if you hard working right now go to this EASY question


#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work

Answers

Answer 1
Ok, where is the question so I can try my best?
Answer 2
Whats the question??? Lol

Related Questions

Multiple Select Which conditions make using an array a better choice than a list? Select 3 options. when your list would contain a mixture of numbers and string values when you have a very large quantities of numeric data values when all your data are string when you will do a great deal of arithmetic calculations when efficiency is of great importance

Answers

When you have a very large quantities of numeric data values

When you will do a great deal of arithmetic calculations

When efficiency is of great importance

The conditions that make using an array a better choice than a list are:

When you have very large quantities of numeric data valuesWhen you will do a lot of arithmetic calculationsWhen efficiency is of great importance

What are arrays?

An array is a set of items, images, or numbers arranged in rows and columns. Any set of rows or columns is referred to as an array. Examples of arrays include rows of seats for a recital, rows of cards laid out for the game of Memory, and rows of numbers in an Excel spreadsheet.

It is important to think of an array as a collection of variables of the same type even though it is used to store a collection of data. An array is a group of identically data-typed elements kept in consecutive memory regions.

Therefore, the correct options are B, when you have very large quantities of numeric data values, D, when you will do a lot of arithmetic calculations, and E. When efficiency is of great importance.

To learn more about arrays, refer to the link:

https://brainly.com/question/13107940

#SPJ5

Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.

o Passwords should be used only once.
o It could be easily guessed.
o Passwords must be unique.
o It contains insufficient personal information.
o Passwords should be changed regularly.

Answers

Answer:

it could be easily guessed

All of them except C

You get an email from your project manager asking you to review the month's sales data. This is an
example of:
A globalization.
B delegation
C amplification
D disinformation

Answers

Answer:

delegation

Explanation:

Which of the following binary numbers is equivalent to decimal 4?

A. 10
B. 100
C. 1010
D. 1111

Answers

Answer:

b so easy

Explanation:

Answer:

B. 100

Explanation:

Which command do you use to save a document with a new name? Choose the answer.
Save As
Save New
Save Type
Save​

Answers

Answer:

Explanation:

Most word processors use Save As which not only allows you to save with a different name, but the root can be changed as well. I use LibreOffice write. Its Save As Command allows you to change the name from say J1 to Jerome and also to save the document in many of the word formats. That last ability is really important because some people only have Microsoft products. On my old computer, I have Microsoft Word 2000. If I want to transfer files, that is how I have to save the file.

Which of the following is true about file formats?

Answers

It’s lil uzi Fer debí Moo cosmo I
234
Me

Answer:

i feel like the answer to this question would be ''Free file formats may be either open or closed.'' If  i'm wrong, plz let me know ^^

Explanation:

Which of the following is NOT true about data?
A. It is information processed or stored by a computer
B. It is stored and processed in decimal format
C. It can be in the form of figures, texts, images or other types of
information
D. It can be transferred from one computer to another

Answers

Answer: B. It is stored and processed in decimal format

============================================================

Explanation:

Choice B is not true because data is stored and processed in binary format. This is in the often talked about format of 1s and 0s. Binary is preferred because computers are built upon electronic circuits. If an electrical current is passing through a certain node, then you can represent this with 1 for "on", while no electricity would be 0 for "off". Think of a series of switches you can flip up or down. Chaining together 1's and 0's allows us to represent pretty much any kind of thing we want from documents, to pictures, to movies to videogames. The 1's and 0's can represent instructions of a program (aka computer code) or it could represent raw data such as an image file.

In short, data is not stored and processed in decimal format. It's represented in binary instead. Binary is base 2 consisting of the digits 0 and 1. In contrast, decimal format deals with the digits 0 through 9.

who like the videos where is clown is from :)

Answers

Answer:

i hate clowns alot especially pennywise lol

Explanation:

Which of the following is true of binary files?

Answers

Try using socrative to answer your question it’s really good

The statement which is true about binary files is:

A. They are associated with particular software programs

According to the given question, we are asked to select the statement from a list of answer choices which shows a correct statement about a binary file and its functions and characteristics.

