Answer:
A and B, I really hope.
Explanation:
Answer:
the first one is D and the second one is B
Irene wants to connect her smartphone wirelessly to her laptop in order to transfer images. Which two technologies could she reasonably employ to connect these devices?
Wi-Fi
infrared
satellite
mobile network
Bluetooth
Answer:
The correct answers are
Wifi
Bluetooth
Explanation:
I got it right on the Edmentum test.
Irene wants to connect her smartphone wirelessly to her laptop in order to transfer images two technologies could she reasonably employ to connect these devices are Wi-Fi and Bluetooth.
What is the wireless network?As an example, it's far usually hired in headsets for cell phones, allowing hands-unfastened cell smartphone use. Wi-Fi, on the alternative hand, lets in gadgets hook up to the Internet. Bluetooth limits the range of gadgets that can join at someone's time, while Wi-Fi is open to greater gadgets and greater users.
Wi-Fi is possibly the largest and maximum tricky example, as are different Bluetooth receivers and gadgets, that can intrude on one another. The backside line is this: WiFi is the wi-fi community you operate to your house, however it is able to be made out of any form of network connection.
Read more about the mobile network:
https://brainly.com/question/917245
#SPJ2
Which of the following components converts AC to DC?
Voltage regulator
Surge protector
Capacitor
Power supply
Answer:
Power supply
Explanation:
A computer's power supply converts alternating current (AC) from the wall outlet to direct current (DC) used by the computer's internal components.
A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does not convert the power input from one form to another; it only ensures that the voltage remains at the appropriate level for the device. A surge protector protects a system from power spikes. A UPS (uninterruptible power supply) provides backup AC power using a reserve battery.
power supply
Explanation:
took the quiz
Read the following code:
# Calculate average
average = numl + num2 + num3 / 3.0
There is an error in the code. How should the code be revised in order to get the correct output?
A:average = numl + num2 + num3 - 3.0
B:average = numl + num2 + num3 - 3.0
C: average = (numl + num2 + num3) / 3.0
D: average = numl + num2 + num3 / (3.0)
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?
JavaScript
HTML
CSS
Text editor
Answer:
text editor is not right, it is web browser
Explanation:
if she needed to view her website, she just needs to view it on her web browser.
Answer: HTML
Explanation:
Why is it a good idea not to change the subject line when replying to a message?
O so that the reply is sent to the original sender
O so that the reply does not bounce back as undeliverable
O so that the reply matches with the sender's original message
O so that the reply does not inadvertently include unintended recipients
Answer:
the correct answer is C
Explanation: i just did it on edge 2021
Answer:
C. so that the reply matches with the sender’s original message
Explanation:
Type the correct answer in the box. Spell all words correctly.
Isabella plans to work as a freelance DTP publisher. Her DTP setup is a non-Apple Macintosh platform. She has several options for printers. Which type of printer would you recommend to her?
__(blank)__ printers are ideal for DTP projects that work on a non-Apple Macintosh platform.
Answer:
hp deskjet 2543
Explanation:
An IP subnetting design effort is under way at a company. So far, the senior engineer has decided to use Class B network 172.23.0.0. The design calls for 100 subnets, with the largest subnet needing 500 hosts. Management requires that the design accommodate 50 percent growth in the number of subnets and the size of the largest subnet. The requirements also state that a single mask must be used throughout the Class B network. How many masks meet the requirements
Answer:
The answer is "0".
Explanation:
The mask should describe sufficient subnet bits for build 150 subnet masks with 50% development. The Mask thus needs a minimum of 8 subnet bits (7 subnet bits supply 27, or 128, subnets, and 8 subnet bits supply 28, or 256, subnets). Similarly, such a need to grow by 50% of its size of the main subnet needs, that host part to amount to 750 hosts/subnet. There's not enough 9 host bits (29 - 2 = 510), yet 10 network bits have 1022 host(s)/subnet (210 – 2 = 1022). This same maximum mask project requires to be 34 bits, (at least) in the form of 16 network bits, because of the Class B network, but there are only 32 bits, therefore no single mask meets its requirements.
JAVA
Write a method that takes a parameter for the number of a month and prints the month's name. You may assume that the actual parameter value
passed to the method is always between 1 and 12 inclusive.
This method must be called monthName() and it must have an integer parameter.
Calling monthName(8) should print August to the screen.
You can call your method in the program's main method so you can test whether it works, but you must remove or comment out the main method
before checking your code for a score
public class MyClass {
public static String monthName(int num){
String arr[] = {"January", "February", "March", "April", "May", "June", "July","August", "September", "October", "November", "December"};
return arr[num-1];
}
public static void main(String args[]) {
System.out.println(monthName(8));
}
}
I hope this helps.
