Helpppp adapppppopppppp
Explanation:
(A) trust me I'm computer hecker experts
What is the advantage of learning through story compared to learning through personal experience?
A.
stories are “more real” than personal experience
B.
stories are easier to remember than personal experiences
C.
stories have no rules to follow
D.
you can learn from countless other lifetimes through stories
This is game design
Answer:
I think the answer would be D
Explanation:
it just seems to make the most sense
Answer:
Is D
Explanation:
Stories open doors which ususally take time to open and to explore in real life, the same thing happens when you use a book to do your homework. You use the book to get information which you don't know. The same is with reading stories, stories can be helpful since they can talk about a characters life mistakes, and experiences that the character has gone throught their life, which usually might be helpful on real life.
translate ¨friends¨ into spanish
Answer: I hope this is helpful
Explanation:
Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun
Friends- trusted and caring person
_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.
WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.Wi-Fi is the mostly used type of medium-range wireless communication system.
Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.
Learn more from
https://brainly.com/question/20812811
How is the central message of being true to oneself conveyed in the story?
The central message of being true to oneself is illustrated in the story as the character allowed his uniqueness to shine through.
You did not provide the story. Therefore, an overview of the central idea will be given. The central message of a story is the main idea that the author wants the readers to know.
The central message is also referred to as the theme. Since the central message is about being true to oneself, the character will respect the opinions of others but won't conform to stereotypes. Such a person allows their uniqueness to shine through.
Read related link on:
https://brainly.com/question/25582903
GUI STANDS FOR__________________
Explanation:
A graphizaluser interface (GUI) is a type of user interface through which users interact with electronic devices via visual indicator representations.
to determine the highest number in a range of numbers, click insert function box in the formula bar to display the insert function dialog box, then select ____.
Functions in Excel are used to perform several arithmetic and logical operations.
The text that completes the statement is MAX
From the question, we understand that you want to determine the highest number in a given range of numbers.
This is done using the MAX function.
i.e. after the insert function box has been selected, the formula to use is the MAX function.
Hence, the complete statement is:
Click insert function box in the formula bar to display the insert function dialog box, then select MAX.
Read more about Excel functions and formulas at:
https://brainly.com/question/20497277
The secondary storage device that is LEAST portable is a
A. DVD
B. Flash drive
C. Floppy disk
D. Hard disk
Answer:
B. flash drive
Explanation:
because it is portable
is invalid in the select list because it is not contained in either an aggregate function or the group by clause.
Answer:
Column
Explanation:
We _____ information about space. For example, while reading a textbook, we encode the place on a page where certain material appears.
Answer:
Extremes is the answer for the blank.
Explanation:
How to edit an existing recipient list? class 9 for(3 marks)
Answer:
(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List
Last updated Monday, Aug. 31, 2020, at 10:35 a.m.
This article is based on legacy software.
For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.
You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.
Creating a New Data Source
Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.
Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like
It uses network usage monitoring software to know the level of traffic on that local network.
We can arrive at this answer because:
Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.
More information:
https://brainly.com/question/8118353
This question is worth 15points
Why do you think that computer programs use different data types? Wouldn't it be simpler if they treated all data the same? Why or why not?
What would happen if, for instance, a date were treated like an integer? Please answer all of the questions.
Answer:
The data type defines wich operations can safely be performed to create, transform and use the variable in another computation.
Computer programs use different data types for efficiency, precision, etc.
Treating all data the same would lead to confusion, inefficiency, and errors.
Treating a date like an integer would result in a loss of semantics, limited operations, etc.
We have,
Computer programs use different data types for a variety of reasons:
- Efficiency:
Different data types allow programs to allocate memory and perform operations more efficiently.
- Precision:
Different data types have different levels of precision. For example, using floating-point numbers allows for decimal values but might introduce rounding errors, while integers are exact but can't represent fractions.
- Semantics:
Different data types convey meaning and help programmers and the compiler understand how the data should be used.
- Operations:
Different data types support different operations. For instance, you can't perform arithmetic operations on text strings as easily as you can on numbers.
- Type Safety:
Using distinct data types helps catch errors early in the development process. If you accidentally treat a string as an integer or vice versa, type systems can catch such errors during compilation.
If a date were treated like an integer:
- Loss of Semantics:
Treating a date as an integer would strip away its meaning. Dates have attributes like day, month, and year, which would be lost if they were treated as integers.
