Answers

Answer 1
RAM is the correct answer

Related Questions

how many MB are there in 1000 KB?

Answers

Answer:

1 megabyte

Explanation:

Ok so there should be 1

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

displaying advertisements specific or users internet based on their buy preference is called ._________.​

Answers

Targeted advertising       hope it helps

What is property in educational technology

Answers

1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.

Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing history true or false

Answers

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

Web cookiesCachesBrowsing history

Read more: https://brainly.com/question/3840341

What is it called when a unique letter is assigned to a shared drive

Answers

Answer:

Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.

Explanation:

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

x = 9 % 2

if (x == 1):
  print ("ONE")
else:
  print ("TWO")

Answers

The output will be : ONE

Answer:

Hewo There!!

_______________________

Simplify  9 %  ⋅  2 .

x = 0.18

_______________________

“One’s life has value so long as one attributes value to the life of others, by means of love, friendship, indignation and compassion.” — Simone De Beauvoir

_______________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn

A new printer has recently been installed in the office, but it does not print. What is the first source to check for information about the problem? *

The manufacturer's website
Tech support forums
The OS website
POST card

Answers

Hi hi hi hi hi hi hi hi hi

Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams

Answers

The software development methodology used by the Game Changer teams is called; Prototyping

We are given that;

- Game changer technologies has four software teams

- Each of the teams develops 4 different examples of the new game app.

Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.

When the acceptable prototype is gotten, then it will be used to develop its final game app.

Read more about prototype at; https://brainly.com/question/25824140

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):

Answers

Shoplifting! Did he pay for those?!?!

The given situation is an example of shoplifting.

What is hardware?

All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.

You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.

This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.

This, this would be an example of shoplifting.

Learn more about hardware.

https://brainly.com/question/15232088

#SPJ2

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network

Answers

The tool that the technician should use is TRACERT. It is a network diagnostic command for tracing the path of an Internet Protocol packet to its corresponding destination.

The Internet Protocol is the network protocol on the Internet, which is used for relaying data across network boundaries.

TRACERT is a network diagnostic command used to trace the path of an Internet Protocol packet to its corresponding destination.

This tool (TRACERT) is useful for defining response delays and routing loops in a network pathway across different nodes.

Learn more about TRACERT here:

https://brainly.com/question/5699061

Every device connected to the public Internet is assigned a unique number known as: a. an Internet Protocol (IP) addres

Answers

Answer:

yes

Explanation:

its the number used to identify the devise connected to the internet

Filtering is a function of _____.

Answers

The answer is: switches.

Explanation:

Filtering is a function of switches.

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

Explain if a company is responsible for using computer components manufactured using fair trade practices. [9 marks]

Answers

Answer:

Fair trade practices aims at promoting the fair relationships between the buyers and producers. It is a kind of a social movement that makes the producers to provide the better conditions and humane working environment in case of developing countries.

• It also favors and supports the proper and substantial payment to the manufacturers and wages to the labors.

• It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.

Explanation:

can you mark me as brainlist

Answer:

It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.

what is office course
how to learn office course

Answers

Answer:

It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .

Hope this helps you XD ✌️

The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows were there?​

Answers

The answer is 25 sparrows.

in which country was Abacus build
if ur smart don't searh​

Answers

Answer:

Abacus many be built first in China

Explanation:

I know Abacus ^o^

Answer:

Hewo There!!!!

__________________

China- i thinkkk maybe?

__________________

“Hold fast to dreams,

For if dreams die

Life is a broken-winged bird,

That cannot fly.”

― Langston Hughes

__________________

Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn

1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constructors headings and method headings 3. Edit the file to build and add the UML in the Header comment of the code. You must do a very thorough job and be sure to pay attention to the details. 4. Save your Flower.java file. 5. Upload your updated Flower.java file here.package during_class_session;public class Flower{private String NameofFlower;private double PriceofFlower;public Flower() {this.setNameofFlower("No name yet");this.setPriceofFlower(0.0);}public Flower(String nameofFlower_initial, double priceofFlower_initial) {this.setNameofFlower(nameofFlower_initial);this.setPriceofFlower(priceofFlower_initial);}public String getNameofFlower() {return NameofFlower;}public void setNameofFlower(String nameofFlower) {NameofFlower = nameofFlower;}public double getPriceofFlower() {return PriceofFlower;}public void setPriceofFlower(double priceofFlower) {PriceofFlower = priceofFlower;}}

Answers

Answer:

/

Explanation:

The internet advertisement below is known as a __________. CSS tag web banner title sequence hotspot

Answers

The internet advertisement that is illustrated in the image attached below is known as a: B. web banner.

An internet advertisement can be defined as a promotional multimedia message (information) that is designed and developed with the intention to make products or services that are offered by a business firm to become known and familiar to all of its customers and potential customers over the Internet.

Generally, there are various techniques used by web developers for internet advertisements and these include:

CSS tagTitle sequenceHotspotWeb banner

A web banner is a form of advertising which embeds an advertisement that is delivered by a web server into a webpage over the Internet or the World Wide Web (www).

In conclusion, the internet advertisement that is illustrated in the image attached below is known as a web banner.

