There are thousands of downloadable digital images online that you can use in your presentations. {TRUE or FALSE}
this is for speech

Answers

Answer 1
True hopes this helps!
Answer 2

It should be noted that thousands of downloadable digital images are online for ones presentations.

This statement is true because, digital image serves as picture that is stored on a computer.

It can be been digitized, that is converted into a sequence of numbers that computers can understand and its available online.

Learn more about digital images at;

https://brainly.com/question/24448358


Related Questions

A DVD-ROM can store more data than a CD-ROM of the same size. Comment.

Answers

Answer:

ya its true that DVD-ROM can store more data except CD-ROM

Explanation:

more dat saving in with DVD-ROM

Write a program that takes a positive integer argument N, and prints out the average, minimum, and maximum (in that order) of N uniform random numbers that it generates. Note that all three statistics should be over the same sequence of N random numbers python

Answers

Answer:

from random import seed, choices

from statistics import mean

number = int(input("Enter integer number: "))

if number > 0:

   try:

       data = range(number+1)

       # to generate a pseudo-random number list.

       seed(10)

       # you can also use: num_list = [random.randint(0, number+1) for i in data]

       num_list = choices(data, k=len(data))

       print(num_list)

       mean_val = round(mean(num_list), 2)

       min_val = min(num_list)

       max_val = max(num_list)

   except ValueError:

       print("Must be an integer value.")

print('Avg number: {}\nMax number: {}\nMin number: {}'.format(mean_val, max_val, min_val))

Explanation:

To generate random items in a list of integers, the random choices method is used and a sequence is passed as an argument. The average, maximum, and minimum number of the list is calculated and displayed.

Let g(x) = cos(x/2) - 3x. Let f(x) = 2x + 5. What is g(f(x))?​

Answers

Answer:

f = 2

Explanation:

g(x) = cos(x/2) - 3x=w where w=-3.5 or -1 or -38.5

13– (13/2)-3*13=-3.5 (1st d value of g(x))

-1-(-1/2)-3*(-1)=-1 (the 2nd possible value)

g(x) = cos(x/2) - 3x=-1 where the first x=13 and the 2nd one=-1

where the first x=-1 and the 2nd one=-38.5 (the 3rd value)

g(x) = cos(x/2) - 3x)=0 where cos(x/2=-3.5

g(f(x)) = cos(f(x)/2) - 3 aka 0.5 f(x) = cos(2x+5 aka 7x) (x/2 - 3 =aka -1 );

(2x+5) = 7x by definition but the equation has to be set to 7 to find x)

(7x/2 -6x=0) -7 on both sides

x/2–6x=-7

x/2= 13

26/2=x

x=13 (these values are set up for 2x+5=7.

13-(-7)=-7

13-6+-1=-7

the 2nd x=-1

gfx=cos*2*x i.e cos*2*13 or cos*2*-1

cos*2*13=26

cos*2*(-1)=-1

cos=1

(cos*2*13)=the 1st gfx value=26 basically.

( cos*2*(-13)=-26 (the 2nd gfx value)

cos*2*(-1)=-`1 (the 3rd gfx value)

f=2

hope this helped!

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Drag the tiles to the correct boxes to complete the pairs.
Match the elements of a network to their descriptions.

Answers

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

Write a function in Java that takes in the int[] array, sorts it using bubble sort, then returns back the sorted array.

Answers

Answer

//Class to test the bubble sort

public class BubbleSortTest{

   

//Method to sort the array using bubbleSort

//Takes the array to be sorted as argument

public static int[] bubbleSort(int[] arr) {      

  //Create an integer to hold the length of the array

  int n = arr.length;  

   

  //Create a temporary variable to hold the values of the

                       //array

  //for swapping purposes. Initialize it to zero

  int temp = 0;  

   

  //Cycle through the array element by element

  for(int i = 0; i < n; i++){  

   

   //For each element

   for(int j = 1; j < (n-i); j++){  

     

    //if the element is greater than the element after it

    if(arr[j-1] > arr[j]){  

     //swap the elements  

     temp = arr[j-1];  

     arr[j-1] = arr[j];  

     arr[j] = temp;  

        }    //End of if        

   }   //End of inner for

    }   //End of outer for

 

 //return the sorted array

 return arr;

}

 

   //main method

    public static void main(String [] args){

  //create a sample array

        int [] myArray = {56, 23, 7, 4, 6};

   

  //Call the bubbleSort() method to sort the array

        int [] sortedArray = bubbleSort(myArray);

   

  //Print out the sorted array

        for(int i = 0; i < sortedArray.length; i++){

            System.out.print(sortedArray[i] + " ");

        }

   

    } //End of main method

 

     

}  //End of class BubbleSortTest

Sample Output

4 6 7 23 56

Explanation:

The code above has been written in Java and it contains comments explaining necessary parts of the code. Please go through the comments. A sample output has also been provided.

