Answer:
Reorder terms.
y=52x−1
Cancel the common factor of 22.Factor 22 out of −2-2.
y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))
Cancel the common factor.
y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)
Rewrite the expression.
y−4=5x2+5⋅−1y-4=5x2+5⋅-1
Multiply 55 by −1-1.
y−4=5x2−5
How did Avery and Garth most likely create their
diagrams?
O Avery used SmartArt and added a shape, whereas
Garth used four shapes.
O Avery used four shapes, whereas Garth used
SmartArt and added a shape.
O Both Avery and Garth used SmartArt and added a
shape.
O Both Avery and Garth used four shapes.
Help!!!
Please help me with my question
Answer:
1. Template
2. Name of the website
3. Signature of the instructor
You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want to make the most use of technology and keep your business alive.How would you go about it even when none of your employees come to office.Give me an idea how you are still running your business?
Answer:
You can use social media to advertise your product or service you don’t need to work to pay your employees insted create content as a way to help your business grow/expand.
Explanation:
Social media is a big platform and you can eventually find new potential clients and you can benefit yourself instead of paying someone
What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1
The right answer is option 4: 2
Explanation:
Lists are used in Python to store elements of same or different data types.
Different functions are used in Python on List. One of them is count.
Count is used to count how many times a specific value occurs in a list.
The syntax for count is:
listname.count(value)
In the given code,
The output will be 2
Hence,
The right answer is option 4: 2
the first day anna read a quarter of the book. on the second day she read a third of the remainder. noticed that after two days he had 80 pages left unread. how many pages did the book have?
Answer:
160 pages
Explanation:
[tex]Day\ 1 = \frac{1}{4}[/tex]
[tex]Day\ 2 = \frac{1}{3}Remainder[/tex]
[tex]Left = 80[/tex]
Required
The number of pages
Let the number of pages be x.
So, on day 1; we have:
[tex]Day\ 1 = \frac{1}{4}x[/tex]
After day 1, there are:[tex]\frac{3}{4}x[/tex] left ----------------- i.e x - 1/4x
On day 2, we have:
[tex]Day\ 2 = \frac{1}{3} * \frac{3}{4}x[/tex]
[tex]Day\ 2 = \frac{1}{4}x[/tex]
At this point, we have:
[tex]Day\ 1 = \frac{1}{4}x[/tex]
[tex]Day\ 2 = \frac{1}{4}x[/tex]
[tex]Left = 80[/tex] ---- pages left
The summation of all must equal x, the book pages
[tex]Day\ 1 + Day\ 2 + Left = Total\\[/tex]
[tex]\frac{1}{4}x + \frac{1}{4}x+ 80= x[/tex]
Simplify the left-hand side
[tex]\frac{1}{2}x+ 80= x[/tex]
Collect like terms
[tex]x - \frac{1}{2}x= 80[/tex]
Simplify
[tex]\frac{2-1}{2}x= 80[/tex]
[tex]\frac{1}{2}x= 80[/tex]
Multiply by 2
[tex]2 * \frac{1}{2}x= 80*2[/tex]
[tex]x = 160[/tex]
Explica la importancia que tiene el plan de trabajo (cronograma) en los proyectos y porque se realiza antes de ejecutar la solución seleccionada. ayuda es para hoy :c
Answer:
El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación del proyecto) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.
El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.
Explanation:
El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.
El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.
According to the author, "U.S. Security strategy and U.S. Identity towards Internet governance are all anchored in the idea of freedom." On what basis does the author make that claim?
Answer:
The answer
Explanation:
Transferring data from a remote computer to a local computer is .....
The answer is uploading
Edhesive lesson practice 8.3, question 5
Answer:
3
Explanation:
Following are the correct python code to find the length of the given parameter value.
Python code to find length:print(len("stuff"))#printing length
Output:
please find the attached file.
Program Explanation:
In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.
Find out more about the length method here:
brainly.com/question/13527881
in a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
a twig
a campfire
none of the above
Answer:
You would use a twig first :)
Explanation:
Answer:
The glowing embers from the crackling campfire lit up the nighttime sky.
Explanation:
The smallest piece of information a computer can store is
Answer:
bit
Explanation:
confia
You have worked as the network administrator for a company for seven months. One day, all picture files on the server become corrupted. You discover that a user downloaded a virus from the internet onto his workstation that propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do
Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool
Answer: Adjustment layer
Explanation:
The image editing tool or technique that should be used by Carter use is an adjustment layer.
The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.
By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.
Answer: B: an Adjustment Layer
Explanation: Correct for Edmentum/Plato
in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle
What is a number that refers to the position of an item on a list?
variable
parameter
operator
index
PLZ HELP IM TIMED
Answer:
Parameter
Explanation:
a parameter is an argument that is used to call something, for example in an array when 0 is referenced as the first element in the array.
Create a program that calculates the cost of a meal and drink in a restaurant. Display a small menu with three meals, three drinks and the price for each. The program should have the following functions: my_restaurant(): This function displays the menu and asks the user to choose a meal and a drink. It also calls the my_meal() and my_beverage() functions. my_meal(): This function allows the user to choose a meal and return the choice. my_beverage(): This function allows the user to choose a drink, size small, medium or, large, and returns the choice. meal_cost(): This function receives a parameter that represents the meal choice. Calculate the cost of the meal based on the users choice. beverage_cost() This method receives two parameters that represents the drink and size. Calculate the cost of the beverage based on the users choice. total_cost() This function calculates the grand total for the meal and drink. Calculate the sales tax at 6%.
