Answer:
import random
a = random.randint(1,10)
b = random.randint(1,10)
answer = a * b
print(str(b)+" * "+str(a)+" = "+str(answer))
Explanation: So I am guessing you are on Edhesive Module 2.5 Intro to cs. Sorry it took so long but hopefully this works.
When populating a motherboard with dimm modules, what configuration option will not work?.
Answer: mixing unbuffered with registered
Answer: Mixing unbuffered with registered
Explanation:
. George wrote a blog about playing baseball using a password-protected site. On his blog, George described his little league team and their season. He gave detailed descriptions of the location of each game and the full names and photographs of all the players on the team, including himself.
Which of the following risky blogging behaviors did George engage in? Check all that apply. (2 points)
He used a password-protected site.
He gave detailed information about the location of his little league games.
He posted pictures of himself and his teammates online.
He wrote on the topic of baseball.
Answer:
2 and 3.
Explanation:
They are both giving private information. The first one is good, there is no security risk in a website being password protected, actually quite the opposite. And writing on the topic of baseball has nothing to do with him specifically and gives no personal information.
The project team identified the completion of the first module to be the first significant event. The completion of Module One is a _____.
requirement
risk
stakeholders
milestone
The process of converting incoming physical energy into a neural code that can be processed is called
Transduction is known to be the process of converting incoming energy into neural activity.
What is transduction?Transduction is known to be an act that connote when a virus is said to move genetic items from one bacterium to another.
The steps in cell signaling process are:
ReceptionTransductionResponseNote that in Transduction, incoming energy is changed into neural activity.
Learn more about transduction from
https://brainly.com/question/7178782
I need help, please!
Select the three areas in which it would be most important for an instructional designer to be trained.
1. sales and marketing
2. business management
3. psychology
4. computer applications
5. educational theory
Answer:
business management
educational theory
sales and marketing
Explanation:
3 answers
The three areas in which it would be most important for an instructional designer to be trained may include sales and marketing, business management, and educational theory.
What are the roles of instructional designers?The roles of an instructional designer may be determined by the fact that they are paramount in the process of learning. They are tasked with redesigning courses, developing entire courses or curriculums, and creating training materials, such as teaching manuals and student guides.
In the above three mentioned fields, instructional designer gains an advantage over other professionals because it is the constructor of the field who manages how to work effectively and accordingly to the conditions. It encompasses creativity, communication skills, etc.
Therefore, the three areas in which it would be most important for an instructional designer to be trained may include sales and marketing, business management, and educational theory.
To learn more about Instructional designers, refer to the link:
https://brainly.com/question/30034454
#SPJ2
why do pepole get there question answered in 5 munities but for me its 7 FREAKING DAYS!?
question: https://brainly.com/question/26929057
In collaborative learning, the teachers teach by:
Answer:
Collaborating with the students and working with them in a hands-on learning environment.
Writing an UPDATE SQL statement is an example of a user engaging in the direct use of data warehouse. True False
Writing an UPDATE SQL statement is an example of a user engaging in the direct use of data warehouse is a true statement.
What does update SQL means?The UPDATE statement is known to be a kind of statement that is used to make changes to an existing records found in a table.
A data warehouse is known to be a form of an electronic system that is used for saving information in a way that is secure and making changes to the records in a data warehouse by Writing an UPDATE SQL statement is a part of its process.
Learn more about SQL from
https://brainly.com/question/25694408
Scott notices that one of the systems on his network contacted a number of systems via encrypted web traffic, downloaded a handful of files, and then uploaded a large amount of data to a remote system. what type of infection should he look for
Answer:
This is a behavior of a bot infection the bot was likely to contact command and control hosts then download updates and or additional updates and or additional data packages then upload data from his organization.
Explanation:
Income
Name
Popular
YES/NO
Production Worldwide
Budget(s) Income(5)
Profit
Tax
138.00
150.00
125.00
Spider Man
4 Ben Ten
5 The Avengers
Black Panther
120.00
450.00
400.00
200.00
247.00
7 Bat Man
91.00
100.00
• Doctor Strange
315.00
378.00
Jiron Man 3
200.00
248.00
50.00
100.00
49.00
113.00
10 Mr Maker
* Elmo
142.00
152.00
12 Ant Man
140.00
176.00
1) Thor
Answer:
what-
Explanation:
Explain working of any website.
[tex] \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ [/tex]
★Kindly Don't Spam ~
★ Thanks ~
Answer:
Code is responsible for websites working. For instance, when you click a button and something happens, there is a codeline telling the button to do that.
Hope this helps!
Answer:
The browser sends an HTTP request message to the server, asking it to send a copy of the website to the client (you go to the shop and order your goods). This message, and all other data sent between the client and the server, is sent across your internet connection using TCP/IP
Explanation:
Wope it Welps -,-
most people on scratch are under 18 true or false? scratch coding
Answer:
False
Explanation:
The Scratch Team has to be at least 18+ years to join. So this is false
Why does my playstation keep disconnecting from wifi?.
Answer:
because there might be a internet
problem
Explanation:
Which of the following is NOT a part of verbal communication?
O Sound
O Words
O Speaking
O Body language
Answer:
Body Language
Explanation:
Hope it helps!!!
Answer:
Fourth option
Explanation:
Verbal communication is basically any form of verbal communication between two or more people. Sound is making noise, you can communicate with a person using noise, words are the primary way of using verbal communicating a long with speaking. The best answer to this question is "body language" or the fourth option, body language isn't in any way verbal, it's more phycological.
Hope this helps.
Which html tag designates links to other web pages?.
Answer:
<a href>
Explanation:
I found the answer on a Quizlet.
I hope this helps!
The computer on the internet that operates like the traditional post office is called
Answer:
Email is a form of communication that acts as a traditional post office in a virtual sense
A ________ is a malicious piece of self-replicating code embedded within another program/computer called the host. (Hint: one word)
Answer:
A self-contained program that spreads through a computer network by exploiting security holes is called a worm A program with a benign capability that conceals another, sinister purpose is called a trojan horse
Explanation:
Microsoft® Access® manages which the following types of files? Question 3 options: Presentations Databases Images Texts.
Microsoft® Access® manages B. databases.
What does Microsoft® Access® do ?It is a relational database management system (RDBMS) that allows users to store and manage large amounts of data in an organized manner. Users can create tables to store data, relationships between tables to ensure data consistency, forms to enter and view data, queries to retrieve specific data, and reports to present data in a formatted manner.
Microsoft Access is commonly used in small to medium-sized businesses and can handle a wide range of data types, including text, numbers, dates, images, and more.
Find out more on Microsoft Access at https://brainly.com/question/24643423
#SPJ1
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity
Answer:
Firewall
Explanation:
Firewall software monitors all the network traffic going in and out of your device. If there is a suspicious website, then the Firewall Software blocks it, otherwise known to be added to the whitelist.
A corporation is looking to receive approval from its shareholders. The corporation needs to communicate financial information and the mission statement among other information. The corporation should _____.
A. Create a newsletter
B. Write a resume.
C. Create a type of business report called an annual report.
D. Write a business letter
Answer:
C
Explanation:
create a type of business report called an annual report
Which of the following is NOT correct concerning database design? Question 2 options: Identify all fields needed to produce the required information Group related fields into tables Determine each table's primary key Organize each piece of data into its largest useful part.
The option which is not correct concerning database design is identify all fields needed to produce the required information.
What is database design?
The database design is the arrangement of the data or the information, according to the model of database.
Let's check all the option one by one,
Identify all fields needed to produce the required information- This does not concern with the database design.Group related fields into tables-A relation database design consist of one or more than one related table. These tables are used together when the information is required.Determine each table's primary key- To determine the table's primary key, is the concern with the database design.Organize each piece of data into its largest useful part-The database design is the organization of data in the model of database.The option which is not correct concerning database design is identify all fields needed to produce the required information.
Learn more about the database design here;
https://brainly.com/question/25694408
(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Ion Column B a. An atom or molecule that has a positive or negative charge b. A value from 0 to 14 that is used to specify how acidic or basic a compound is when it is dissolved in water c. A compound that increases hydrogen ions (H+) when it is dissolved in a solution d. A compound that increases the hydroxide ions (OH-) when it is dissolved in a solution
Answer:
Follows are the matching to this question:
Explanation:
Column A Column B
1 c
2 d
3 b
4 a
Description of the matching:
In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution. In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+. In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.Answer:
Acid-A compound that increases hydrogen ions (H+) when it is
Base-A compound that increases the hydroxide ions (OH−) when it is dissolved in a solution
Ions- An atom or molecule that has a positive or negative charge
pH-A value from 0 to 14 that is used to specify how acidic or basic a compound is when it is dissolved in water
Explanation:
plz give brainly
What development in operating systems happened between the years 1990 and 2000?
Developers stopped creating GUIs.
Konrad Zeuse developed the Z1 computer.
Batch processing was used for the first time.
The Linux operating system was released.
Answer:
The Linux operating system was released is the correct answer.
Explanation:
Answer:
The Linux operating system was released.
Explanation:
Took the test
computer system is made up of computer hardware and software true or false
Answer:
true
computer system is made up of computer hardware and software.
Answer:
True
Explanation:
But Liveware is also a part of computer system
When working from within the Settings app, some applications include an Advanced options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks?
i. Setting the default app
ii. Terminating the app
iii. Resetting the app
iv. Uninstalling the app
v. all these can be done
Answer:
v. All these can be done
Explanation:
Found in a book
There are many things that can be done in the settings app.
Hope this helps! :)
At Yolanda's company, employees have some choice about the benefits they receive, up to a certain dollar amount. Since Yolanda has young children, she opts for childcare benefits, while her coworker prefers an extended wellness program with a health club membership. This is an example of __________ fringe benefits.
The above scenario is an example of cafeteria-style fringe benefits.
What is cafeteria-style fringe benefits?Cafeteria plan is known to be a type of fringe benefits that includes taxable gains such as cash and stock.
Note that the non-taxable benefits are said to be composed of health insurance, vacation days, etc. Yolanda's company is said to use cafeteria-style fringe benefits.
Learn more about fringe benefits from
https://brainly.com/question/1380397
How large is the screen for the fully digital dashboard on 2022 rogue platinum models?.
Which text style makes the text look slanted?
A.Bold
B.Capitalization
C.Footer
D.Italic
Answer:
D
Fonts in order of question:
A. Bold
B. Capitalized
and D
Italic
what is the difference page break and column break
Answer:
A column break forces text to the top of the next column; a page break forces text to the top
of the next page.
What is the first thing to consider when designing a website?
Answer:
name, theme, what your doing with it