For clarity, the following shows the actual function alone without using or including it in a class.

=========================================================

//Method to sort the array using bubbleSort

//Takes the array to be sorted as argument

public static int[] bubbleSort(int[] arr) {  

       

       //Create an integer to hold the length of the array

       int n = arr.length;  

       

       //Create a temporary variable to hold the values of the array

       //for swapping purposes. Initialize it to zero

       int temp = 0;  

       

       //Cycle through the array element by element

       for(int i = 0; i < n; i++){  

           

           //For each element

           for(int j = 1; j < (n-i); j++){  

               

               //if the element is greater than the element after it

               if(arr[j-1] > arr[j]){  

                   //swap the elements  

                   temp = arr[j-1];  

                   arr[j-1] = arr[j];  

                   arr[j] = temp;  

            }  

                     

           }  

        }  

   

   //return the sorted array

   return arr;

}

=========================================================

discuss data and its types from computer programming and data analysis prospectively?​

Answers

Answer:

With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.

Raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.

What is data?

The amount of data that may be kept can become absurdly vast depending on how it is used and the categories of data. For storing user information, web pages, games, etc., types like doubles and longs provide for a range of values almost incomprehensible in their vastness.

Utilizing them effectively enables you to plan for the magnitude of whatever you're developing in the future. Additionally, it enables a level of precision that is often not possible without these types.

Therefore, raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.

To learn more about data, refer to the link:

https://brainly.com/question/10980404

#SPJ5

Supporting mobility and smartphone apps is important to MasterCard. What challenges does MasterCard face in rolling out smartphone payment systems? Which of these do you think will be most difficult to address? Why?

(BEWARE OF PLAGARISM, DO NOT JUST COPY PASTE FROM THE INTERNET)

Answers

Answer:

Throughout the clarification portion below, the definition of the concern is mentioned.

Explanation:

Security

The best characteristic that arrives in and out of mind when people think concerning mobile payments would be security. The greater problem for customers and suppliers is this. As mobile purchases are made, suppliers store card information for potential purchases. Anyway, several vendors note that the data would not be kept on either the service side, however people are rather fearful of sending details.

Technology

Some people seem to agree that there's been a significant change in technology in recent years. Especially if we get to see that the frequency of internet access also isn't up to standards in most countries. And in some countries, the network is unavailable and will not link.

Different mobile platforms

The very next thing that needs to be confronted seems to be the multiple platforms crisis. Mobile now has multiple systems and apps that a company produces towards one platform simply doesn't work on yet another platform. Platforms including Android exist.

Fewer users

That very many consumers are accustomed to the current payment service, such as currency, credit card, debit card, pockets including a few others. Because they do not believe them, they weren't in a condition to introduce a different payment system. This has become one of the smartphone transaction system's obstacles.

Required incentives

Incentives are offered whenever the purchase is done by cards or wallets, but they are not accessible when another payment has been made via the billing system for smartphones. To draw more customers, they can do good promotions.

Tedious circulate of payments and incoherent consumer experience

The payment water flowing through several iterations through both the smartphone financial services for compensation. Although if we take into account the payment movement of cards, it is very straightforward. Some manufacturers have now launched embedded chips that are safer than magnet circuits. The transaction seems to be much better on these chips, and performance is instantaneous and smooth.

When tracking time for subcontractors, which QuickBooks window is used to enter subcontractor information? Vendors List Payroll Setup Item List Employee List

Answers

Answer:

Vendors list

Explanation:

The answer to this question is the vendors list. The Vendor List can be defined as a selected or contracted list of suppliers that is needed for a project or company.

The vendor list a quickbooks window that is used to enter subcontractor information. Quickbooks definition of a vendor is a person from whom a product is purchased

what program we write for nested if in c++ to print something after else part but before inner if else
if(condition){
}
else
//something we want to print
if(condition){
}
else{
}

Answers

Answer:

if(condition){

}

else  {

  // something we want to print

  if(condition) {

     // ...

  }

  else {

     // ...

