Answer:
ex. telling your children if you clean up you get new toys
full meaning of ENDVAC
Answer:
EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.
Explanation:
Here is the full meaning
Which statement is true for slide or positive film?
A.
Slides or positive films give low color saturation and contrast.
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
C.
Slide or positive films cannot be used to digitize and scan pictures.
D.
Slide or positive films are useful for cheaper compact cameras.
Answer:
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
Explanation:
The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide or positive film.
Answer:
B
Explanation:
Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed
Answer:
index.html:
<!DOCTYPE html>
<html>
<head>
<title>Brainly</title>
<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body>
<table id="myTable">
<caption>Duty Roster for last two days</caption>
<tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>
<tr><td>Monday</td><td colspan="2">John</td></tr>
<tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>
<tr><td>Wednesday</td><td>simon</td></tr>
</table>
</body>
</html>
style.css:
#myTable {
background-color: Cyan;
border-collapse: collapse;
height: 200px;
width: 500px;
font-size: 20px;
}
#myTable td,th {
border: 2px black solid;
text-align: center;
}
#myTable td:first-child, th {
background-color: lightgray;
font-weight: bold;
}
One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54
Answer:
D.191.23.21.54
Explanation:
Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address
(Please heart the answer if you find it helpful, it's a motivation for me to help more people)
What are the inputs and outputs of the app "Spotify"?
Hey the I/O for Spotify would be. for I or input keyboard and mouse.
and for O or output the sound files being sent from the server to the pc
Hope this helps.
-Toby aka scav
Answer:
Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.
Explanation:
In MS Excel, a function is written as =FUNCTION_NAME(_____________________).
Explanation:
A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.
Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?
Answer:
I really don't think that it is fair or ethical.
Explanation:
When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.
why is it important to give files name that are descriptive of their content
Answer:
Provide a descriptive document file name and title
A unique, descriptive file name helps individuals understand the general topic of a document. Include similar information when writing the title of the document, and apply appropriate punctuation, e.g., no underscores.
Explanation:
Please give thanks to all my answers and please mark as brilliant and please follow me
list out various computer generation long with their basic characteristic
Answer:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – MicroprocessorsExplanation:
there are 4 generations ok
please mark me as brainlist
Explain different types of networking-based attacks
Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.
>>> permutations([1, 2])
[[1, 2], [2, 1]]
>>> permutations([1, 2, 3])
[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]
>>> permutations([1, 2, 3, 4])
[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],
[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],
[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],
[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],
[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],
[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]
Answer:
def permutations(myList: list)-> list:
if len(myList) <= 1:
return [myList]
perm = []
for i in range(len(myList)):
item = myList[i]
seglists = myList[:i] + myList[i+1:]
for num in permutations(seglists):
perm.append([item] + num)
return perm
data = [1,2,3]
result = permutations(data)
print(result)
Explanation:
The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.
The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.
when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped
Answer:
B
Explanation:
You wore more a thu friends
What are examples of object types that can be viewed in the Navigation pane? Check all that :
commands
forms
options
queries
tasks
tables
Answer:
2.) Forms
4.) Queries
6.) Tables
Explanation:
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:
Answer:
INSERT INTO Movie(Title,Rating,ReleaseDate)
VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),
("The Godfaher",'R',DATE '1972-03-24'),
("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');
Explanation:
The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.
name 20 input device
Answer:
I wish that is helpful
.........
Answer:
Some Input devices are;
KeyboardMouseLight penMicrophoneDocument scannerCharacter readerBar-Code readerTrack pointTouch padTrack ballDigital cameraMagnetic Ink Character readerMagnetic stripTouch screenA company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design
Answer:
C. object-oriented design
Explanation:
Answer:
c. object- oriented design.
Explanation:
i took the test.
Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.
You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?
Answer:
The responses to this question can be defined as follows:
Explanation:
Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.
____________ reference is used when you want to use the same calculation across multiple rows or columns.
Answer:
relative cell
Explanation:
So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3
Answer:
Relative
Explanation:
Relative reference is used when you want to use the same calculation across multiple rows or columns.
Convert (24) 10 to binary
Answer:
Decimal 24 to Binary Conversion
The base-10 value of 24 10 is equal to base-2 value of 110002.
I hope it's helpful!
Answer:
The binary of 24 is 11000
what is the file extension if the file editing
Explanation:
"A file extension (or simply "extension") is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename "myreport. txt," the . TXT is the file extension.Sometimes long file extensions are used to more clearly identify the file type."
What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.
Answer: A
Explanation:
Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.
Answer:
Ask permission before posting private information.
Explanation:
Just the most logical answer
Advantages of special purpose computer
Answer:
The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..
Explanation:
algorithm and flowchart of detect whether entered number is positive, negative or zero
What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.
Answer:
a warning notice will alert the users that the presentation is in use
Explanation:
I did it on edge
Answer:
D; A warning notice will alert the users that the presentation is in use.
Explanation:
Edge
It is important to create a strong password because it will
let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus
1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?
The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.
Some characteristics of OS are provided below:
Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.
Type of OS:
Distributed OS.Time-sharing OS.Batch OS.
Learn more about the operating system here:
https://brainly.com/question/2126669
Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: handy man, restart, shut down, call, and thank you.
Answer:
You should restart your computer
Answer:
You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!
Explanation:
I think these answers make since.
Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121
Answer:
pakistan
india
usa
china
uk
afghanistan
iran
iraq
israel
1
When collection of various computers
look like a single coherent system to its
client, then it is called
Answer:
The appropriate answer is "Distributed system".
Explanation:
Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
Answer:
it is
Explanation:
400 dollars for 10 systems and 200 dollars for 5 systems
explanation
first
find the price of 1 system or computer which is done by dividing 1000 by 25
25)1000(40
100
____
00
00
__
0
then multiple it by 10 =40 ×10=$400
Answer:
400!!
Explanation: