hi there!
Answer:
setting up a small office network can be done with a LAN connection using a router, switch and some cables then we can connect all devices to the router through the switch using cables and it's done.
hope this helps.
You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b. port-scanning c. biometrics d. encryption
Answer:
D
Explanation:
Encryption secures transmissions on the internet to or from your PC
Using PowerPoint or Impress guarantees that your presentation will do which of the following? stay on schedule and end on time be clear and understood keep your audience engaged and excited none of the above.
Answer: it will be none of the above
Explanation: i just took this test. the key word is "guarantees" so yeah.
Using PowerPoint or Impress guarantees that your presentation will: D. none of the above.
A presentation can be defined as an act of speaking formally to an audience, in order to explain an idea, piece of work, project, or product, especially with the aid of multimedia resources or samples.
Generally, a speaker can use either PowerPoint or Impress during the process of a presentation to share vital information with his or her audience.
However, none of the aforementioned software applications can guarantee that your presentation will:
Stay on schedule and end on time.Be clear and understood.Keep your audience engaged and excited.Read more: https://brainly.com/question/10657795
Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.
Answer:
Tom is not sure how to code contents such as title and meta elements. These are coded as head elements.
Hope that helps. x
Answer:
head elements
Explanation:
answer is above
Which of the following applies to a trademark?
o belongs to just one company or organization
O always shown on the outside of a garment
O a way for people to copy a pattern
0 a mark that represents a product's "sold"
status
Answer:
a
Explanation:
Answer:
belongs to just one company or organization
Explanation:
edge 2021
what actions can be performed via voice commands using 2022 versa’s siri® eyes free?
The actions that can be performed via voice commands using 2022 versa's siri® eyes free are;
- Send and receive text messages
- Make and receive calls
- Select and play music
2022 versa's siri® eyes free is a media feature that can be connected to your iPhone in the latest car by Nissan called Nissan 2022 versa.
Now Siri® Eyes Free Available functions include:
Making and receiving callsSending and reading text messagesSelecting and playing musicReading notificationsRequesting directions or otherThis Siri® Eyes Free is usually located on the steering wheel and the way to operate it is by;
Press THIS button on the steering wheelSpeak a command.Wait for Siri® Eyes Free to reply. Within 5 seconds, press THIS button on the steering wheel to reply or give another command.Read more on cars at; https://brainly.com/question/25981194
What commands does SuperKarel know that regular Karel does not?
turnleft() and jump()
O
turnRight() and jump()
O
turnAround() and turnRight()
O
turnAround() and jump ()
Answer:
turnRight and turnaround
Explanation:
The regular karel does not know these commands
The command that SuperKarel know that regular Karel does not is turnAround() and turnRight(). The correct option is C.
What is Karel?Richard E. Pattis created Karel, an educational object-oriented programming language, to help teach programming to his Stanford University students.
Through simple object-oriented commands, the student learns to program by instructing Karel, a robot, to move, pick up a beeper, place a beeper, and turn off.
KAREL was developed as an educational tool to teach programming language elements to students studying robotics.
KAREL has since evolved into the primary FANUC programming language for robots and robot controllers. This powerful CNC programming language is extremely versatile.
SuperKarel understands two commands that regular Karel does not: turnAround() and turnRight ().
Thus, the correct option is C.
For more details regarding KAREL, visit:
https://brainly.com/question/13278951
#SPJ5
mightier than the waves of the sea is his love for you
cool but kinda creepy ngl
write a program to print. *
**
***
****
*****
Program:-
[tex]\tt for\:i \:in\: range(2,6):[/tex]
[tex]\tt\quad for\: j\: in \:range(1,i+1):[/tex]
[tex]\tt\quad\quad print("*",end='')[/tex]
[tex]\tt\quad print()[/tex]
Output:-
[tex]\tt **[/tex]
[tex]\tt ***[/tex]
[tex]\tt ****[/tex]
[tex]\tt *****[/tex]
how to send an email without showing recipients outlook
Answer:
Outlook. When you open a new blank email in Outlook, click on the “Options” tab. From there, you'll want to select the Bcc field in the message header. This is your “blind carbon copy” option, meaning that your email recipients will not see other names on the list.
Explanation:
What is the output for the following program?
numA = 4
while numA <12:
numA = numA + 3
print(numA)
Output:
Answer:
13
Explanation:
int numA = 4;
whilie (numA < 12){
numA += 3;
}
System.out.print(numA);
numA numA < 12
4 true ⇒ numA increases by 3, loop continues
7 true ⇒ numA increases by 3, loop continues
10 true ⇒ numA increases by 3, loop continues
13 false ⇒ loop stops, program them prints out value of numA
You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable
Answer:A. A default Variable
Explanation:
Answer:
A
Explanation:
Did it on a Test
In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
True or False (Give Explanation)
Answer:
False
Explanation:
John Wilder Tukey was an American mathematician and statistician, best known for the development of the Fast Fourier Transform (FFT) algorithm and box plot. The Tukey range test, the Tukey lambda distribution, the Tukey test of additivity, and the Teichmüller–Tukey lemma all bear his name. He is also credited with coining the term 'bit' and the first published use of the word software.
Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.
Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "
What is Get-childitem command?Get-childitem command in computer applications is used to get the items in specific locations.
Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.
Similarly, the Get-member command used to gets the members, the properties, and methods of files.
Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member
Learn more about Computer commands here: https://brainly.com/question/25243683
PLEASE I NEED HELP ASAP PLEASE PLEASE!!!