  }

}

Explanation:

Create code blocks using curly braces { ... }.

Use proper indentation to visibly make it clear where code blocks start and end.

Write a program that passes an unspecified number of integers from command line and displays their total.

Answers

Answer:

Explanation:

I will go straight to the code, and hope it didn't confuse you.

Here is it

public static void main(String[] args)

int [] x = new int [args.length]

for (int y = 0; y< args.length;yi++)

int[y] = (int) args [y]

Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.​

Answers

I've included my code in the picture below. Best of luck.

Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.

She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.

Answer:

She connected her microphone to her computer.

She selected the record option in her DAW.

She added effects to her audio composition.

She saved the audio composition in an appropriate file format.

She saved her audio composition on an optical drive.

We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab

Answers

Answer:

insert tab

Explanation:

hope it helps

Answer:

we can create tables in ms word from Insert table

Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income

Answers

Answer:

distance

capacity

smoothness

thickness

capacity, smoothness, thickness, distance, income

A2 Suggest why the Petri dish and agar jelly needed to be sterile.​

Answers

A Petri dish (Petri plate) is a shallow cylindrical glass lidded dish that is typically used to culture microorganisms (agar plates). There are glass and plastic Petri dishes, and both can be sterilized (using an autoclave) and re-used. Before being used for culture purposes, it is important to ensure that the Petri dish is not only clean, but also sterile. This helps prevent the contamination of the new culture.Agar is a polymer made up of various sub-units of galactose and various species of red algae. Although it has other uses including culinary and dentistry, agar plays an important role in microbiology as culture media for a variety of microorganisms.As compared to some of the other alternatives like gelatin, agar has a number of advantages which include:Cannot be easily degraded by microorganism Stronger Firmer than gelatin

What manages and controls the speed of a motherboard's buses? *

RAM
CPU
Chipset
L1 cache

Answers

A bus is simply a circuit that connects one part of the motherboard to another. The back side bus connects the CPU with the level 2 cache. The processor determines the speed of the back side bus. The memory bus connects the northbridge to the memory.

I hope this helps

Chipset manages and controls the speed of a motherboard's buses, Items installed on the motherboard include the CPU and RAM.

What is the speed of a motherboard's buses?

The motherboard is managed by the chipset, it is used to transfer data to and from the CPU and other PC components or PCs.

The path on the motherboard of the PC used to carry data to and from the CPU and other PC components is known as a PC bus, commonly referred to as "the bus." This includes software-to-software communication. The backside bus's speed is set by the processor.

The northbridge and memory are linked by the memory bus. The southbridge is linked to the disk drives through an IDE or ATA bus. The video card is linked to the CPU, memory, and AGP bus.

Therefore, option C is correct.

Learn more about motherboards, here:

https://brainly.com/question/6968002

#SPJ2

If after a call to fork, we want any updates to memory by the parent process to be visible to the child process, and vice-versa, what flag should be included in the fourth argument of mmap?

Answers

Answer:

MAP_SHARED

Explanation:

The MAP_SHARED should be included in the 4th argument of map. When we have a MAP_SHARED set, then we have it that it is preserved across a fork2 system call.

It is visible immediately in every parent, siblings or child processes. This is to say that any change that is made to this mapping is immediately seen by readers.

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts whatever you want such as required for writing a book- easily.

The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.

Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.

principle of rocket propulsion is based on _​

Answers

Answer: Newton’s third law of motion
Explanation: The propulsion of all rockets, jet engines, deflating balloons, and even squids and octopuses is explained by the same physical principle—Newton's third law of motion.

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

a. C++
b. HTML
c. JavaScript
d. CSS

Answers

Answer:

d

Explanation:

CSS is the element to design a webpage and make it look appeasing

c++ is a programming language that is not used in webpages (like Python)

JS makes interactive features

HTML is just the text

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

Assume there is a 30-byte heap. The free list for this heap has two elements on it. One entry describes the first 10-byte free segment (bytes 0-9), and one entry describes the other free segment (bytes 20-29). Now assume we have a request for just a single byte of memory. In this case, the allocator will perform an action known as________ to find a free chunk of memory that can satisfy the request.

a. splitting
b. coalescing
c. chopping
d. relocating

Answers

Answer:

The answer is "Option a".

Explanation:

It is a psychological system that enables its individual to accept difficult or overwhelming feelings and see somebody positive or negative, desirable, or depreciated. It complicates, its control of emotions, which sounds inconsistent mostly on the surface. It also simplifies its control of feelings, which appear conflicting mostly on the surface.

