Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
Anyone watch anime what's y'all race
Which operating system might cause the desktop background to change unexpectedly?
A.) boot failure
B.) startup loop
C.) malware
D.) incompatibility
Answer:
C.) Malware
A boot failure would not load the desktop, same with a startup loop and incompatibility.
What is data?........
[tex]\huge\bold\green{Data\ :- }[/tex]
In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.
Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))
Ex: If the input is:
5.0
6.5
3.2
Then the output is:
2.24 3.30 24.00
Answer:
6.5
24.00
it think it's my answer
. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
The root node will contain the smallest element
Which of the following does a secure website use to safeguard transmitted information
Answer:encryption
Explanation:
because you can hack encrypted things well not so easily
Encryption is a secure website used to safeguard transmitted information. The correct option is C.
What is encryption?The process of converting information into a secret code that conceals its true meaning is known as encryption.
Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.
By converting the message's content into a code, encryption serves as a confidentiality tool. Integrity and authenticity are the goals of digital signatures.
They serve to confirm the message's source and show that the content hasn't been altered.
In the process of encryption, ordinary text, such as a text message or email, is scrambled into "cypher text," which is an unintelligible format. Secure websites utilise encryption to protect sent information.
Thus, the correct option is C.
For more details regarding encryption, visit:
https://brainly.com/question/17017885
#SPJ6
Your question seems incomplete, the missing options are:
A) A lock icon
B) The http protocol
C) Encryption
D) Digital certificate
How do you create speaker note changes that show the slides, related notes and company logo on each page
Answer:
The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.
GameStop’s best Black Friday deals: games, accessories, and more
11/25/2021 7:00 PM EST
Answer:
what is the question or are you just spreading news
Explanation:
4. Let's continue with Amber. Once she began, she realized that she was short on
time so she simply skipped her opening slides. Feeling a bit frazzled, Amber began
reading from slide 7. Why do you think that this would not be Amber's best strategy?
Answer:
because she could miss important information
Answer:
I think that this would not be the best strategy as she could miss vital information in the opening which may not be a lot but packs a punch within how your presentation is gonna go so the audience can gouge you out and your style.
Explanation:
Because
evaluate the following expression using stack 14-(6-10)-10
The output of the expression using stack 14-(6-10)-10 is known to be 8.
What is a stack calculator?The Mine craft stack calculator is used for the above process. It helps to tell a person the amount of stacks of an item that a person is known to have with a specific total number of items.
Note that the The output of the expression using stack 14-(6-10)-10 is known to be 8 as it correct.
Learn more about expression from
https://brainly.com/question/723406
#SPJ2
Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)
The function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:
def first_letter(x):
if len(x) < 25:
for i in x:
return x[0].upper()
else:
return "Your text should be less than 25 characters"
print(first_letter("brainly"))
The code is written in python.
We declared a function named first_letter with the parameter x.
If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.
Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.
Finally, we call the function with a print statement.
The bolded portion of the code are python keywords.
read more: https://brainly.com/question/14603294?referrer=searchResults
Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what types of applications and tools
Answer:
Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment
Explanation:
Mackenzie just graduated with a degree in game design and has been working on designing her first video game outside of the classroom. What is one of the first questions that Mackenzie should consider while working on this game?
Question 8 options:
"How much should I sell my game for?"
"What marketing strategy will I use for my game?"
"What should my game title be?"
"What player perspective should I use?"
Answer:
what marketing strategy will I use for my game?
Q1. What is animation?
Answer:
The act of animating, or giving life or spirit.
Explanation:
HOPE IT HELPS............Technician A says stepped resistors are made from one or more wire-wound resistors.
Technician B says a common application for this type of resistor is in a blower motor speed
control circuit. Who is correct?
Select one:
O a. Technician A
O b. Technician B
O C. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
Jayda started a corporation that creates software products for clients. Which statement correctly reflects Jayda’s position in the corporation?
Answer:
She is the Founder and Owner of the corporation. She would also most likely be the CEO if she hasn't hired anyone else.