As a result of this, we can recall that a binary file is one which has its files decoded by a program which has a good idea of how the formatting was done and certain information can be found.

With this in mind, the statement which is accurate about a binary file is that they are associated with particular software programs.

Therefore, the correct answer is option A.

Read more here:

https://brainly.com/question/23117620

Who should NOT apply for financial aid?

Students who will attend college part-time

Students whose annual family income is over $100,000

Students who will attend community college

All students should apply for financial aid

Answers

Answer: wealthy students should, not a must, apply for it. Not every student.

How does segmenting your network increase network security?

Answers

Answer:

By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.

Explanation:

PLEASE MARK ME AS BRAINLIEST

"During a context-switch, the process status word (PSW) of the running process is also saved." TRUE or FALSE?

Answers

Answer:

The answer is "True".

Explanation:

In the processor status word, comprising all pointers into some kind of registry account, which must be stored whenever a context switch took place. In this, each size of a process is reduced through the use of lightweight processes in such a multitasking environment, and the entire process will save through the unique process ID.

Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.

Answers

Answer:

Set a time limit for herself. Ask her parents for help monitering her app usage.

"There are no longer mature industries; rather, there are mature ways of doing business," he is referring to the high demand of creativity and innovation in the market

Answers

Hi, you've asked an incomplete and unclear question. However, I provided the full text below.

Explanation:

The text reads;

"When Porter says “There are no longer mature industries; rather, there are mature ways of doing business,” he is referring to the high demand for creativity and innovation in the market. Earlier we used to be more concerned about the hardware and the physical product rather than its information content, But now as a business, we need to provide more informative content with the product.

Like General Electric offers dedicated customer service for its line of goods which differentiates it from its rivals. Similarly, shipping companies like UPS now offer us to track the location of our package on a live map. This is what we call a mature business and how we can differentiate ourselves and stand out in the highly competitive market by using Information and Technology..."

Which securities protects networks from intruders? *

Application security
Network security
Information security
Operational security

Answers

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

Answer:

Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis

One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios

1. to quickly combine multiple formulas from different cells into just one
2. to instantly compare results when data in numerous cells change to specified values
3. to conduct automatic complex statistical analysis on a range of cells
4. to constrain some cells to certain values so that the wrong data are rejected if entered​

Answers

Answer:

Option B, to instantly compare results when data in numerous cells change to specified values

Explanation:

Scenario setting with in the What If Analysis is used to compare various scenarios with in the same excel sheet. Scenarios has set of values that are saves and updated automatically as the values with in the cell changes. Also the scenarios can be switched.

Hence, option B is correct


Which of the following is document content that displays at the top of every page?
Choose the answer.

style set

footer

header

title

Answers

Answer: Header/Title

Explanation:

does anyone now how to make an app on code.org????
i’ll pay you if you can do it for me!!

Answers

Answer: Honestly, code.org wont get you far. I recommend you get a IDE and pick a language to learn.

I would be happy to help you im not going to make it for you but i can help walk you thought it. I know a little bit of code.org had to make something in it last year.



Horatio would like to use the category functionality contained within Outlook 2016. Which option should he choose to be able to rename categories?

Answers

Answer:

Items that are associated with one another as a group can be categorized by assigning colors to the group for easy identification in Microsoft Outlook

The different colors used includes; Yellow, Blue, Red, Green, Purple, and Orange

in order to rename a category choose the 'All Categories...' option among the options in the Categorize menu, to display the 'Color Categories' dialogue box

Within the 'Color Categories' dialogue box, check the box next to the desired color of the category and select rename

Type in the new name of the Color Category

With the check box next to the Color Category of the items that are currently selected and displayed in outlook, select 'OK' to assign the Color Category to the items

Explanation:

You are the leader of your school's Go Green Club, which supports environmentally friendly choices and lifestyles. Your club will represent your school in the forthcoming annual Green City competition. The school coordinator has allocated a fixed budget and a timeline of 30 days to design an ID card format that closely represents the club's theme, and to send it back to him for approval.

To get the desired creative effect, the school coordinator advised you to use desktop publishing software to create the card design and to produce them later, in the required numbers. You'll create the ID cards for the members with desktop publishing software. In your answer, mention the software you’ll use and describe the steps you'll follow to create the ID cards.

