Answer:
C option
Explanation:
Because in testing phase the game has been developed and test for errors in game.
Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 = 10
Answer:
The last one is correct.
Explanation:
Which line of code will allow the user to enter their current temperature to the nearest tenth of a degree?Group of answer choicesnum1 = input(""What is your temperature?"")num1 = int(input(""What is your temperature?"")num1 =float(input(""What is your temperature?""))1num = print(""What is your temperature?)
In programming we have different data types and in this question two data types was specified, Int and float, the only data type that can receive input to the nearest tenth of degree is float, hence, float(input(""What is your temperature?""))
Data types are use as place holders, we have the primitive and non-primitive data types
Example of data types are FloatArrayIntegerDoubleStringLearn more about data types at
https://brainly.com/question/179886
A(n) ________ address is the address that external entities use when communicating with your network.
Answer:
IP adress
Explanation:
the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data
hellowsss im bord :>
add my media pls its lil bunny(bunni) shoty (shawty)
Answer:
Bold
Italicized
Underlined
BOLDLY UNDERLINED
Okay! I will! ;)
I adore rabbits too!
I even made a book about them!
(It's not published tho :( )
The ________ font is applied to titles and the ________ font is applied to all other text in slides.
Answer:
cursive on tile and original micky fount in the storybook
Explanation:
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.
An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.
In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).
Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.
In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.
Read more: https://brainly.com/question/5660386
Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer.
Answer:
The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.
Hope that helps. x
Which of the following describes email nonrepudiation?
A.
the elimination of emails that may contain dangerous viruses
B.
the review of every email sent by the CIA
C.
the use of tracking methods that can identify senders and their locations
D.
the use of encryption methods that ensure senders and their locations cannot be identified
Answer:
I believe the answer is C, im sorry if im wrong
While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal
The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.
A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.
This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.
In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.
Read more: https://brainly.com/question/5660386
Which of the following is a responsibility of CTSO membership?
getting all As in your classes
traveling to a national conference
conducting yourself appropriately and professionally
getting a job in your career field after graduation
Answer:conducting yourself appropriately and professionally
Explanation:
2021 edg
How do I type fast?
Give me an actual answer...
Answer:
Use all 10 fingers and remember where the keys are.
Explanation:
This may take a while to get used to, but just let your hands flow across the keyboard. There really isn't a specific way to do it, but there are websites that'll help you.
The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.
Answer:
ipconfig
Explanation:
That is the actual
command
a network consisting of nodes covering a small geographic area is a
Answer:
that is a Local Area Network (LAN)
Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one from a lesser-known brand. Which questions should she consider before she buys the jacket? Check all that apply. Is advertising influencing her? What are her motivations? Has she compared prices? Is she buying at the right time? Will her sister like the jacket too?
The questions that she should consider before she buys the jacket are:
Is advertising influencing her?What are her motivations?Has she compared prices?Is she buying at the right time?What is buying?The act of buying an item is known to be acquiring a specific possession, or ownership/ rights to the use that thing or services. This can only be done through payment that is mostly based on the use of money :
Note that before getting something, one must consider other things such as prices and the reasons for buying the item before one can go ahead to purchase that thing.
Learn more about buying from
https://brainly.com/question/25745683
1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?
what is a copy of a theme with different color schemes called?
Answer:
A copy of a theme with different color schemes is called a Variant
Explanation:
Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.
In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.
It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.
Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.
Learn more about slideshow on:
https://brainly.com/question/25327617
Answer:
"True"
Explanation:
I took the test!
Lenovo Diagnostics - UEFI Version is preloaded into the BIOS on all Lenovo products except for ____________________.
Based on the information given, it can be noted that Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except the Ideapad models.
It should be noted that Lenovo diagnostic tools are used primarily to diagnose any hardware problems that a computer may have.
Lenovo diagnostic tools are available as a Bootable or a downloadable package. Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except for the Ideapad models.
Learn more about Lenovo on:
https://brainly.com/question/25397058
if a granola bar has 5.7 grams of protein in it how many centigrams of protein does it contain?
A. 57
B. 0.57
C. 570
D. 5,700
URGENT!! thank you!!!!!
Answer:
Robots or automatons
Explanation:
Machines that can perform tasks historically performed by humans can improve productivity (they can work non-stop) and of course the environment is safer for workers (work is done by a machine instead) but there is job loss (people who used to do the machine's work are redundant).
If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.
define the term malicious program
Write a 20 charecter poem! for points! :)
you are wonderful as you are blue you are as blue as the sky the sky is beautiful as u are too you are red as Rose's and Rose's are full of you winter time is the mood full of winter and snow
When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.
When you first purchase a notebook, make sure you have a RECOVERY CD. It enables the restoration of the notebook computer.
A recovery disc is a disc that enables to restore the computer to the same condition when it was bought.
Moreover, a recovery drive refers to a separate partition in the notebook that must contain the required files to restore the device if the system becomes unstable.
A recovery disc can be considered as a drive used to keep a backup of the files (e.g., images) and other types of restoration data.
Learn more about recovery disc here:
https://brainly.com/question/14217813
PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel
Answer:
The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????
Explanation:
What do software engineers use as tools to provide automated support for the development of the system
Answer: CASE
Explanation:
In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines
The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.
Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.
Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.
This ultimately implies that, various symbols, signs and objects that were mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.
Read more: https://brainly.com/question/14810228
URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST
Answer:
I'll happy to help
Explanation:
Please make your clear. I couldn't understand!
When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at that memory location the new number gets assigned to a neighboring memory location the computer issues an error the new value is destroyed and the old value remains
Answer: the new number overwrites the previous value at that memory location
Explanation:
When a number gets assigned to a variable that already has a value, the new number overwrites the previous value at that memory location. The correct option is A.
What is assigning value?To "assign" a variable is to symbolically link a specific piece of data to a name. Any operations performed on this "name" (or variable) must be true for all possible values.
The assignment operator is the equals sign, which should never be used for equality, and should never be followed by the double equals sign.
To assign a value to a variable, use the simple assignment operator. The assigned value is evaluated by the assignment operation.
It is possible to chain the assignment operator to assign a single value to multiple variables.
When a variable receives a new value, the previous value is overwritten.
Thus, the correct option is A.
For more details regarding assigning value, visit:
https://brainly.com/question/28587274
#SPJ2
the service you are attempting to use is restricted
Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.
Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.
When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.
A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.
Learn more about restricted from
https://brainly.com/question/15870692