Help please
What is an ordered pair?
1. a type of font in Microsoft Word
2. the end of the x-axis on a coordinate grid
3. two numbers that tell the location of a point on a coordinate grid
4. a type of table located in the Table drop-down menu
Answer:
two numbers that tell the location of a point on a coordinate grid
Explanation:
Answer:
Two numbers that tell the location of a point on a coordinate grid.
Explanation:
An ordered pair would look like this
(0, 4) or (7, 2)
the first number would be on the x-axis and then the second would be on the y-axis
What is the correct method to reset the contents of the CMOS NVRAM on HP Desktop / Workstation computers after the AC power has been disconnected
It should be noted that in order to reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.
It should be noted that the non-volatile RAM simply means a complementary metal-oxide-semiconductor chip that can be found inside computers which is vital for storing information.
To reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.
Learn more about computers on:
https://brainly.com/question/24540334
What is an example of an outcome for a game?
A. trying to save the world from an evil wizard
B. rescuing Princess Peach from Bowser
C. playing an ocarina to teleport across the land
D. pressing Up, Up, Down, Down, Left, Right, Left, Right, Start on a controller as a “cheat code” to gain extra lives
Answer:
B
Explanation: I play alot of ####### NIntendo games!!!!!!
Answer:
b
Explanation:
what hash format are modern windows login passwords stored in?
User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.
What are the windows?Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.
A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.
Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.
Learn more about the windows, refer to:
https://brainly.com/question/13502522
#SPJ5
16. If a user can make modifications to database objects, what permission has that
user been assigned?
A. Update
B. Alter
C. Create
D. Select
B
Explanation:
The Alter command is used when we want to modify a database or object contain in database.
what is a saved link to a particular web page?
Answer:
A bookmark
Explanation:
A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.
i need freinds.:(plz
Answer:
Explanation:
sure wassup
Answer:
i'll be your friend!
Explanation:
how to check amazon gift card balance without redeeming
Answer:
Follow these steps to check your Amazon gift card balance without redeeming.
1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.
2. Sign in to your Amazon account. You can sign in through the website or the mobile app.
3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.
4. Click 'Help and customer service'. This option is located at the top of the screen.
5. Talk to a customer support agent.
Mobile app:
Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.Computer:
Click 'Something else'.Click 'I need more help'.
6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.
7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.
what is the full form of Blog
how does microsoft label mac addresses in the windows utilities that show you the mac address?
Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."
What is MAC Address?MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).
MAC address is used as a network address in communications within a network component.
There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.
Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."
Learn more about MAC Address here: https://brainly.com/question/24812654
Even though it would be convenient to build a network with only one transmission medium, why wouldn't it be practical for big corporations?
A.
because they have far too many hackers breaching their security on a daily basis for only one transmission medium
B.
because they prefer a fancier network to match their elite reputation
C.
because they require a combination of transmission media types to function properly
D.
because with such large user-bases, they couldn't afford to build a network with only one medium
The reason why it wouldn't be practical for big corporations to build a network with only one (1) transmission medium is: C. because they require a combination of transmission media types to function properly.
A big corporation can be defined as a corporate organization that has facilities and owns (controls) assets that are used for the manufacturing of goods and services in at least one (1) country, other than its headquarter (home office) located in its home country.
This ultimately implies that, a big corporation is a corporate organization that owns (controls) its business operations in two or more countries.
In light of the above, a big corporation require a combination of multiple transmission medium or transmission media types such as the following, in order for them to function properly, effectively, and efficiently:
Fiber-optic cableTwisted pairDigitalAnalogueRead more on transmission media here: https://brainly.com/question/7120023
which function would you use to change the appearance of data in a cell from decimal to percentage
Answer: use the numbers behind the decimal for the percentage
Explanation:
Answer:format
Explanation: I took the test
EASY 15 POINTS IF YOU CAN HELP
What is the value of the variable named result after this code is executed?
numA = 3
numB = 2
result = numA ** numB
A. 5
B. 9
C. an error has occurred
D. 6
Answer:9
Explanation:
The value of the variable named result after this code is executed "numA = 3 numB = 2 result = numA ** numB is 9.
What does value mean?The value of an output is known to be the sum or the monetary worth of that thing.
