How do i get in if i just turned thirteen and i already picked under thirteen on the log in page?
Answer:
Generally, there is an option under your account settings in which you can change the age that you are. Since you turned 13 for example but you put your age as under 13 in the log in details, just access your account settings and change to 13 or above. Also, it is best to have a trusted adult such as a parent moniter you when you make changes to your personal imformation on an account.
________ is interpreted. Group of answer choices A. Python B. C C. C D. Ada E. Pascal
The interpreted are;
A. JavaB. C++D. C#What is interpreted programming language?An interpreted language is known to be a kind of language where its implementations often carry out or execute instructions directly.
The C++ is known to be a kind of cross-platform language that is often used to make any high-performance app.
Java is known to be High-level programming language that is said to be class-based and also an object-oriented programming language.
Note that The interpreted are;
A. JavaB. C++D. C#Learn more about Java from
https://brainly.com/question/25458754
#SPJ11
An algorithm to find the perimeter of a triangle
Answer:
step 1- start
step 2- Input a,b,c
step 3 - perimeter = a+b+c
step 4 - Print the perimeter
step 5 - End
The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously
Answer:
Adaptability
Explanation:
The agent is adaptable, versatile, and capable of establishing its own goals based on its implicit purpose. The range of quality measures for each of the aforementioned qualities, suited to the agent type, will then define software agent quality, and the value of a multi-agent system will be a function of the quality of each of the agents participating in the system.
This characteristic is characterized by the agent's capacity to alter its state in order to adapt to the environment, the ability to evolve and adapt its functionality to the surroundings at runtime, and the ability to appropriately interact with exceptions produced by the environment in order to rate the agent's ability to adjust and survive.
The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.
What is Adaptability characteristics?Adaptable attribute is when people have a kind of elastic-like energy and they are said to be willing to bend and break any given habits, to push themselves when circumstances is altered.
Therefore, The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.
Learn more about Adaptability characteristic from
https://brainly.com/question/25594630
#SPJ12
The _____ is the part of a computer that executes the instructions of a computer program.
Answer:
Central processing unit (CPU)
Hope you have a great day :)
Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the process?
In the case above, what just comes to mind as part of the process is option d.
What is sniffer?A sniffer is known to be a kind of a software or hardware tool that gives room for a person to be able to “sniff” or look through one's internet traffic in real time, getting all the data flowing to and from a person's computer.
Therefore, In the case above, what just comes to mind as part of the process is option d.
Learn more about sniffer from
https://brainly.com/question/14265770
#SPJ1
When there are conflicting gpos, what's the order in which they're evaluated and applied?
When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.
What is the conflict about?Note that when trying to know which policy settings to apply, the local policy of the machine is said to be examined, followed by site policies, then domain policies, and lastly the policies on all the OUs that has all the object being processed.
Therefore, When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.
Learn more about conflicting from
https://brainly.com/question/24769299
#SPJ12
Which type of URL gives an abbreviated path to a resource using the current page as a starting position?
A relative URL is a type of URL that gives an abbreviated path to a resource by using the current webpage as a starting position.
What is a relative URL?A relative URL can be defined as a type of URL that doesn't contain or use the full address of a website, but only the path (location) following the domain name.
This ultimately implies that, a relative URL is a type of URL that gives an abbreviated path (location) to a web resource by using the current webpage as a starting position.
Read more on relative URL here: https://brainly.com/question/26670945
#SPJ12
Where would you add a new tag on an invoice that was already created?
To add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.
What is an invoice?It should be noted that an invoice is a stamped document that itemizes and records a transaction.
In this case, to add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.
Learn more about invoice on:
brainly.com/question/4056820
#SPJ12
when was technology created?
who start it?
and finally how it started?
free coins
just answer
Answer:
two million years ago
Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.
There are 4 servers in the checkout area. The interarrival time of customers is 2 minutes (convert to rate/hr). The processing time of a server is 5 minutes/customer (convert to rate/hr). What is the overall utilization of the total server capacity
Answer:
Explanation:
bwfwgxqsvga
Danielle has been asked to configure virtualization at her company. She recommends that her manager buy multicore processors. What justification should she give as to why virtualization workstations require as many CPU cores as possible
The justification should she give as to why virtualization workstations require as many CPU cores as possible are the Each virtual machine makes use of actual CPU resources for processing instructions and data (pg227, 228).
What justification need to she deliver as to why virtualization workstations require as many CPU cores as possible?Because every visitor's working device runs in its personal space, a couple of cores are required to shop the collective data.
Footprint discount is the primary goal, go together with a bigger wide variety of cores over quicker clock speeds. However, if workload overall performance is a larger concern, quicker clock speeds and less cores would possibly make greater sense.