(Hint: First identify the audience, timeframe, and limitations of the task, if any. Then, identify the hardware and software to create the ID cards. Lastly, create and finalize the formatting techniques and templates for the ID card.)

Answers

Answer:

(Answers may vary.)

My Considerations

The Go Green Club has a total of 100 members. I plan to photograph each of them in front of our club's "Go Green" sign. I have a deadline of 30 days to deliver the ID cards. Therefore, I have to ensure that all the cards are printed and ready for delivery in 20 days, with 10 days of buffer time (in case the cards require any edits or changes). Additionally, after I have submitted the draft for review, I will need the coordinator's final approval on the design and layout of the ID card.

Hardware Requirements

a desktop computer or laptop with adequate memory to run the software to create the ID cardssome external storage devices, such as pen drives and DVD disks, to share the design and layout for the coordinator to review; I will also need these devices to store the final digital file for printa color scanner to scan hand-drawn artwork and signatures, which I will place on the ID carda digital camera to capture photos of members, and to transfer them to the computer/laptopa printer to make hard copies of the cards.Software Requirements

I intend to use Scribus to create the ID cards because it is a free DTP application, and has most of the common features I'd need to create an ID card.

Formatting Techniques

I plan to use the following techniques to design the club ID cards.I'll use the landscape or horizontal orientation. This will enable proper spacing for the ID card elements.I'm planning to use a card measuring 3.370 inches × 2.125 inches. A card this size will ensure that all the elements of the card are visible.I am planning to place the club logo on the top left corner, because the eye normally follows the path of the letter Z. This'll help the viewer to see the logo and identify/recognize the club.Next I'll place the club name; I'll use the top-center alignment and also vertically align it to the logo. I'll use the sans serif font for the club name.Following the Z-path rule, I'll place the member's photo to the right and the member's name under the photo. In this position, the photo and the name will be visible, and will not get mixed up with other elements. I'll print the member name with a serif font.Finally, again in line with the Z-path rule, I'll position the club seal and the club director's signature at the right lower bottom. Although these elements are essential on an ID card, they do not require as much viewer attention as the club logo, name, and member photo.

Explanation:

I used Canva for this card.

which type of hazzard are those substances which threathen you physical safety ?​

Answers

Answer:

98o

Explanation:

My coding will not work. I don't know what the issue.

Answers

Can you give us a better and larger picture please?

How would you identify the cell located in column
Brow 12?
A. 12B
B. B12
C. B:12
D. 12:B

Answers

Answer:

B. B12

Explanation:

Edge2021

What is the maximum number of pixels per inch that the human eye can see on a smartphone
screen?
O 24ppi
O 60ppi
O 326ppi
O 500ppi

Answers

Answer:

326 i think

Explanation:

If y varies inversely as x, and y =23 when x=8, find y when x=4 .

Answers

I think u just divide y by two cuz the x value was divided by two

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

How do you write a multiplication formula in excel with an absolute refrence?

Answers

To multiply all the numbers in column A by cell C2, add $ symbols to the cell reference like this: $C$2, which you can see in the example below. Using $ symbols tells Excel that the reference to C2 is “absolute,” so when you copy the formula to another cell, the reference will always be to cell C2.

which description below would describe a library linked to a coding file?

1. Imagine to pull into your game.

2. A library helps you find errors in your code.

3. Pre-written function to be used over and over.

4. Books.

Answers

Answer:

2 im pretty sure

Explanation:

I just did this quiz and i got it correct so im pretty sure its 2 :D

Can anybody do Algorithm 2 for me (with Python).
Answer = 25 points.

Answers

Answer:

age=int(input("Enter age"))

if age>=18:

    print("You are Young")

else

   print("You are child")

Explanation:

if you have any query or any problem kindly ask in comment

is it safe for me to use normal glue to stick things on my laptop like stickers or pics?

Answers

Answer:

I think you should be fine, as long as you're just sticking it to the backside of your laptop. (For MacBooks, this is the part of the laptop with the apple symbol.) You can easily wash glue off with a cleaner such as Goo Gone or Pledge. There's better solutions, like ordering a case for your computer and putting the stickers on there, but I guess it's fine to stick them onto your computer. I'll attach a photo of an example of case with stickers.

