cost of filling the pool, including the one-time fee. And then, all the entered sizes of the pool (in feet) and the three calculated values will be displayed on the screen. Finally, your full name as the programmer who wrote the program must be displayed at the end. To find the volume of the pool in cubic feet, use the formula: volume

Answers

Answer:

In C:

#include <stdio.h>

int main(){

   float length, width, depth,poolvolume,watervolume,charges;

   printf("Length (feet) : ");    scanf("%f",&length);

   printf("Width (feet) : ");    scanf("%f",&width);

   printf("Depth (feet) : ");    scanf("%f",&depth);

   poolvolume = length * width* depth;

   watervolume = length * width* (12 * depth - 3)/12;

   charges = 100 + 0.77 * watervolume;

   printf("Invoice");

   printf("\nVolume of the pool: %.2f",poolvolume);

   printf("\nAmount of the water needed: %.2f",watervolume);

   printf("\nCost: $%.2f",charges);

   printf("\nLength: %.2f",length);

   printf("\nWidth: %.2f",width);

   printf("\nDepth: %.2f",depth);

   printf("\nMr. Royal [Replace with your name] ");

   return 0;}

Explanation:

This declares the pool dimensions, the pool volume, the water volume and the charges as float    

float length, width, depth,poolvolume,watervolume,charges;

This gets input for length

   printf("Length (feet) : ");    scanf("%f",&length);

This gets input for width

   printf("Width (feet) : ");    scanf("%f",&width);

This gets input for depth

   printf("Depth (feet) : ");    scanf("%f",&depth);

This calculates the pool volume

   poolvolume = length * width* depth;

This calculates the amount of water needed

   watervolume = length * width* (12 * depth - 3)/12;

This calculates the charges

   charges = 100 + 0.77 * watervolume;

This prints the heading Invoice

printf("Invoice");

This prints the volume of the pool

   printf("\nVolume of the pool: %.2f",poolvolume);

This prints the amount of water needed

   printf("\nAmount of the water needed: %.2f",watervolume);

This prints the total charges

   printf("\nCost: $%.2f",charges);

This prints the inputted length

   printf("\nLength: %.2f",length);

This prints the inputted width

   printf("\nWidth: %.2f",width);

This prints the inputted depth

   printf("\nDepth: %.2f",depth);

This prints the name of the programmer

   printf("\nMr. Royal [Replace with your name] ");

   return 0;}

See attachment for program in text file

Other Questions
Does anyone know the answer? Jesse is making fruit salad. She purchased 5 & 1/3 ounces of 6 different fruits. How many ounces of fruit did she purchase? PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!!PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!Write, agree or disagree after each statement then write a sentence or two about why you agree or disagree. If you dont know which side you are on explain why you cannot decide.I would risk my life for a stranger. El conjunto de 10 centenas de mil es igual a _________ unidades El conjunto de 10 decenas de mil es igual a __________ unidades pls help me ill give u brainlest if correct What is the equation of the exponential function??Anthony's mom bought a new Prius in 2018 that cost$28,000. She looked up the current value and saw thatit was only $22,000 after two years! She is worriedabout how much her car will be worth in 3 more years.What is the exponential equation?1How much will the car be worth in 3 years?Submit what is photosynthesis Helpp click on picture Anne wants to fill 12 hanging baskets with compost. Each hanging basket is a hemisphere of diameter 40 cm.Anne has 4 bags of compost. There are 50 litres of compost In each bag. Has Anne got enough compost to fill the 12 hanging baskets? why would nobody help me Please help its about a type of galaxy How is the L-section filter useful at both low and high frequencies? a tree is sold based on the circumstances of the tree .if a tree has a radius of 4 inches then what is the circumference of the tree Which of the following best describes careers that use chemistry?A. Careers that involve scientific research or chemistry instructionB. Only careers that involve scientific researchC. Only careers that involve chemical manufacturingD. A variety of careers in many different industries The Mauryan Empire's economic ties and trade networks, such as the Silk Road, allowed for the sharing of ideas, culture and goods. One example of this sharing is A. the spread of Hinduism in East Asia. B. the spread of Buddhism in Central Asia. C. the spread of the Indian language into East Africa. D. the spread of centralized government in Southwest Asia. PLEASE HELP I AM TAKING A BENCHMARK If a 23-ounce box of cereal costs $2.89, what should a 30/ounce box cost? 9. Cmo es la atmsfera que se crea en el poema?A. Realista.B. De misterio.C. Sobrenatural.D. De ensoacin. What is troposphere Find the value of x.6143x-1221x = [?] Parallelograms..help please haha