Answer:
Explanation: The strength of cyberspace is in its numbers. The reason asking questions online works is that a lot of knowledgeable people are reading the questions. And if even a few of them offer intelligent answers, the sum total of world knowledge incre
A(n) ________ is a class that stores data and organizes it in some fashion. Group of answer choices iterator
Answer:
Container
Explanation:
In computer science, a container is a class or a data structure whose instances are collections of other objects.
PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MY QUESTION WHICH IS DUE TODAY!!!!
Directions
Read the dilemma below and then complete the Feelings & Options steps.
"Missing Out"
Text:
For months, Aida and her three closest friends had been waiting for a new movie to come out. The movie was based on one of their favorite books, and they promised they would see it all together and then go out for pizza. On the movie's opening weekend, Aida had a last-minute emergency and wasn't able to go. The others decided to go anyway because they had really been looking forward to it. That night they posted constantly about their fun and new inside jokes. Aida wanted to keep connected, but seeing the constant posts bummed her out. She felt like no one even cared that she had missed out on their plans.
Identify: Who are the different people involved in the scenario? What dilemma or challenge are they facing?
Answer:
One friend being nice and the other being rude, thats a dillema.
Explanation:
Because its logical
Discuss how you would use the Interactive method of data gathering atAIT in developing a system which could be useful to the institution.
Answer:
We're no strangers to love
You know the rules and so do I
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
We've known each other for so long
Your heart's been aching but you're too shy to say it
Inside we both know what's been going on
We know the game and we're gonna play it
And if you ask me how I'm feeling
Don't tell me you're too blind to see
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give, never gonna give
(Give you up)
(Ooh) Never gonna give, never gonna give
(Give you up)
We've known each other for so long
Your heart's been aching but you're too shy to say it
Inside we both know what's been going on
We know the game and we're gonna play it
I just wanna tell you how I'm feeling
Gotta make you understand
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
what does hide alerts mean on text messages on iphone
Answer:
it means like when tha text show up no words will show only tha message thing will it will jus say imessage
Explanation:
Answer:
Hide alerts mutes the notifications.
Explanation:
A(n) ____________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
Answer: "Scanner"
Explanation: brainliest please
how do you open a program when there are no icons on the desktop?
Answer:
Press the windows button, then search for the program you wish to open. Then just left click on the program
When you open a program, If there are no icons on the desktop we need to double click on the desktop to reveal the hidden icons.
What is a desktop?Desktop icons are mainly designed for quick access to often used programs, files, and folders.some times your desktop icons may be hidden.To view them, we need to right-click the desktop, select the View option, and then select Show desktop icons. To add icons to your desktop such as This PC, Recycle Bin, and more we need to follow the steps given below.Select the Start button->and then select Settings->Personalization->Themes->Under Themes->Related Settings, select Desktop icon settings.Choose the icons you would like to have on your desktop and then select Apply and OK.To learn more about the desktop refer to:
https://brainly.com/question/27029280
#SPJ
busco a talcotalco38
所有冰雹约翰西娜和中共。冰心寒。
乔妈妈
阿什顿有一个矮胖子
sorry but what's ur question and what r the choices
What is the approximate time and death in Sherlock Holmes
Answer: 8:58.5204 o'clock a.m
:)
Which option is an accurate description of the key characteristics of a project?
predefined goals, carried out in phases
fixed goals, limited risks
fixed goals, unlimited budget
predefined goals, access to unlimited resources
The option which is an accurate description of the key characteristics of a project is: A. predefined goals, carried out in phases.
Project management refers to a strategic process which involves the following:
Designing a project plan.Planning a project.Developing a project plan.Leading a project.The execution of a project plan.Hence, project management involves using a set of skills, tools, knowledge, techniques and experience to achieve predefined (set) goals and objectives in a project, which is typically carried out in phases.
In conclusion, the accurate description of the key characteristics of a project are:
1. It comprises predefined goals.
2. It is carried out in phases.
Read more: https://brainly.com/question/19863574
What is the correct number to dial to report an incident to the program manager via the emergency pager line
Answer:
Call 911 immediatley.
