Answer:
Where are the options??
Explanation:
HELP PLEASE
Which app would require two people to know the same language but not require either to speak aloud in order to communicate?
A language learning app
A language translation app
An electronic notepad app
A speech-to-text app
A language translation app
--------------------------------------------------------------------------------------
A language learning app, like Duolingo, would only require one person, since it person vs computer
An electronic notepad app, i dont think that has anything to do with language?
A speech to text app would defeat the whole purpose of not speaking aloud, so thats not correct.
The only one that makes sense is a language translation app, like iTranslate, which allows people to speak to it, but ONLY if they want, because they can type the words they want to translate.
Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!
Stay Brainy!
−[tex]WishWolf[/tex]
Answer:
A language translation app
Explanation:
What materials may a membrane be made of?
a
animal skin, plastic or rubber
b
cotton or nylon
c
glass or plastic
d
wood or metal
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. trojan horse worm phishing attack denial of service attack
Sarah was the victim of a computer attack called phishing (option c)
What is phishing?Phishing is a computer term that refers to the set of techniques used by a criminal to try to deceive his victim through emails and other digital means.
This deception has the sole objective of stealing confidential information from the victim, such as her bank account password, in order to later steal it.
Based on the above, it can be inferred that Sarah was a victim of phishing because she gave her confidential bank details to an account that was not her official bank account.
Learn more about phishing in: https://brainly.com/question/23021587
According to the results of a testing process, Ron, an application tester, has made some changes to the application. Now, he wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should he perform
Answer:
Regression
the answer is a Regression test
hope this helps
scav
The healing brush tool will pick up the ________ from your source area, but maintain the color in the destination.
Answer:
The Healing Brush tool allows you to fix image imperfections such as scratches, blemishes, etc. By sampling the surrounding area or using a predefined pattern you can blend the imperfections into the rest of the image. The healing brush tool is located in the Photoshop Toolbox, on the left side. mark as brainliest
Explanation:
What are the local, state, and national opportunities that may be available to those who participate in CTSOs?
Answer: Students
Explanation:
The National Coordinating Council for Career and Technical Student Organizations (CTSO) advocate for the values that the Career and Technical Education (CTE) curriculum instills in students.
In association with the Association for Career and Technical Education (ACTE), the CTSO work to instill career skills to students in middle school, high school, and post-secondary institutions such as Business, Health science, Information Technology and Finance amongst others.
CTSOs such as Educators Rising and Business Professionals of America encourage and support CTE programs for their members which also has a Federal Support of $1.1 billion.
Analyze each of the situations below. Which of the following BEST Illustrates someone who shows appropriate information literacy skills?
O A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until
he locates a reliable website.
OB. Deja makes sure that she checks her work email at least three times a day to make sure she hasn't missed any important information
OC. Heath volunteers to stay late after work this week to ensure that a new program is completed for a customer by the end of the week
OD. Marcel created a calendar that will help him stay organized at work.
The best illustration of information literacy is A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until he locates a reliable website.
What is information literacy?Refers to being able to find and sort through information. Allows for problem solving.Felix has the problem of looking for information for his topic. He therefore goes online to find, sort through, and then use the information he finds to solve his problem.
In conclusion, the best answer in option A.
Find out more on information literacy at https://brainly.com/question/25039489.
The option that BEST illustrates someone who shows appropriate information literacy skills can be seen in option A.
What is an Information Literacy skill?Information literacy skills are defined as skills that are capable to locate, analyze, organize, using, and transmit information in all of its forms, particularly in circumstances involving decision-making, problem-solving, or knowledge acquisition.
From the given option, the BEST that illustrate the appropriate information literacy skills is that:
A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes to read through the different results until he locates a reliable website.
This is because Felix is having trouble finding information about his topic. As a result, he goes online to look for, filter through, and apply the knowledge he discovers to solve the problem of his situation.
Learn more about information literacy skills here:
https://brainly.com/question/10666756
You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks you to prepare a lecture on input and output. What is the role of the operating system to manage and work with each?
This is for a college class... Please answer with a well-developed paragraph, I will mark the answer brainlist.
Answer:
Input devices : These are the devices that are used to put information or simply give input to a computer system. These are also known as peripheral devices and some of the most common examples of input devices are keyboard and mouse. Output devices… any hardware device used to send data from a computer to another device or user. examples of output devices are monitors and projectors (video), headphones and speakers (audio), or printers and plotters (physical reproduction in the form of text or graphics).
Explanation:
Hope this helps <3
In computer systems, the operating system helps devices communicate and coordinate with software applications.