Methods are blocks of named statements that can be called from other place in the program
The method in java, where comments are used to explain each line is as follows:
//This defines the method
public static void monthName(int month){
//This initializes the array of months
String months[] = {"January", "February", "March", "April", "May", "June", "July","August", "September", "October", "November", "December"};
//This prints the month name
System.out.print(months[month-1]); }
Read more about similar programs at:
https://brainly.com/question/22589115
can someone help me with this trace table - its computer science
TThe while loop keeps going until count is greater than or equal to 10.
count = 0, sum = 0
count = 2, sum =2
count = 4, sum = 6
count = 6, sum = 12
count = 8, sum = 20
count = 10, sum = 30
Now that count is equal to 10, it exits the while loop and the program ends. The values above complete your trace table.
The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questions by choosing the best answer from the drop-down menus. Why did cell phones gain in popularity? Which device stemmed from the original cell phone and allowed for synchronized contact information? Which device followed the PDA?
Answer:
Why did cell phones gain in popularity?
✔ smaller and lighter components
Which device stemmed from the original cell phone and allowed for synchronized contact information?
✔ PDA
Which device followed the PDA?
✔ smartphone
Explanation:
The device stemmed from the original cell phone and allowed for synchronized contact information is PDA.The device followed the PDA is smartphone.
What is PDA?PDA refers to Personal Data Assistants.
In earlier years phones were separated from (PDA)
Until Recent times when smartphones were introduced.
Smartphones can now save media and document files, remind you of activities to do during the day, using the To Do List feature and much more features.
It used to be that a phone was for only calls and messages and perhaps for keeping time.
The cell phones gain in popularity Because it is smaller and lighter components.
The device stemmed from the original cell phone and allowed for synchronized contact information is PDA.
The device followed the PDA is smartphone.
Learn more about smart phone here;
https://brainly.com/question/13445879
#SPJ2
PLS HELP ;CC
The "Rule of Thirds" is compositional technique that was incorporated into photography from __________ .
a
early photographers who were first painters
b
early camera makers who found it was easy to explain to amateur photographers
c
early photo printers who used it and later it became a common rule
d
early SMPTE standards
Answer:
a
early photographers who were first painters
Explanation:
The Rule of Thirds is a compositional technique which states that image painting, photograph, graphic design should be divided into nine equally proportioned boxes by creating a grid with two vertical and two horizontal lines. The rule of third helps in making the picture more attractive and balanced
The rule of thirds was first used in landscape paintings by painters as early as 1797.
i was scripting for my game design clas and i was just creating a story based game. its not really a question but could you guys (meaning fellow users) give it a go? not done yet tho..
file:///C:/Users/Gamer_x9/Downloads/A%20New%20Beginning.html
its not an adobe link that pulls another tab dw i would never
Answer: sure thing
Explanation:
create a flowchart to print numbers from 1 to 100
( IF U ANSWER PROPERLY I WILL MARK U AS BRAINLIEST)
Answer:
brainliest plsss
Explanation:
I think so this is what you had asked!!!!!!
hope it helps
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another coworker searches for parts that need to be ordered. Erica’s company uses a _____.
Answer:
a software program for storing, managing, and retrieving information
Explanation:
Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclusive, and sets its side length to a random decimal number greater than or equal to 5 and less than 12. Use Math.random() to generate random numbers.
This method must be called randomize() and it must take an RegularPolygon parameter.
Could someone help me out here thanks! C:
Answer:
public static void randomize(RegularPolygon r){
int side = (int)((20-10) * Math.random()) + 10;
int length = (int)((12-5) * Math.random()) + 5;
// assuming the regularpolygon class has setSide and setLength methods.
r.set.Side(side);
r.setLength(length);
}
Explanation:
The randomize method is used to access and change the state of the RegularPolygon class attributes sides and length. The method accepts the class as an argument and assigns a random number of sides and length to the polygon object.
Choose the correct option to fill in each blank.
In ___ parallelism, the computer divides a task into
___, which it then allocates to different processors for execution.
Blank 1:
Data-level parallelism
Instruction-level parallelism
Task-Level parallelism
Blank 2:
Subprograms
Subtasks
Submodules
Answer:
Blank 1: Task level parrallelism
Blank 2: Sub Tasks
Explanation:
Task Parallelism means concurrent execution of the different task on multiple computing cores.
Consider again our example above, an example of task parallelism might involve two threads, each performing a unique statistical operation on the array of elements. Again The threads are operating in parallel on separate computing cores, but each is performing a unique operation.
Answer:
In task-level parallelism parallelism, the computer divides a task into subtasks , which it then allocates to different processors for execution.