Explanation:
This is the emergency contact. It will get you in contact with police officers firefighters and medics.
Which tool should be used to locate and remove private metadata?
LightZone Inc., a manufacturer of LED lamps, uses a software to create programmed instructions for its automated equipment to ensure that its products are made as efficiently as possible. In this scenario, LightZone most likely uses _____ to program the automated equipment.
Computer aided manufacturing (CAM) is commonly known as a software tool/program. In the scenario stated, LightZone most likely uses computer-aided manufacturing software to program the automated equipment.
Computer aided manufacturing (CAM) software is simply known a s a computer program that makes use of numerical control (NC) so as to make a well thorough instructions which are called the G-code.This codes are known to drive CNC machines. CAM software often narrow the machining process and automates actions such as drilling and cutting. It therefore create high-quality manufacturing.
Learn more from
https://brainly.com/question/13918120
Which of the following groups is NOT located on the Home tab?
A.Paragraph
B.Animations
C.Slides
D.Drawing
Answer: B. Animations is not found on the Home tab.
Please explain what steps you will take to prevent hackers from getting access to your personal information.
I need the sentences longer
can you do a longer a paragraph
I will get the Brainly Pts
Answer:
I would do these steps
Explanation:
I would make sure i have strong passwords on every account i have, then i would setup 2FA (Two Factor Authentication) it would make it to where i have tp confirm any logins which will protect my information. Then i would get a VPN (Virtual Private Network) which encrypts everything i do and protects my location.
Your welcome and have a good day <3
Insert a built in bibliography without a preformatted heading
Answer:
Switch over the “References” tab, and click the “Bibliography” button. You can select from a few pre-formatted bibliography styles with headers, or you can click the “Insert Bibliography” option to add one without any header or extra formatting
Explanation:
The steps to Insert a built-in bibliography without a preformatted heading
is given below,
What is a bibliography?A bibliography is a list of sources that have been cited or referenced in a research paper, article, book, or other written work.
The purpose of a bibliography is to give credit to the authors of the sources that were used in the work and to allow readers to find and verify the information that was cited.
We have,
Here is an example of how to insert a built-in bibliography without a preformatted heading.
step 1.
In your document, place the cursor where you want to insert the bibliography.
Step 2.
Click on the "References" tab in the ribbon at the top of the screen.
Step 3.
Click on the "Insert Citation" button in the "Citations & Bibliography" group.
Step 4.
Select the source type from the drop-down menu
(e.g. book, journal article, website).
Step 5.
Fill in the fields for the source information
(e.g. author, title, publication date).
Step 6.
Click "OK" to insert the citation into your document.
Step 7.
Repeat steps(3 - 6) for each additional source you want to cite.
Step 8
When you have finished inserting all of your citations, place the cursor where you want the bibliography to appear.
Step 10.
Click on the "Bibliography" button in the "Citations & Bibliography" group.
Step 11.
Select the bibliography style you want to use
(e.g. MLA, APA, Chicago).
Step 12,
Your bibliography will be inserted into the document at the cursor location, without a preformatted heading.
Thus,
The steps are given above.
Learn more about the bibliography here:
https://brainly.com/question/28145501
$SPJ5
________ monetizes the value of the data stored by search engines. Group of answer choices TCP/IP RSS WiMax IoT Search engine marketing
Answer:
SEM - Search Engine Marketing
Explanation:
The term that monetizes the value of the data stored by search engines is called; Search Engine Marketing
What is Search Engine Marketing?
Search engine marketing is a rapid growing segment of the Internet marketing.
SEM consists in bidding on keywords within a search engine (like Go ogle, Bing, Yahoo), such that when a user enters those keywords, the ads is displayed on top of the search engine results, and hopefully before your competitors for those same words.
Read more about Search Engine Marketing at; https://brainly.com/question/12469676
#SPJ9
is it bad to leave your laptop plugged in all the time
Answer:
no, its not bad. the only way its bad is if your computer has something wrong with it.