To help mitigate the Target breach, system administrators should have implemented a system that only allowed certain programs to run on the POS (Point of Sale) system. What is the term for this concept?

Answers

Answer:

application whitelisting

Explanation:

Application Whitelisting is a term used in computer engineering to describe a situation where a system administrator implemented a system that only allowed certain programs or applications that have been approved to run or functions exclusively on a computer or network. It is considered to be more secure.

Hence, in this case, the correct answer is called APPLICATION WHITELISTING

________ group is used to select font styles. ​

Answers

Answer:

The font group............. ...

Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
Explain how commit works in a multi-transaction / multi-system function and what would need to be in place for a rollback to be successful.
Explain how buffering of data achieves a more efficient way to do I/O. Why is it important to add buffering to I/O?
What is the difference between blocking calls and non-blocking calls? Explain 2 methods to remove blocking from your application.

Answers

Answer:

integrgrg

Explanation:

integrety or not iim not

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it.

What is the difference between blocking calls and non-blocking calls?

Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it. During the waiting period, nothing else in that process happens. In contrast, a non-blocking call uses a different method to check for completion and returns right away without any results.

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking occurs when subsequent JavaScript in the Node. js process needs to wait until a non-JavaScript activity is finished, according to the documentation for the language.

A program that is non-blocking does not prevent the execution of subsequent operations. Non-blocking techniques run in an asynchronous fashion. Asynchronously refers to the possibility that the program may not always run line by line.

To learn more about blocking and non-blocking calls refer to:

https://brainly.com/question/14286067

#SPJ2

What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu

Answers

The Innocents on Hulu i think

Answer:Raising Dion?

Explanation:

Was it Raising Dion?

Are Dogs are better than video games?

Answers

sometimes bc dogs are very lovey but video games also have there moments

Answer:

In some cases yes.

Explanation:

Some days I really enjoy my video games and other days I enjoy being with my dog but sometimes they are annoying especially if they have way more energy than you

What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of their fellow citizens?

Answers

Explanation:

There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.

Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.

Other Questions
!!HELP: 20 POINTS!!At the end of a snow storm, Jace saw there was a lot of snow on his front lawn. The temperature increased and the snow began to melt at a steady rate. The depth of snow on Jace's lawn, in inches, can be modeled by the equation S=15-1.5t,where t is the time, in hours, after the snow stopped falling. What is the y-intercept of the equation and what is its interpretation in the context of the problem? cam wants to find 509-106. which steps can he use to find the difference what are determinated in English grammer 7th grade ela help me plzzzzzzzz what caused mass extinction in the past? what is causing mass extinction today? A farmer owns a total of 12 acres of land . The land is separated into 5 2/5 equally sized sections . How many acres are in each section ? Rewrite the function f(x)=-4(x-3)^2+16 in the form f(x)=ax^2+bx+c What kind of things did Khalil like What are the four pathways in the Hospitality and Tourism career cluster?O Teaching and EducationO Luggage, Laundry, and Personal OrganizationO Recreation, Amusements, and AttractionsO Restaurant and Food/Beverage ServicesO Cleaning and SupervisionO Travel and TourismO LodgingO Farming and Food Cultivation give one way the European customs influenced the way Halloween is celebrated in the United States. GUYS Can you pls HElp me Ill GIve Brianliest to whoever has the right answer Suppose a population has a mean weight of 180 pounds and a standard deviation of 25 pounds. A sample of 100 items is drawn from this population. What is the standard error of the mean? A line passes through the point (-4,9) and has a slope of-3/2Write an equation in point-slope form for this line. describe how you would measure the diameter of a tennis ball The Earth does not belong to us: we belong to the Earth. -Marlee MartinIn your own words, what does this quote mean to you? Determine if the following argument always applies, sometimes applies, or never applies. Provide at least 2 examples in your explanation."The sum of a number and its opposite is always 1." I basically need to name and fill in the notes can someone help me please? The price of Stock A at 9 A.M. was $15.75. Since then, the price has been increasing at the rate of $0.05 per hour. At noon, the price of Stock B was $16.53. It begins to decrease at a rate of $0.13 per hour. If the stocks continue to increase and decrease at the same rates, in how many hours will the prices of the stocks be the same?The prices of the stocks will be the same nothing hour(s) after noon. What is most closely a theme of How It Feels to be Colored Me? Mexico includes states