Read more about the virtualization :
https://brainly.com/question/25110079
#SPJ1
The online promotional method that involves applying specific Web design and development techniques to Web pages to increase the possibility that the pages will appear near the top of a search results list is called ____.
Answer:
Search Engine Optimization (SEO)
Explanation:
SEO, or search engine optimization, is a critical online marketing approach that entails getting your website and business accessible in search engines. Ultimately, SEO is a catch-all phrase for any approach used to boost your website's ranking in search results for keywords related to your business.
Identifying what consumers look for online, the phrases or terminology they use, and the sorts of material they want to consume are key components of any search engine optimization plan. When done effectively, SEO helps marketers to reach and engage with individuals who are looking for the products and services that their company provides.
Assume that desktops and laptops are alternatives goods that can be produced by computer manufacturers. A rise in the price of laptops will
A rise in the price of laptops, the price for the substitute goods or substitute good which is desktops will also increase.
What is the price about?Note that an increase in the supply of laptops will still lead to the supply curve of laptops to shift towards the right.
Since laptops and desktop computers are alternatives to each other, the decrease in the price of laptops makes them also increase in price.
Therefore, A rise in the price of laptops, the price for the substitute goods or substitute good which is desktops will also increase.
Learn more about alternatives goods from
https://brainly.com/question/25815053
#SPJ12
Which transform function would you use to operate the filename values into two separate columns, one for the filename and the other for the file extension? e. G. , xml
The transform function that a person can use to operate the filename values is Split Column - Split at Right-most delimiter
What is Split a column by delimiter?A person can split or divide a column that has a text data type into multiple columns via the use of a common delimiter character.
An example is: A Name column that has some values written that is <LastName>, <FirstName> This is one that can be divided into two columns via the use of the comma (,) character.
Therefore, The transform function that a person can use to operate the filename values is Split Column - Split at Right-most delimiter which is option d.
See options below
A. Extract - Text before delimiter
B. Split Column - Split at Each occurrence of the delimiter
C. Extract - Text after delimiter
D. Split Column - Split at Right-most delimiter
Learn more about transform function from
https://brainly.com/question/1548871
#SPJ12
I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
Answer:
yes but it's barely safe
2. Which domain represents the greatest risk and uncertainty to an organization?
Answer:
The User Domain
Explanation:
Since human behavior is unpredictable and impacted by forces outside of policy's control, the User Domain carries the most risk and uncertainty. The User Domain is a significant vulnerability in the IT architecture. Any end-user who accesses information at the organization falls within this domain. Employees who neglect to secure their laptops before leaving their offices, for example, or employees who leave critical corporate information on their desks. Such risks have the ability to ruin a company by falling for a social engineering technique can result in the introduction of viruses into the business network. It could result in the encryption of important files required for day-to-day processes. The only option in the lack of comprehensive backups of these documents would be to pay the blackmail. If the hackers unencrypt the data as they promise after the ransom is paid, this might result in days of lost work.
The domain that represents the greatest risk and uncertainty to an organization is known as the user domain.
What is a user domain?It should be noted that a user domain simply means a vital vulnerability in the IT architecture.
Here, the domain that represents the greatest risk and uncertainty to an organization is known as the use domain.
Here, the username as password are stored on a domain controller.
Learn more about domain on:
brainly.com/question/26098895
#SPJ12
The sorted values array contains the sixteen integers 1, 2, 3, 13, 13, 20, 24, 25, 30, 32, 40, 45, 50, 52, 57, 60. How many recursive calls are made by our binarySearch method given an initial invocation of binarySearch(45, 0, 15)
The number of recursive calls that have to be done using the binary search is 4.
How to do the recursive callsbinarySearch = (45, 0, 15)
start + end / 2 = value
mid = 0 + 15/2 = 7.5
The 7th element = 30
30 is less than 45
8 + 15/3
= 23/2 = 11.5
The 12th element = 52
52 is greater than 45
8 + 11/2
= 19/2 = 9.5
The value of 9 = 40 and 40 is less than 45
10+ 11/2 = 10.5
The tenth value is 45 hence the iteration to be done is 4.
Read more on binary here:
https://brainly.com/question/21475482
#SPJ1
What options are available for storing backups, physically?
The options are available for storing backups, physically are:
In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any remote system that is off-site. What is a backup?This is known to be a device that helps to save information or data temporarily or permanently.
Note that in the above, The options are available for storing backups, physically are:
In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any remote system that is off-site.Learn more about backups from
https://brainly.com/question/17355457
#SPJ12
_____ is not considered a challenge when designing applications for multicore systems. A) Deciding which activities can be run in parallel B) Ensuring there is a sufficient number of cores C) Determining if data can be separated so that it is accessed on separate cores D) Identifying data dependencies between tasks.