For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.
Answer:
Following are the program in the Python Programming Language
#set variables to 0
positive_sum=0
negative_sum=0
#print message
print("Enter 0 to terminate")
#set the while loop
while(True):
#get input from the user
num=float(input("Enter positive or negative numbers: "))
#set if statement to check condition
if(num==0):
break
elif(num>0):
positive_sum+=num
else:
negative_sum+=num
#print output with message
print()
print("sum of positive numbers: ", positive_sum)
print("sum of negative numbers: ", negative_sum)
Output:
Enter 0 to terminate
Enter positive or negative numbers: 1
Enter positive or negative numbers: 3
Enter positive or negative numbers: 5
Enter positive or negative numbers: -7
Enter positive or negative numbers: -2Enter positive or negative numbers: 0
sum of positive numbers: 9.0
sum of negative numbers: -9.0
Explanation:
Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.
Then, we set the while infinite loop inside the loop.
Set a variable "num" and get input from the user in it.
Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.
Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"
Otherwise, add that input and store in the variable "negative_sum".
Finally, we print the output with the message.
In an attempt to reach an all-time record for its premier, ads for the highly anticipated Avengers: Endgame are run on all the major networks and cable stations across the country from 8:00 p.m. to 10:00 p.m., or during ________ time.
Based on the contextual situation, the cable stations across the country from 8:00 p.m. to 10:00 p.m., or during Late-fringe time.
What is Late-Fringe Time?Late Fringe time is a term used in television that describes the television hours that follow the prime time.
Generally, the prime period is usually between 8:00 p.m. to 10:00 p.m., while the Late Fringe time is around 11 p.m. to 1 a.m.
Hence, in this case, it is concluded that the correct answer is "Late-Fringe period."
Learn more about Television hours here: https://brainly.com/question/1006994
What does the Finder do?
locates files
organizes computer folders and files
opens applications
empties the Trash
deletes files
turns off the computer
about how many smart devices are active today coinbase
Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.
What is Smart Device?Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.
Examples of Smart DevicesSmart devices generally include the following:
SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.Hence, in this case, it is concluded that the correct answer is 21.5 billion.
Learn more about Smart Device here: https://brainly.com/question/24803254
Explain how analog computers are used to process data generated by ongoing physical process
Pls help me plsssss
Answer: drawright(30)
Explanation:
Does anybody have the answer for 2.19.6 checkerboard for codehs??
Answer:
speed(0)
penup()
setposition(-200,-200)
pendown()
def draw_square_row():
color_value = 0
for i in range (10):
if color_value %2 == 0:
begin_fill()
color("red")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
elif color_value %2 == 1:
begin_fill()
color("black")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
def draw_square_row_2():
color_value = 1
for i in range (10):
if color_value %2 == 0:
begin_fill()
color("red")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
elif color_value %2 == 1:
begin_fill()
color("black")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
def move_up_a_row():
left(90)
forward(40)
right(90)
backward(400)
for i in range (5):
draw_square_row()
move_up_a_row()
draw_square_row_2()
move_up_a_row()
Explanation:
tell me if you get it right
Additional Activities Direction: List down all the safety and work procedures in using newly purchased gadget. Write your answers on a separate sheet of paper.
Answer: Keep your phone away from your body and head. Turn off your phone or turn on airplane mode at bedtime. Use headsets, preferably air tube, and speaker phone when possible. Don't carry your cell phone in your bra, shirt, or front pants pocket, especially if you're pregnant.
Explanation:
what is font tag? write the name of attribute which is used in font tag
Answer:
The font tag is used to change the color, size, and style of a text.The font tag is having three attributes called size, color, and face to customize your fonts. To change any of the font attributes at any time within your webpage, simply use the <font> tag.
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge
why does my ps4 keep disconnecting from the internet
Answer:
It could be a variety of reasons depending on your form of connection. Wireless, it could be distance from router causing packet loss or disconnection. Wired, damaged or poor wire, or bad internet. What do you know about your connection?
Is this statement true or false? While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. True false.
Considering the Microsoft PowerPoint application, it is False that while in slide show mode, if you are not careful, you can close the application by clicking the X on the menu bar.
Why is it False?During the slide show of documents whereby the pages of documents are being passed or moved automatically, or by itself, when a user mistakenly or intentionally presses the X on the Menu Bar, the window will ask the user if he wants to save the document before closing.
Slide show in Microsoft PowerPoint is one of the techniques in which a user or Speaker can make a presentation to the audience.
Hence, in this case, it is concluded that the correct answer is False.
Learn more about Microsoft PowerPoint here: https://brainly.com/question/14388120
Answer:
"False"
Explanation:
I took the test!
What number is represented as a binary code of 101110
Answer:
46 i think
Explanation:
sorry if thats wrong
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.
Answer:
a hypothesis that forms into a question.
Explanation:
A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of customers in their forties (ages 40 to 49).
What is the missing line of code?
customerAges = [33, 23, 11, 44, 35, 25, 35, 68, 51]
count40s = 0
for item in customerAges:
_____;
count40s = count40s + 1
print("Forties:", count40s)
if 40 > item > 49
if 40 < item < 49
if 40 <= item <= 49:
if 40 >= item >= 49
Answer:
if 40>= item >=49
Explanation:
The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted
Answer:
D
Application
System software is the set of programs that enables your computers hardware devices and Application software to work together.
Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)
Explanation:
One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.
One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.
Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.
Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.
So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.
Learn more about structured programs here:
https://brainly.com/question/25770844