Read more on web banner here: https://brainly.com/question/10196860

Yvonne is matting a series of photos as an anniversary gift for her parents. She hopes that they will cherish this gift for years to come but is concerned because she can’t afford the really nice mat board. What is Yvonne MOST LIKELY worried about?

A.
that the mat will turn black

B.
that the mat will take over the picture

C.
that the mat will disintegrate

D.
that the mat will discolor and deteriorate

Answers

Answer:

That the mat will discolor and deteriorate

Explanation:

D

Yvonne will most likely worry that the mat will discolor and deteriorate. The correct option is D.

What is matting in photos?

Matting is a decorative border that surrounds the artwork. It is typically built of mat board, a type of board designed specifically for this purpose. After cutting the mat board to size, one or more holes (entries) are cut in the mat board to act as windows for displaying art.

Matting is the technique of separating an image's foreground and background components. Typically, the photos are of a frame or a video file. It adds a decorative edge to the print and a mechanism for hanging the photo.

Matting involves using a front or window mat to separate the image from the frame's glass and to give an extra border around the photo.

Therefore, the correct option is D. that the mat will discolor and deteriorate.

To learn more about matting in photos, refer to the link:

https://brainly.com/question/28279935

#SPJ2

difference between syntax error and semantics
error

Answers

Answer:

The syntax error is an incorrect construction of the source code, whereas a semantic error is erroneous logic that produces the wrong result when executed.

Explanation:

Syntax

It refers to the rules of any statement in the programming language.

Semantics

It refers to the meaning associated with any statement in the programming language

how to set brainlyest

Answers

Yeah he or she is right



List and explain three ways study groups benefit your learning.

Answers

Answer:

Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,

1.  More support, limits chances of procrastination

     With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.

2. More people means more parts can get done effectively and taking notes is easier.

     More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.

3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.

      People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.

13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?

Answers

Possible reasons for missing out row 4 to 7 are as follows,

Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.

These are all the possible reasons for missing of row 4 to 7.

Learn more:  https://brainly.com/question/24504878

Complete the sentence based on the given information.

______ are responsible for analyzing the client business model, whereas _____ are responsible for identifying errors in the software product to confirm that it meets the client model.

Answers

Answer:

blank answer so brainly doesnt delete your question.

Explanation:

A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.

What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?


Utilize a DevSecOps approach to incorporate security into the development process from the beginning.


Schedule development of security features after the application’s initial release.


Design the application’s security features after the application’s initial build is complete.


Contract with an external vendor to develop a security solution separately from the main application.


I don't know this yet.

Answers

There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.

Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.

They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.

Learn more about Accenture from

https://brainly.com/question/25737623

Please debbug this code for me

public class SavingAccount { // interest rate for all accounts private static double annualInterestRate = 0; private final double savingsBalance; // balance for currrent account // constructor, creates a new account with the specified balance public void SavingAccount( double savingsBalance ) { savingsBalance = savingsBalance; } // end constructor // get monthly interest public void calculateMonthlyInterest() { savingsBalance += savingsBalance * ( annualInterestRate / 12.0 ); } // end method calculateMonthlyInterest // modify interest rate public static void modifyInterestRate( double newRate ) { annualInterestRate = ( newRate >= 0 && newRate <= 1.0 ) ? newRate : 0.04; } // end method modifyInterestRate // get string representation of SavingAccount public String toString() { return String.format( "$%.2f", savingsBalance ); } // end method toSavingAccountString } // end class SavingAccount

Answers

Answer:

/

Explanation:

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

Other Questions
What technological tools do you identify as one that could make those actions a habit? In three to five sentences, describe the tools and explain how they can help to support you. Provide your response in complete sentences in the space below. we____________, the moon by the time you get back. (finish) Plz help brainiest to the correct answer! 1 pointA country that is transitioning to democracy might actually move fartheraway from democracy if people*O support a single political party, preventing the development of multiple parties.O .start a newspaper that promotes the country's previous form of government. O start their own businesses, creating divisions due to income levels.O from different religious groups express their own viewpoints, leading to confusion. A rental car company charges $51 per day to rent a car and $0.14 for every mile driven. Damian wants to rent a car, knowing that: He plans to drive 250 miles. He has at most $290 to spend. Use the drop-down menu below to write an inequality representing dd, the total number of days Damian can rent the car while staying within his budget. How do you know 72/80 is greater than 7/8? Explain Translate each of the following algebraic expressions into word phrase.7x-7 How is a populations size related to their well-being? at euclid school, there are 14 female teachers and 11 male teachers, what fraction of the teachers are male Which number is a factor of 15 but no a multiple of 3? Which term describes money collected and invested for the benefit of worker retirement plans? What are the gas laws? (Include Boyle's law, charles's law, gay lussac's law, an avogadro's law) Could someone please summarize these for me ples? Brainliest answer also yes why did the pilgrims start with two ships and come back with one Hi! I'm looking for some proficient actually (accurate) responses. depending on the responses ill probably give brainliest to the most accurate one. What does eight divided by 4/5 equal Who was William Harvey and what were his accomplishments and contributions solve for x & yplease and thank you [tex]3^{2x+1} -4.9^{x} =-9[/tex] Please answer my question 5. What are the slope and y-intercept of the graph of y= 30 + 5?