Answer:
B) Ensuring there is a sufficient number of cores.
30 POINTS FOR THE CORRECT ANSWERS
Thinking globally has become a big part of visual communications especially with online communication. Images, words, and designs can instantly travel the world.
Questions to Consider and Answer:
How does a designer decide what images, colors, and styles will appeal to a global audience?
Is it possible to design something that appeals to everyone?
What are the biggest potential problems with global design?
Are there legal implications to consider?
What is the best way to understand another culture?
Put yourself in the shoes of a designer who has been asked to create an ad campaign for a global athletic footwear company. Give a brief description of how you would plan to do research on different cultures and what potential obstacles and opportunities you might have. Sketch an ad that could appear on a website anywhere in the world. It must communicate simply and not be offensive to any culture or group of people. Post your sketch with your answers to the questions above.
A designer decide what will appeal to a global audience by:
Keep Design in a little way. Look out for the Layout used.Do make use of Safe Colors. Is it possible to design something that appeals to everyone?It may not be possible as people's taste differs but one can design a product or solution that may appeal to the majority of people.
The biggest problem in design the design's lack of diversity.
There are legal implications to consider such as been unique and not coping people's design.
Therefore, A designer decide what will appeal to a global audience by:
Keep Design in a little way. Look out for the Layout used.Do make use of Safe Colors.Learn more about global audience from
https://brainly.com/question/19569309
#SPJ1
a help desk structured into levels or tiers of support uses a ____ support model.
A help desk that is structured into levels or tiers of support uses a multilevel support model.
What is a multilevel support model?A multilevel support model can be defined as a type of model that is structured into two or more (multiple) levels or tiers, for the purpose of efficiency and control.
This ultimately implies that, a help desk that is structured into levels or tiers of support uses a multilevel support model.
Read more on multilevel support model here: https://brainly.com/question/15172615
#SPJ11
a web browser is an example of which type of network component?
A web browser is an example of Network Client type of network component.
What is a Network Client?This is known to be a software that runs usually on a client computer and it is one that gives room for it to set up connectivity with services that are known to be running on server computers.
Note that A web browser is an example of Network Client type of network component as that is what it is..
Learn more about web browser from
https://brainly.com/question/22650550
#SPJ11
A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.
Answer:
GigaPOP
Explanation:
A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.
Alex wrote a science fiction story about half-living, half-robot creatures in
another galaxy. He wanted to copyright the creature idea for later sequels but
was denied. What element was missing?
O A. Creativity
OB. Fixed form
O C. Interest
OD. Originality
Answer:
im not sure about this one but im pretty sure its d since this is not a original idea at all their are like tons of cyborn alien thing on their and this would not be original
Hope This Helps!!!
the ________ directive causes the contents of another file to be inserted into a program.
The #include directive causes the contents and resources of another file to be inserted into a software program.
What is a file?A file can be defined as a computer resource that avails an end user the ability to store, save, or record data as a single unit on a computer storage device.
In Computer programming, the #include directive is a command which causes the contents and resources of another file to be inserted into a software program.
Read more on files here: https://brainly.com/question/6963153
#SPJ12
In order for a computer to perform a set of instructions
write the definition of a method reverse, whose parameter is an array of ints. the method reverses the elements of the array. the method does not return a value.
The reverse() method reverses the order of the elements in an array.
What is a reverse method?The reverse() method reverses the order of the elements in an array.
The reverse() method overwrites the original array.
What the reverse method does in array is to change the order of the items in array in a descending order.
For example
var fruits = ["Banana", "Orange", "Apple", "Mango"];
fruits.reverse();
The fruits.reverse(); will return [Mango, Apple, Orange, Banana}
Notice it has been reversed.
The code it written in Javascript.
learn more on reverse method here: brainly.com/question/14500181
#SPJ2
you're using a linux distribution that uses rpm for package management. which command would you use to install httpd, the apache http server package, and all its dependencies?
The command that a person would use to install httpd is known to be yum install httpd.
What is the command about?Note that in any Linux distribution that often employs the use of RPM for package management, the act of inputting yum install httpd at the command line will hep a person to be able to install the Apache HTTP Server package and any of its dependencies.
Note that YUM automatically find and downloads RPM packages and as such The command that a person would use to install httpd is known to be yum install httpd.
Learn more about linux distribution from
https://brainly.com/question/13139061
#SPJ11
what does a dns server do
A DNS server is a type of server that translate requests for domain names into IP addresses.
What is a DNS server?A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.
This ultimately implies that, a DNS server is a type of server that translate requests for domain names into IP addresses.
Read more on a website here: https://brainly.com/question/26324021
#SPJ12