Helpppppp meeeeeeeeeeeee pleaseeeeee

Helpppppp Meeeeeeeeeeeee Pleaseeeeee

Answers

Answer 1

Answer:

B

Explanation:

PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.

Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.


Related Questions

prepare a short report of some technological devices??
please help me brainliest​

Answers

Answer:

Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.

For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.

It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.

In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.

Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.

Explanation:

You are welcome! ;D

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

In disc brakes, pads are forced against the of a brake disc​

Answers

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

Which of the following is a type of equation which returns a value such as TRUE or
FALSE?

A. Argument
B. Expression
C. Nest
D. Control

Answers

Answer:

C

Explanation:

True HOPE THIS HELPS BOY/GURL AH

The type of equation which returns a value such as TRUE or FALSE is logical.

Which formula gives the logical value in the form of true or false?

A logical value is known to be The TRUE and FALSE functions

An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.

Learn more about equation  from

https://brainly.com/question/2972832

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

What is monitor ?why it is necessary for computer system ?​

Answers

Answer:

Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.

 It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.

Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.

Answers

Answer: change the food he eats to a comfort food so that he eats more

Answer:

The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.

Explanation:

This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

Other Questions
Kathleen jarred 24 liters of jam after 4 days. How many days does Kathleen need to spend making jam if she wants to jar 36 liters of jam in all? Solve using unit rates. Which definition best defines the word bipartisan? Question 15 options: divided into two equal parts involving two political parties two people who rule a kingdom or empire two identical copies. Brahmaguptas solution to a quadratic equation of the form ax2 bx = c involved only one solution. Which solution would he have found for the equation 3x2 4x = 6? x = x = x = x =. What is the Slope of the line that passes through points (4, -2) and (3, 1)?Question 3 options:23-2-3 Help pleeeeeeaseeeeee Charlie is flying a kite one afternoon and steps on the end of the string to have hishands free to take a picture. The string is 135 feet long and forms a 68-degree anglewith the ground. How high is his kite at this time? Round to the nearest foot andenter the number only.I need the answer quick please! which describes fat?A. a lipid that stores energyB. a nucleic acid that directs cell function C. a protein that speeds up a chemical reactionD. a carbohydrate that produces energy domain. range y =2- 2 - 3 Consider two congruent square prisms each rectangular face of prism A has a width of 2x+3 and each rectangular face of prism B had a length of 4x+6 if each rectangular face of prism A has and area of 25x+25 what is the volume of prism B (round to the nearest whole number) In the context of expectancy theory, _____ is the perceived relationship between performance and rewards. Why do we say a little milk left instead of little milk left pls help with number 12 i will give brainliest The cost of producing higlighters with the company logo printed on them consists of a onetime setup fee of $160.00 plus $0.65 for each higlighter produced. This cost can be calculated using the formula C=160.00+0.65p, where p represents the number of higlighters produced and C is the cost. Use the formula to calculate the cost of producing 2400 higlighters. (Do not inlcude a comma in your answer) ___________1. Variety of species and abundance of species ___________2. Refers to the heterogeneity present in the world or a habitat, ranging from macromolecules within the cells to biomes ___________3. Plant or animal that exist in small numbers___________4. It is the loss of species___________5. Species in danger of extinction___________6. Number of different species present in an ecosystem___________7. Relative abundance of individuals of each of those species___________8. Refers to the role of that a species play in its ecosystem___________9. They serve as biological smoke alarms__________10. The worlds largest coral reef__________11. Also known as the four major causes of loss of diversity__________12. The process during which a large expanse of habitat is transformed into a number of smaller patches of smallertotal area__________13. Species that are introduced accidentally or intentionally__________14. Also called overharvesting__________15. They have broad niches A survey of a group of seventh graders and a group of teachers at a local middle school asked how many siblings they each have. The dot plots below show the results.StudentsA dot plot titled Students. A number line going from 0 to 9 labeled number of siblings. There are 2 dots above 0, 4 above 1, 7 above 2, 5 above 3, 2 above 4, and 0 above 5, 6, 7, 8, and 9.TeachersA dot plot titled Teachers. A number line going from 0 to 9 labeled Number of siblings. There is 1 dot above 0, 3 dots above 1, 2 above 2, 4 above 3, 5 above 4, 3 above 5, 1 above 6, 0 above 7, 1 above 8, and 0 above 9.Based on the shape of the two dot plots, which statements correctly compare them? Select three choices. What is one thing Daphne and Aphrodite have in common? A. Both characters hope to be more beautiful than Psyche B. Both characters fear they will be overshadowed by Psyche C. Both characters desire to use their position to empower others D. Both characters must deal with their surrounding degrading society why did the supreme court rule that police were not justified in shooting edward garner when he fled from them Hey I need someone to write an essay for me, will pay well! Solve the system you found in Part D. Did you use elimination or substitution? What was the entry fee, and how much did each ticket cost? After Gwen, Tristan, and Keith finish exercising, they go to the fair. At the fair, they each pay the entry fee and also buy tickets they can use for food or rides. Gwen pays the entry fee and buys 10 tickets. It costs her a total of $30. Tristan pays the entry fee and buys 15 tickets. It costs him a total of $40. Keith pays the entry fee and buys 10 tickets. It costs him a total of $30. In this task, you will create a system of equations and find the cost of each ticket. Let x represent the entry fee and y represent the cost of each ticket in dollars. What are two ways that industrial cities differ from preindustrial cities?.