Explanation:
When a user connects to a Windows system remotely, the user has complete access to the system virtually.
Answer:
True
Explanation:
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called
Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Source documents are
Answer:
This is the location where a document or a portion of another document was retrieved. reference: computerhope.com
A program unit is said to contain ____ when it includes references to database objects that in turn references other database objects.
When a program unit include references to database objects that serves as references other database objects, the program unit is considered to contain: indirect dependencies.
A program unit can be defined as a computer subprogram with executable algorithms and packages that references a larger (main) computer program.
This ultimately implies that, a program unit is a constituent part or subunit of a larger (main) computer program.
In database management system (DBMS), there exist some form of relationship between a database object with respect to other database objects such as:
Direct dependencies.Remote dependencies.User dependencies.Indirect dependencies.For indirect dependencies, the program unit references database objects that in turn serves as references other database objects.
Read more: https://brainly.com/question/19089364
Binary Number Inquiry
Term Description
1. Bit
2. Byte
3. Kilobyte
4. Megabyte
5. Gigabyte
6. Terabyte
7. Petabyte
8. Exabyte
Answer:
Byte should be the correct answer.
Question 1 options: Each character in a string has a(n) _______________ which specifies its position in the string.
Answer:
Question 1 options: Each character in a string has a(n) index which specifies its position in the string.
how to know if someone blocked you on imessage without texting them
There isn't a way to know this that I know of, but you can go to apple support, or a tech website. Contacting your cellular provider can also provide insight into the problem.
Why is the GDD useful for game artists?
a.
because it contains specific directions for exactly what the artist must
create and exactly how to go about creating it
B. because it allows artists to see the big picture into which their individual
pieces of artwork will fit, which usually results in more unified artistic content for the game
c. because it lists the different subtasks of a game development project for
artists, along with their estimated time and progression
D. because it provides artists with the underlying structure of a game level
or mission in terms of layout, presentation of obstacles and options for
movement
pls answer fast
Answer:
i think ur answer would be either D, or B
Explanation:
Answer for 3.4.8 rectangle code HS
The code segment is meant to print the area and the perimeter of a rectangle
The main programThe rectangle program written in Python, where comments are used to explain each line is as follows:
#This gets input for the length
length = floaf(input("Length: "))
#This gets input for the width
width = floaf(input("Width: "))
#This calculates the area of the rectangle
area = length*width
#This calculates the perimeter of the rectangle
perimeter = 2*(length+width)
#This prints the area of the rectangle
print(area)
#This prints the perimeter of the rectangle
print(perimeter)
Read more about Python programs at:
https://brainly.com/question/21774450
1. How many 5mb pictures can be stored in a 300 mb micro sd card?
2. How many 1000 mb videos can be stored in a memory card with 4gb capacity?
Help
#1
Total pics:-
[tex]\\ \sf\longmapsto \dfrac{300}{5}=60pictures[/tex]
#2
1GB=1025MB4GB=4100MBTotal videos
[tex]\\ \sf\longmapsto \dfrac{4100}{1000}\approx 4[/tex]
1. How many 5mb pictures can be stored in a 300 mb micro sd card?
60 Pictures2. How many 1000 mb videos can be stored in a memory card with 4gb capacity?
4100/1000 ≈ 4How many items are returned from calcAverage()?
public static int calc Average(int a, int b, int c){. . .}
a. 0
b. 1
c. 2
d. 3
The function named calcAverage takes in three integer parameters and finds their mean value of the three integers which is a single value. Hence, the number of items returned is 1.
The number of values performed when we obtain the mean or average value of a set of values is a single vlaue which represents the measure of spread of the data.
Therefore, the number of items returned from calcAverage() is 1.
Learn more :https://brainly.com/question/13171394
what are the three main desktop operating systems used today
Answer:The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux.
Explanation:
A crosstab query calculates aggregate functions in which field values are grouped by _____ field(s).
Answer:
2
Explanation:jjjj