Hope this helps! Feel free to give me Brainliest if you feel this helped. Have a good day, and feel free to comment any questions below you may have. :)

It is safe to use normal glue to stick things on my laptop like stickers or pics. On the back of the laptop cover, this glue can be used.

What are glues?

Any non-metallic substance applied to one or both sides of two distinct items that binds them together and prevents their separation is an adhesive, also known as glue, cement, mucilage, or paste.

superglue, sometimes called cyanoacrylate, is a kind of adhesive that joins quickly and may be used on a range of surfaces and materials. This fast-bonding glue has the advantage of eliminating the need for nails, clamps, and other fasteners. Superglues are waterproof, quick-setting, and will dry clear.

Therefore, stickers and pictures can be safely adhered on my laptop using regular adhesive. This glue can be applied to the laptop cover's rear.

To learn more about glues, refer to the link:

https://brainly.com/question/13225566

#SPJ2

Other Questions
PLZ HELP I NEED HELP 3RD GRADE MATH Jason bought 6 CDs to add to his collection. A week later he dropped half of his total collection in a pond. He only had 12 CDs left. How many CDs did he start with? a) monday & thursdayb) wednesday & saturday c) tuesday & saturdayd) saturday & sunday Help!!!! Due in 15 min!!!!!!! A pet store owner, Byron, needs to determine how much food he needs to feed the animals. Byron knows that he needs to order the same amount of bird food as hamster food. He needs four times as much dog food as bird food and needs half the amount of cat food as dog food. If Byron orders 600 packages of animal food, how much dog food does he buy? Let b represent the number of packages of bird food Byron purchased for the pet store. Cara monitors a snail in her aquarium. She notes that this morning it crawled 1 inch up the glass. A few hours later it crawled another 2 inches up the glass. Later it crawled 4 inches down the glass. How far is the snail from where it started? Escriba los tipos de textos con los que se a trabajado a lo largo del segundo quimestre y ponga un ejemplo de cada uno. A aguien que le ayan enviado la misma tarea que me ayude, no entiendo de que ejemplos habla. The equation needs to be fully factored and I need some help Multiply. Enter the product in simplest form.uIN=9/10 multiplied 2/5 Please answer question for my friend, Will mark brainliest.A bottle of orange juice says it contains 200 milligrams of vitamin C, which is 200% of the daily recommended allowance of vitamin C for adults. What is 100% of the daily recommended allowance of vitamin C for adults? Why does Dr. Kings Dream speech exert such a potent hold on people around the world and across the generations? PLEASE HELP WITH MY MATH ON MY PAGE/ACCOUNT Match the definition to the word. 1. the act of calling a prisoner to court to answer an indictment parliament 2. a rank held by commissioned officers bouquet 3. worn out completely; very tired arraignment 4. offering or providing help; functioning in a subsidiary capacity exhausted 5. a narrow strip of land connecting two larger masses of land isthmus 6. the national legislature of various countries, often composed of the nobility, clergy, and commons auxiliary 7. to invigorate, stimulate, elate lieutenant 8. flowers picked and fastened together in a bunch exhilarate Which expressions are equivalent to the perimeter of the shape? How do you know?a. x + 3 + 3x + 1b. 2x + 4 + xc. 4x + 4d. 2x + 2 + 2x + 2 What is the slope that is parallel to -2x + 7y = 12? what are two fractions that equal -7/10? The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send an packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure. a = IP() a.dst = 1.2.3.4 a.ttl = 3 b = ICMP() send(a/b) If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result. Jacques wants to make up packs of $0.45 comic books mixed with $0.75 ones to sell at $9.00 per pack. The number of $0.45 comic books is 4 more than the number of $0.75 comic books. Find the number of each type in the pack. A pair of shoes that originally sold at $30 is now being offered at a 25% discount.What is its present price? Select the correct answer.A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?A. by using flow controlB. by using cablesC. by using terminalsD. by using a larger IP addressPlease only answer if you are 100% sure