In C#
Please as soon as possible
Answer:
I'm not hundred percent sure but I believe it is going up by 100 the scale each number for the total quantity
Explanation:
Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.
The opportunities that can be gotten from the adoption of cloud computing include:
More resources will be available for data protection.More data security.More employment opportunities.The challenges that can be gotten from the adoption of cloud computing include:
Separation failure.Data transfer bottlenecks.Public management interface issues.It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.
Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.
Read related link on:
https://brainly.com/question/25532807
Software which fulfills the requirement of a particular company is known as ________ software.
Answer:
Customized software
Explanation:
Software which fulfills the requirement of a particular company is known as Customized software.
Please mark as brainliest
A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security
A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.
A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.
The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.
Read related link on:
https://brainly.com/question/25530245
When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch
Answer:
Socratic app
Explanation:
it will help you
what is the meaning of keyboard?
A panel of keys that operate a computer or typewriter.
Explanation:
keyboard is an input device that feeds the computer will data
CASE STUDY # 1
WELCOME TO MOBILE BANKING
Discussion Questions
1. Would you be comfortable using mobile banking for transferring funds, paying bills, and checking
balances? Why or why not?
2. How might mobile banking attract the attention of hackers? Are the precautions discussed in this
article enough to keep hackers at bay?
Answer:
1 would you be comfortalbe
what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS.
Answer:
ARPANET: Advanced Research Projects Agency Network
BOOTP: Bootstrap Protocol
GSM: Global System for Mobiles
GUI: graphical user interface
EOM: Enterprise Output Management
EULA: end-user license agreement
CTSS: The Compatible Time Sharing System
Explanation:
BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.
GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.
ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.
BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.
EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.
CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.
write down the color code for straight-through cabling. write your answer on the space provided
1.
2.
3.
4.
5.
6.
7.
8.
Answer:
1White/Green
2Green
3White/Orange
4Blue
5White/Blue
6Orang
7White/Brown
8Brown
Enter a formula in the selected cell to display the owner's draw percentage (cell B6).
The formula is an illustration of Excel formulas, and Excel formulas are used to operate on values in a cell or a range of cells
Formula in the selected cell to display the owner's draw percentage is =B6
How to write the formula?From the question, the owner's draw percentage is in the cell B6.
To enter the formula, we simply enter the name of the cell (i.e. B6)
So, we have:
B6
Excel formulas begin with the equal to "=" sign,
So, we have:
= B6
Hence, the formula is = B6
Read more about Excel formulas at:
brainly.com/question/17566733
Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout
Answer:
Layout and Table Design
Explanation:
Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.
Answer:
something like that
Explanation:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
In this exercise we have to use the knowledge of python to write a salary function, as follows:
the code is in the attached image.
In a more easy way we have that the code will be:
static bunch of krap main (args) {
double hours;
double salary;
double overSalary;
print("Enter hours worked: ");
scan(hours);
if (hours <= 40) {
salary = 20 * hours;
}
if (hours > 40) {
overSalary = 30 * (hours - 40);
salary = 20 * 40 + overSalary;
}
print(salary);
}
See more about python at brainly.com/question/26104476
Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.
A host refers to each of the computer system connected to a network and it include the following different systems:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesWhat is a host?
A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.
This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesRead more on computers here: https://brainly.com/question/17402566
Duolingo is a widely used foreign language app, with 300 million users in 2018. While there is a free version of the app, a premium Duolingo subscription eliminates advertisements during language practice and offers new quizzes with the ability to save lessons for offline use. a. Identify each hurdle for users of the free version of the app.
The hurdle for users of the free version of the app is the subscription fee paid for the premium version of the app.
A lot of people do not pay and cannot afford the premium fee. Some people are not very sure at the initial stage of using the app.
People sometimes want use app for free for some time.
A Subscription is simply known to be paid so as to access content from an app or service for a set out period of time. For example, subscription to Netflix on a monthly basis.
Learn more from
https://brainly.com/question/15301858