Note that looking at the variable of the code that is executed "numA = 3 numB = 2 result = numA ** numB, we can say that the output is 9.as one can ger it when 3 multiplied itself twice.
Learn more about value from
https://brainly.com/question/843074
#SPJ2
Pls help me I beg u
Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan’s smartphone to overheat?
A. Bluetooth receiver is causing the smartphone to overheat.
B. The smartphone is located too close to the car’s heat vent.
C. The GPS receiver is causing the smartphone to overheat.
D. The screen has been active too long.
Answer:
I think A Bluetooth receiver is causing the smartphone to over heat
Type the correct answer in the box. Spell all words correctly.
Which method of cooking does the following passage describe?
makes use of a flat-topped plece of equipment to quickly cook food products.
Answer:
I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.
Explanation:
Which CPU characteristic when enabled, doubles the number
of instructions which can be processed at once?
Answer:
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s. Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.
The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.
Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated devices are variously calledmicrocontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called “cores”; in that context, single chips are sometimes referred to as “sockets”. Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central.
1. Explain 'Computer Ethics" ?
plz following me
Answer:
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.
Explanation:
Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially.
Required:
Which character can he type after each command to have them run one after the next without requiring further input from him?
Answer:
um
Explanation:
what subject is this again?
Help to draw in turtle. Python
Answer:
a basic piece of code:
from turtle import *
color('red', 'yellow')
begin_fill()
while True:
forward(200)
left(170)
if abs(pos()) < 1:
break
end_fill()
done()
Explanation:
What its doing is The TurtleScreen class defines graphics windows as a playground for the drawing turtles. Its constructor needs a tkinter.Canvas or a ScrolledCanvas as argument. It should be used when turtle is used as part of some application.
The function Screen() returns a singleton object of a TurtleScreen subclass. This function should be used when turtle is used as a standalone tool for doing graphics. As a singleton object, inheriting from its class is not possible.
All methods of TurtleScreen/Screen also exist as functions, i.e. as part of the procedure-oriented interface.
RawTurtle (alias: RawPen) defines Turtle objects which draw on a TurtleScreen. Its constructor needs a Canvas, ScrolledCanvas or TurtleScreen as argument, so the RawTurtle objects know where to draw.
Derived from RawTurtle is the subclass Turtle (alias: Pen), which draws on “the” Screen instance which is automatically created, if not already present.
All methods of RawTurtle/Turtle also exist as functions, i.e. part of the procedure-oriented interface.
Where are 'if' and 'else' statements shown when printing a document in a word processor?
Answer the question and then your task is to:
Write an algorithm or sequence of instructions that include the IF statement for the document being printed.
Explanation:
cpt price
3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites
Answer:
f. Static website
Explanation:
HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.
HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.
Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.
Please help please help
Answer:
Bonjour,
Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.
Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…
Merci
Bien cordialement
Az
ExplanationBonjour,
Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.
Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…
Merci
Bien cordialement
Az:
I
What is a Watermark?
How many things can a computer compare at one time?
Answer: billion of items at one time
Explanation: The computer is very capable of comparing items bulk at one time
What is my mistake on this code? (Python)
Answer:
Explanation:
bakugo;sup shoto i didnt know you go on here too
the coding has no problems just go and get deki kaminary
HELP ME PLEASE
explain 2 threats to data that can arise when a pc is not connected to the Internet
Explanation:
Threats
Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats
Types of Computer Security Threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Tips for Best Computer Security
For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.
You arrive at school on Friday for a field trip ! What a lucky day!You need to figure out what room you are in before leaving. You notice there are rosters on each door . What do you do to find your correct room?
If the roster were sorted alphabetically by last name , would that change how you found your correct room ?
Answer:
Look for the first letter of your last name
Explanation:
You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.
Answer:
I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.
Explanation:
Your Welcome
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply.
The two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:
1. Datagram
2. IPv6 tunneling
An IP address is an abbreviation for internet protocol address and it can be defined as a unique number that is assigned to a computer or other network devices, so as to differentiate them from one another in an active network system.
In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;
Internet protocol version 4 (IPv4)Internet protocol version 6 (IPv6)IPv6 is the modified (latest) version and it was developed and introduced to replace the IPv4 address system because it can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.
Furthermore, the two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:
1. Datagram
2. IPv6 tunneling
Read more on IPv6 here: https://brainly.com/question/11874164