Answer:
Correct aliasing is very useful when you provide or insert a new value Say you have the c= (2,3,4,5) You do c= lst.pop(2)Now the new c doesn't have 4 such that (2,3,5)Why it is not recommended to add sound effect on slide transition? Write at least two reasons.
Answer:
It could make the viewers of the slide confus.
It could make the viewers not think your dont carde.
Explanation:
Write query to display 5 characters from the 2 nd left character onwards of the string ‘Practices'.
The following code is in C++
#include<iostream>
using namespaces std;
int main( ){
char c[] = "Practices";
for( int i =1 ; c[i] != '\0' ; c++ )
{
cout<<c[i];
}
return 1;
}
The following code will print : ractices .
Hence, this is the required solution.
which of the following is an example of a boolean operator
A.
B. SEO
C. HTML
D. BUT
The option that is an example of a boolean operator is D. BUT
What is boolean operator?A boolean operator is a logical operator that evaluates an expression and returns a boolean value (either true or false) based on the conditions specified in the expression. There are three main boolean operators:
AND operator (&&): It returns true if both the operands are true, otherwise it returns false.
OR operator (||): It returns true if either of the operands is true, otherwise it returns false.
Learn more about Boolean on
https://brainly.com/question/1675220
#SPJ1
which of the following is an example of a boolean operator
A.< TITLE
B. SEO
C. HTML
D. BUT
The material (text, pictures) to be put into a document is called________________
Please help me
ME ARMY HALPPP!
Answer:
Inline (my guess)
Hope this may help u
Which best describes the Quick Access toolbar and the ribbon tabs?
Answer: D
Explanation: The Quick Access Toolbar is customizable, and the Ribbon tabs are collapsible.
Answer:
d
Explanation:
is it okay if i call you my prada bae?
(take me serious :3)
Why was 1990 an important year regarding air quality?
The United States took first steps to keep the air clean.
The United States created the Environmental Protection Agency.
Modifications and improvements were made to the Clean Air Act.
Funding was established under the Clean Air Act to study air pollution.
Answer:
It's C
Explanation:
Answer:
Its Modifications and improvements were made to the Clean Air Act. Or C
Explanation:
true false.
(c) In Animate, only one layer
can be activated at a time. ( )
PLZ HELP ME IN MY STUDY
Answer: true
Explanation:
want some points you get some also stay away from people
Answer:
lol
Explanation:
thank YOUUUUUUUuuuuuuu
__________ are organizations of special interest groups that solicit contributions from donors and fund campaigns to help elect (or defeat) candidates based on their stances on specific issues. Group of answer choices
Answer:
The appropriate approach is "Political action committees".
Explanation:
Committees created among moneyed interests to donate to presidential campaigns that are inclined to endorse whose stance regarding controversial factors. Due to various established campaign finance laws, Campaign contributions or PACs have been permitted to make contributions that are far greater just like groups of people would.Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate line. Expected Output:
3
6
9
12
15
18
21
Code:
num = 3
while num <= 21:
print(num)
num+=3
Output of code:
3
6
9
12
15
18
21
Explanation:
The condition num <= 21 will ensure that the program will only print multiples of 3 up to 21. We set num as 3 since we want to start printing from 3, and we add 3 each time to get the multiples.
Hope this helps :)
Ziad tells his son Marc: " This year my age is triple yours, but in 10 years, it will be the double". Find their ages.
Answer:
Ziad age would be like 30
Explanation:
10x3=30
Which of the following best describes the purpose of an IP address?
Answer: C
Explanation:
Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.
Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.
what is the size of 4th generation of computer and what language does they use?
Answer:
Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth-generation language (4GL), Fourth-generation computer programming language
(brainliest please)
Explanation:
The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this generation, time sharing, real time networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.
Fourth Generation
The main features of fourth generation are −
VLSI technology used
Very cheap
Portable and reliable
Use of PCs
Very small size
Pipeline processing
No AC required
Concept of internet was introduced
Great developments in the fields of networks
Computers became easily available
Some computers of this generation were −
DEC 10
STAR 1000
PDP 11
CRAY-1(Super Computer)
CRAY-X-MP(Super Computer)
Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHING!!!HELP PLZ!!
Explanation:
You may try opening the Brainly website using your browser's incognito mode. In other words,
Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.
However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.
A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a synthetic material?
A. cotton
B. nylon
C. jute
D. silk
E. linen
I need this answer please!! 20 points
Answer: A.
Explanation:
Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin working on what part of her slide?
Answer:
The next step is creating the layout and template style
Explanation:
As we know that the power point presentation is used for preparing the slides i.e. easy for the company to describe them by adding the images, videos with sounds.