- Limited Operations:
Integers can't directly perform operations related to date manipulation, such as finding the difference between two dates or determining the day of the week for a given date.
- Error-Prone:
Treating dates as integers would likely lead to confusion and errors. It would be easy to make mistakes when handling date-related calculations and comparisons.
- Lack of Flexibility:
Dates have a complex structure, including leap years, varying month lengths, and time zones. Treating them as integers wouldn't allow for representing these complexities.
Thus,
Computer programs use different data types for efficiency, precision, etc.
Treating all data the same would lead to confusion, inefficiency, and errors.
Treating a date like an integer would result in a loss of semantics, limited operations, etc.
Learn more about computer programs here:
https://brainly.com/question/33841076
#SPJ3
Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.
Answer:
It should have high color contrast.
Translate "God" Into Italian
Answer:
Dio is god in Italian
Explanation:
hope it helps
Answer:
Dio = God in Italian
: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
Answer:
Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.
The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.
Answer:
The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.
The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files.
Data is known to have cache. The data cache is where the data read from the database data files are stored after the data have been read or before the data are written to the database data files.
Cached data are simply called too be the information that is saved on one's computer or mobile devices after a person have visited or accessed a website.
A lot of Developers often make use of cached data to boast their online experience. A considerable number of consumers often want a website to load within two and three seconds.
Learn more from
https://brainly.com/question/23708299
If you are going to build a custom fast PC for gaming and you need a lot of storage for big video files and videos, but you have a low budget, what storage device(s) option you are going to consider? Why?
Answer:
Cheap and efficient PC's for two drives
Explanation:
Buying a expensive PC usually runs slower
How were these isometric letters created?
Answer:
Using the 3D Extrude & Bevel effect.
Explanation:
I just took the test, I got a 100.
Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope of a
software development project help a company?
A It helps communicate effectively with the client
B. It helps deliver a project as per the client's requirements.
C It helps prepare a legal agreement
D. It helps decide the project budget
Answer:
im pretty sure its A
Explanation:
it makes more sense
Answer:
It helps deliver a project as per the client’s requirements.
Trust me... I took the test
why are extensions necessary in scratch programming as a whole?
which tool is used to create a selection by drawing it free hand? (ellipse/rectangle/free select/All)
Answer:
The lasso toolBy clicking down and dragging, the lasso tool allows you by freehand to draw the selection line. Many programs offer different types of lasso tools that can be used to make selections. The polygon lasso tool allows you to create a selection by clicking on individual points that connect to create a selection line.
The command used to save a file for the first time and or to save a file with a new file name, location and formatT
cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy
An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False
Answer:
the correct answer is true
You are running the Chrome Web browser and try to open a Web site when you are prompted for login credentials. What TCP/IP model layer is at work that requires you to logon to the Web site
Considering the situation described above, the TCP/IP model layer that is at work that requires you to log on to the Web site is known as the "Application layer."
The application layer, otherwise known as the abstraction layer, is defined in the Internet Protocol Suite (TCP/IP) and the OSI model.
Also, the application layer determines the shared communications procedures and interface modes utilized by the hosts in a communications network.
Some of the common examples of application layer include the following:
Hypertext Transfer Protocol (HTTP),File Transfer Protocol (FTP),Domain Name System (DNS), etc.Hence, in this case, it is concluded that the correct answer is "Application layer."
Learn more here: https://brainly.com/question/25278036
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called.
Python first compiles your source code (. py file) into a format known as byte code . Compilation is simply a translation step and byte code is a lower level and platform-independent representation of your source code
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.
The line of code returns the ASCII code.
ASCII, has the full form American Standard Code for Information Interchange. It consists of a 7-bit code in which every single bit represents a unique alphabet.
Python is a high-level computer programming language. It is dynamically used.
First, it does a compilation for a file with the extension `.pyc`
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.
Learn more about Python code here:
https://brainly.com/question/34746850.
#SPJ3
Discuss the importance of an operating system as it relates to computer hardware and software. Provide at least one example of a service that operating systems provide.
Answer:
An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.
Examples:
1. User Interface.
2. Program Execution.
3. File system manipulation.
4. Input / Output Operations.
5. Communication.
6. Resource Allocation.
7. Error Detection.
8. Accounting.
The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.
Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.
Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.
The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.
Read more: https://brainly.com/question/21694571
una laptop agarra mas internet que una computadora de escritorio?
una laptop agarra mas internet que una computadora de escritorio?
Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.^^