I think you have to use Excel application it's not anything hard.
A file format refers to the background in a presentation.
True
False
Answer:
False
Explanation:
Required
Describe file format
Literally, file format means file extension and it describes the type of file.
For instance:
. d o c is a file format of word documents
. j p g is a file format of images
etc.
Hence, the statement is false
Answer: The answer is false
Explanation: File formats are linked to certain programs
What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )
786
Explanation:In Python, and of course many other programming languages, lists are one of the built-in data types used to store several items in a variable.
In creating a list, the items, which may be of different types (e.g integer, float, string e.t.c), are placed in a square bracket and each item is separated from the other by a comma. The following are an example of a list.
myList = ["fish", "meat", 5, 8, "egg"]
scores = [10, 34, 78, 90]
To access or retrieve an item in a list, the index of that item is used. Indexes start from 0. For example, in myList the first item (which is fish) has an index of 0. The second item (which is meat) has an index of 1 and so on. In scores, the first item (which is 10) has an index of 0, 34 has an index of 1, 78 has an index of 2 and so on.
Now;
i. to access the first item in myList, we simply write: myList[0]. This will give fish
ii. to access the third element in scores, we simply write: scores[2]. This will give 78
From the list given in the question which is:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print(list1[1]) will print the item at index 1 which is 786.
Therefore, the output of the code is 786
What is a simulation?
A) a computer-based program that tests knowledge in important areas
B) a computer-based program that can be used to solve problems
C) a computer-based program that designs other programs
D) a computer-based program that mimics a real-life event
Answer:
D, a simulation is a computer-based program that mimics a real-life event.
Explanation:
Full from of Computer
: )
Answer:
COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.
Explanation:
In you question, it isn't from! it is form(;
Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.
But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.
Indicate whether the following statements are true or false:
a) Viruses protection programs only scan a computer's data for harmful viruses. True or False?
b) Software piracy is the authorised distribution and use of computer programs. True or False?
c) An individual has no right to examine the contents of any personal record representing him/her. True or False?
d) Information should not be held for longer than necessary.
True or False?
e) The privacy of the individual should be protected. True or False?
Answer:C
Explanation:I got it correct on the computer
Answer: a False (they scan for all of them)
b True
c False
d True
e True
Explanation:
Place the code in the correct order. Assume the indenting will be correct in the program.
Third part
Second part
First part
A. class car:
model = "
year = 0
B. :: myCar = car()
C. :: myCar.model = 'Thunderbird'
Answer:
The correct order is A, B, C
Explanation:
Required
Place A, B and C in the correct order
The unordered code is an illustration of class and object in programming language.
First, the class must be defined. This is done in (A)
class car{model= " "; year= 0;}
Next, an instance of the class must be created. This is done in (B).
car myCar = new car();
Lastly, the objects of the class can be updated. This is done in (C) where model is set to Thunderbird
Answer:
1classcar 2myCar 3myCar.model
Explanation:
describe orderly how to save a Word document into a folder
Consumers who wish to make a purchase from other consumer on ebay need tl
.bid on item
.first contact ebay employee
.send an email to seller
.also place an item sale on the side
Answer:
Bid on item
Explanation:
Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.
When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.
Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.
Answer on https://pastebin.com/raw/nHzXvbPP
What are the steps to add a bibliography to a document? 1. Create a using the proper steps. 2. Go to the tab on the ribbon. 3. In the Citations & Bibliography group, select the Bibliography drop-down menu. 4. Select the correct formatting from the three choices. 5. A bibliography is then added to the
Answer:
The steps required to add a bibliography after adding the sources of the information contained in the document and marking the references made in the text, are;
1. Click to select insertion point of the bibliography
2. Select the Reference tab by clicking on the Reference tab in the ribbon
3. Within the Citations & Bibliography group, select Bibliography to open a dropdown list of bibliography format
4. Select the applicable format
5. By selecting the desired bibliography format, the bibliography is inserted at the selected insertion point of the document
Explanation:
Answer:
1. Create a
✔ citation
using the proper steps.
2. Go to the
✔ References
tab on the ribbon.
3. In the Citations & Bibliography group, select the Bibliography drop-down menu.
4. Select the correct formatting from the three choices.
5. A bibliography is then added to the
✔ bottom of the document
Explanation:
Edg 2021
what is meant by cyber law
Explanation:
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?
A. Disable the switch ports connected to the network jacks in the reception area.
B. Move the receptionist's desk into the secured area.
C. Require users to use screensaver passwords.
D. Replace the smart card reader with a key code lock.
Answer:
D. Replace the smart card reader with a key code lock.
Explanation:
In other to increase the security of the company, the best security practice would be to replace the smart card reader with a key code lock. This is because, with the smart card reader, an unauthorised person who was able to pick up one of the cards could be able to access the secured work station.
On the other hand, if the area is accessed with key code lock, the, it is only the person who knows the code that will be able to access the secured work area. Of course, the key code will vary from one individual to another in the organization.
Someone help me on this ?
Answer:
An expert - Similarity
No special materials - advantage
There maybe a long wait time - disadvantage
Explanation:
Answer:
An expert - Similarity
No special materials - advantage
There maybe a long wait time - disadvantage
Explanation:
todas las computadoras son controladas por hardware?
Answer:
"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."
Explanation:
(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)