The operating system helps transfer information between devices that you use to input data (like keyboards or touchscreens) and devices that show or produce output (like monitors or printers).
What is the teachingFor input management, the operating system is responsible for handling data streams coming from various input devices.
When a user interacts with an input device, such as pressing a key on the keyboard or moving the mouse, the operating system captures these actions and converts them into appropriate signals that can be interpreted by software applications.
Read more about output here:
https://brainly.com/question/31242886
#SPJ3
pls help its important
Answer:
I think it's the last one
Elena wrote the following code in Scratch to have the sprite move and then turn around. However, the code does not work as expected. What should be done to fix the error?
Change "move 20 steps" to "move 10 steps"
Change "turn left 180 degrees" to "turn left 90 degrees"
Change "turn left 90 degrees" to "turn right 180 degrees"
Change "turn right 90 degrees" to "turn left 90 degrees"
There are a lot of ways to code in Scratch. What should be done to fix the error is to Change "move 20 steps" to "move 10 steps"
What is Movement in gaming?Movement is known to be a basic function in any kind of game. It is known to be the first thing one has to do when a person start a new game, and it can be found in almost all of every game that is made in Scratch.
The movement in games is done by pressing the arrow keys, which tells player's characters to move around on the screen and achieve a given task.
Learn more about coding from
https://brainly.com/question/22654163
Answer:
Change "move 20 steps to move 10 steps"
Explanation:
i got it right on my quiz
Which of the following programs completes similar functions as those completed by Microsoft® Publisher?
Question 1 options:
Microsoft Access
Microsoft Outlook
Microsoft PowerPoint
Microsoft Word
Microsoft Word does many of the same tasks that Microsoft Publisher does.
Microsoft word:Microsoft Word is a tool that is used to write documents in the educational field. It is maintained by Microsoft and may be utilized in a variety of fields, including research.
Created By Microsoft processor that was created by the company Microsoft. It offers comprehensive capabilities that let you format and modify your files and documents in the most efficient way possible.
Find out more information about 'Microsoft word'.
https://brainly.com/question/17145954?referrer=searchResults
Why is it necessary to be familiar with Microsoft Excel?
Answer:
It is necessary to be familiar with Microsoft Excel because you will be using it throughout your school years. If you don't no how to use Microsoft Excel you will have an hard time doing your assign paper you need to get done.
UNIT 2 TEXT QUESTIONS
Critical Thinking Questions
How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?
The unit has you writing a script that ends each level when a sprite gets to the right edge of the screen. Propose another “level completed” solution where the levels ends when the player hits a certain part of the screen WITHOUT relying on coordinates. Describe your solution, including the code blocks you would use instead of coordinates. (Hint: think about landing on a target or crossing a finish line!)
Propose at least two different ways you might increase the difficulty of a level by altering a characteristic of an enemy sprite in Scratch.
Think of video games that you find immersive. Identify two qualities those games have that draw you in.
Think about or propose a board game or video game that has an extremely high degree of customization. Explain why that game is highly customizable.
Answer:
I was doing this exact assignment, so you could use my answers as long as you reword them using a paraphrasing program or use these answers as added help with yours
Explanation:
Cheers!
___________________ is a formatting option used in chart.
a) Area
b) Legend
c) Chart Area
Answer:
c
Explanation:
chart area
I hope this will help you
Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the internet? how many unique addresses would there be?.
The number of unique addresses that can be supported on the devices with 4 bits will be 16.
What is an internet protocol?An internet protocol is a protocol that describes the structure of an internet address and then allocates a unique address to each internet-connected device.
However, we need to understand that one bit can only support four addresses.
Therefore, we can conclude that the number of unique addresses that would supported by 4 bits will be 16.
Learn more about Internet protocol here:
https://brainly.com/question/18215126
a. What is Flash?
ans..
Explanation:
Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection.
Does the network include a network device?
a router
A. True
B. False
Answer:
True
Explanation:
Everything inside of your network/subnet would be able to communicate with everything else inside the same network but without a router it would be unable to communicate with other networks. It all boils down to what is your network design. If you need to have dhcp or firewall, then you must have a router.
the factors of power of device
Answer:
tfopod
Explanation:
What machine was one of the first to be able to add, subtract, multiply and divide?.
Answer:
Stepped Reckoner
Explanation:
Gottfried Wilhelm Leibniz constructs the Stepped Reckoner,the first calculator to carry out all four basic arithmetic operations (addition,subtraction,multiplication and division).