As in the situation it is given that the Rebbeca completed with the portion of the research and outline now the next and logical step would be that she could create the layout and the style of the template so that it looks attractive to the audience
Therefore the above represents the answer
how are you going to preserve cultural heritage you social practices even when using ICT ?
Answer:
Cultural heritage is central to protecting our sense of who we are.
It gives us an irrefutable connection to the past – to certain social values, beliefs, customs and traditions, that allows us to identify ourselves with others and deepen our sense of unity, belonging and national pride.
Answer:
In Slovenia, an interactive geographic information system shows information about important natural areas. Since 2008, the system is available online also via an interactive map. The Slovenian Register is one of the most comprehensive and advanced tools in the EU, and can serve as an inspiration for other countries and regions aiming to improve digitisation of natural and cultural heritage.
Source: CD-ETA E-bulletin
Cheers! :)
What is one disadvantage of transmitting personal data using digital signals?
A. The data cannot be accessed by other computers.
B. The data could be accessed or stolen.
C. The data are easily changed into different data.
D. The data can be changed by being transmitted.
Answer: The answer to your question is B i hope this helps
the reason for this is because useing digital signals can be hac,ked or accessed by another person so there for you maybe have to use another way.
Explanation:
i hope this helps if it does have a brilliant day and have a smile
You were issued a certificate on March 1st 2015 for your secure Web server. The validity period is three years and the renewal period is four months. What is the earliest date you can renew this certificate
Answer:
November 1, 2017
Explanation:
Given that the end of the three year validity period will be 1st of March 2018. And with the renewal period being four months.
This implies that to renew the certificate one will have to do it at least four months before the validity period elapsed.
Hence, in this case, the correct answer is November 1, 2017
Which of the following statements is true?
O Secondary storage stores data for short periods of time.
O A hard drive is an example of secondary storage.
O The CPU holds instructional data for programs.
Audio data is saved to a computer's CPU.
The statement true for the secondary storage device, is that hard drives are the example of secondary storage. Thus, option B is correct.
What is a secondary storage?A secondary storage in the computer system is given as the non-volatile form of the storage media that has the ability to form the storage without being connected to power.
The secondary storage can be of solid state, optical and magnetic storage devices. Hard drive is the example of magnetic secondary storage devices. Thus, option B is correct.
Learn more about secondary storage, here:
https://brainly.com/question/86807
#SPJ2
Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pages that deal with other types of electronic gadgets. Where should he place the hyperlinks in the web page?
Answer:
at the bottom of the web page
Explanation:
Ben is creating a web page content for the gaming gadget that has been newly launched. He uses hyperlinks so that the visitors can navigate the web pages properly which deals with some other electronic gadgets also. So Ben should place the hyperlinks at the bottom of the web page as it will provide anyone viewing the web pages easily.
Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5 si 9 se va afisa "al doilea copil e mai mare cu 4 ani"
Answer:
primul_copil = int(input("Introduceți vârsta primului copil: "))
aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))
def copilmai_mare(varsta1, varsta2):
if varsta1 > varsta2:
diferenta = varsta1 - varsta2
print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )
else:
diferenta = varsta2 - varsta1
print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )
copilmai_mare(primul_copil, aldoilea_copil)
Explanation:
Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.
which member of the Jackson family was the spokesperson for the Psychic Friends Network.
Answer:
La Toya Jackson
Explanation:
rebecca smith was the top scorer in a women’s professional basketball league
Answer:
awesome
Explanation:
After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1
Answer:
10
Explanation:
you start with 5 5
you add 3 8
the variable is not odd so skip 8
the variable is even so add 1 9
the variable is odd so add 1 10
10
hope this helps <3
what is low level language
Answer:
The language which is spoken by low aged people is called as low level language
Answer:
A low level language is a language with few layers between itself and actual machine code.
Assembly is an example of a very low level language, where you're giving direct instructions to the processor. C is often called a fairly low level language as it gets compiled very directly into machine code.
By contrast, high level languages have many more layers between themselves and the processor. Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system. Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.
Who finds the exact web server that hosted the website by looking in a huge database of internet addresses
Answer:
The ISP - Internet service provider
Explanation:
The internet service provider ISP finds the exact web server that hosted the website by looking in a huge database of internet addresses.
An internet service provider (ISP) is a company that provides internet connection and services to individuals and organizations.
7.
A videographer wants a fast computer to use to edit video files. What does this customer need to
consider when selecting RAM?
Answer:
16GB RAM
Explanation:
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this
Answer:
Phishing
Explanation:
A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.
In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.