2.1.2 write a paragraph to explain why these types of technology are beneficial to the users of the gautrain in 2022. Take the current situation in South Africa into consideration when answering this question 2 answers
The use of different technologies such as ATP and the "Standard Gauge" is beneficial for users of the gautrain train, as it promotes greater safety and passenger comfort.
Gautrain TechnologiesThe Gautrain train uses a track gauge called "Standard Gauge" which generates greater safety at high speeds. In this device there is an alarm system that guarantees safety in case of accidents, promoting the necessary actions.
There is also a suite of ATP tools that are used on board to prevent information security threats and attacks.
Therefore, the Gautrain train is a fast, modern and safe means of rail transport that has 80 km and connects the city of Johannesburg to the OR Tambo International Airport, in addition to making the line to Pretoria, the capital of South Africa.
Find out more information about transport technologies here:
https://brainly.com/question/25935364
A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the amount of material that can be analyzed via cryptanalysis to break the cipher.
Answer:
Computer Security
Explanation:
if referring to only to a computer, then it can be considered secure when the computer does what is is supposed to do and only what it is supposed to do, but in more modern times the definition has shifted from the computer to the information being processed
Fundamental of Computer Science
Prompt:
What is a class that you believe you could learn just as well in an online class as an in
person class? What is a class that you think you need to have in person if you want to learn
and pass the course? How are these subjects different? What factors contributed to your
decision?
Answer:
Coding and Hardware Hacking
Explanation:
You can learn coding just as well through a online class or even on the internet through yo*tube than an in person class whereas it would be alot easier learning hardware hacking in person because you are given the opportunity to ask and can be corrected for small mistakes due to the task being manual. Coding can be learnt online independently if needed although so can hardware hacking but having a teacher to correct you and teach you handy tricks from their experience will get you further in that sense.
Question 1 (1 point)
These errors can be difficult to identify, because the program still runs but it does
not do what you expect it to do.
1.Runtime
2.Logic
3.Syntax
4.Executing
Answer:
Logic
Explanation: I took the test in k12 and got it correct
My computer is being weird, Everytime I begin to type something on here it keeps adding a letter to the beginning of my sentence then when I try to go back and fix it it copies and pastes all I wrote down over and over again. I checked my settings and everything seems to be right.
Answer:
Maybe you have shift lock on since it's highlighting and Ctrl C + Ctrl V your entire text? let me know if im wrong.
2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
Answer:
They're necessary in order to ensure that we can all access the internet and access it easily and freely. About anyone can do just about anything. It isn't restricted to just certain people (or companies).
Explanation:
As a network engineer, you have been creating patch (straight-through) cables for a network switch. You have plugged in all the cables and are testing data transmission through the cables.You notice that the data transmission is not functioning properly in some of the cables and are sure that one of the cables is interfering with the transmission at the near end of the cable.What is this type of interference called
This type of interference in networking is called cross-talk signal disruption. It may also be referred to as degradations caused by electrical sources or electromagnetic sources.
How does Crosstalk Occur?Whenever signals traveling along a networking cable interferes with another it leads to electromagnetic disruptions in those signals. This is referred to as Crosstalk.
This can happen within a pair of cabling that is twisted. This can be corrected by:
using shielded networking cables and by keeping the cable further apart.Please see the link below for more about Networking:
https://brainly.com/question/2970996
Write 5 different types of basic programs.
Answer:
Word processors.
Game programs.
Spreadsheets.
Data base systems.
Graphics programs.
Explanation:
As a hardware technician and knowing the internet components of the system unit, list any five(5) of such components.
Answer:
the motherboard, hard disk drive, optical drive, power supply unit, and in some old systems fan and floppy disk drive.
Hope This Helps!!!
A global _____ system is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.
Answer:
Global Positioning System
Explanation:
also stands for GPS
np :)
Complete the sentence.
"C:\Users\Juanita\AppData\Local/Programs\Python\Python38.32\Unit\" is an example of a _______.
Answer choices:
relative path
path
The directory given above is typically an example of a path.
What is a path?A path can be defined as a string of characters that is used to uniquely identify and describe the location of a document, file or folder in a directory structure, especially on a computer system.
The types of path.In Python programming, there are two (2) main types of path and these include:
Relative path such as "os.path.relpath (path, start)"Absolute path such as "os.path.abspath"In this scenario, the directory "C:\Users\Juanita\AppData\Local/Programs\Python\Python38.32\Unit\" is an example of a path.
Read more on path here: https://brainly.com/question/20464533