Answer:
You be respectful and pay attention
Explanation:
This applies to every interaction you should have! Be respectful and pay attention. You can show that you are paying attention by acknowledging what they are saying by making small, helpful comments (not interrupting) and asking good questions, not because you don't know, but because you want to understand more. And remember, teacher are paid to help you, don't be afraid to ask for help! Don't expect them to do everything for you though... ;)
If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?
50/8/2
50/8'2
50'8/2
50'8'2
Answer:
50*8/2
The asterisk is the multiplication sign and the parenthesis is the division.
I've never used an apostrophe for a multiplication sign before, but I'm guessing multiplication is what it stands for.
Explanation:
What will the following code print?
My width = 4
height = 12
perimeter = width * 2 + height * 2
print (perimeter)
perimeter = width * 2 + height * 2
width = 4
height = 12
perimiter = (4*2)+(12*2)
perimiter =8+24
perimiter =32
Since it displays perimiter, it would display 32
what is the answer i need help asap
Answer:
A
Explanation:
Transformers are used on power lines to take high voltage and powerful electricity and turn it into safe electricity.
Answer:
Transformer
Explanation:
It makes sense! A transformer like, changes the power, so if they needed to reduce the power, they use a transformer!
A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
True
False
Answer:
false
Explanation:
What does a virtual machine emulate?
Hardware
Networks
User interfaces
Web sites
What does a virtual machine emulate?
✒ AnswerHardware
Electronic mail can be sent and received through any ___________ account
Answer:
main
Explanation:
it must be your main account
A ____________ is a collection of infected IT devices that an attacker or attack group controls.
n the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.
In the bus topology, a hardware device called a terminators are used at each end of the cable to absorb the transmitted signal.
Which of the following is a feature of a utility program
a) It is unavailable to users
b) It is part of an integrated package
c) it is written by application users
d)it is considered to be systems software
The option that is a feature of a utility program is that it is considered to be systems software.
What is a utility program?Utility-programs are known to be any kind of program that carry out a particular task that is linked to the management of computer functions, resources, password protection, etc.
Some Features of Utility Software:
All the software can index folders and files in a matter of seconds. It often keep indexed records through database files, etc.Utility software are known to bee system software set up to help analyze, configure, optimize etc. on a system.
Learn more about utility program from
https://brainly.com/question/20659068
what is personal computing
Answer:
Personal computing means utilizing a computer that is located at the same work station where the input or output of data is conducted.
Explanation:
Pls, choose me as brainliest!
What bandwidth is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances?.
The bandwidth that is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances is Medium band.
What is Medium band?This is known to be a bandwidth that is often used in some particular leased lines to link up midrange computers and mainframes.
Conclusively, It is also used in moving data over any long distances. This bandwidth is is known to be very capable of doing any high-speed data transfer.
Learn more about bandwidth from
https://brainly.com/question/4294318
Q2. What is the process of file management?
Answer:
The process and act of creating an organized structure in which you store information for easy retrieval.
Explanation:
Different between data and information
Answer:
The difference is simple Look in explain part.
Explanation:
Data is the raw facts that needs processing.
Data is the inputed question or equation that the use
gives.
Information is the processed data that has a meaning.
It is the out put of the inputed data that we gave to the q
computer/device .
HOPEFULLY THIS WAS HELPFUL
When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
Answer:
Border
Explanation:
When adding a component to a container with the BORDER layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves
The probe that is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves is dedicated probe.
What is dedicated probe?A dedicated probe is known to be a kind of probe that has the ability to be or functions as both a probe and also as an access point that can give roaming to wireless users.
Note that a dedicated probe is often used to track the RF frequency that is mainly used for transmission. These probes often act as both an AP and a probe so as to look into the airwaves.
Learn more about probe from
https://brainly.com/question/2092614
______________________ can run on a workstation or server and is at the heart of all business applications.
Answer:
I believe the correct answer is Application Software.
Explanation:
When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process
Answer:
Drive-by download
Explanation:
The unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.
does anyone have experience with raptor
Answer:
yes, I have experienced with raptor
What occurs when a system produces incorrect, inconsistent, or duplicate data?.
Answer: Data integrity issues
Explanation:
Write a python code that prompts the user for a floating-point number and prints
the smallest integer that is larger than the number the user entered.
Answer:
glitched
Explanation:
brainly deleted my answer
How should I go about fixing this error in Java?
System.out.printIn("E");
^
symbol: method printIn(String)
location: variable out of type PrintStream
1 error
Answer:
use println with an L in stead of an I
Explanation:
In this font, the capital i can lowercase L look very similar. If you paste this in notepad, you can see you typed "print in", with an i.
It should be with an L as in print line.
HI I DESPRATELY NEED HELP i know this isnt about school but i really need help to turn get rid of a boot camp assistent, everywhere i look up how to it usually says
Start up your Mac in macOS.
Quit all open apps and log out any other users.
Open Boot Camp Assistant , then click Continue.
If the Select Tasks step appears, select “Remove Windows 10 or later version,” then click Continue.
BUT WHENEVER I TRY TO OPEN IT IT JUST OPENS THE FILES PLS HELP IM DESPRATE
Answer:
U can't remove it because it is a flash drive, so remove your flash drive and it will go away. Moreover you can't just erase those files if is the life of the computer. Anyways it if talking about rename it just click on rename.
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
The key would he use to create the digital signature is Mike public key.
Which key is used to sign messages?Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that uses a private key to encrypt signature-linked data.
The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.
Learn more about public key from
https://brainly.com/question/17486027
How many pages is 2000 words double spaced 12 font.
Answer: 8 pages
Explanation:
Which sentences describe the purpose of a magazine cover?
A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political,
economic, medical, ltechnology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or
store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.
The sentence that describe the purpose of a magazine cover is that a magazine cover has to visually appeal customers.
Based on the type of magazine brand, the cover also stands for social, political, economic, medical, technology, and fashion trends.What is the aim of a magazine cover?A key functions of the magazine cover is made so that it can sell the issue's inside features(stories).
The magazine cover is one that is very vital as it has a lot of short quotes or intriguing lines that is said to be floating about the cover page.
Learn more about magazine cover from
https://brainly.com/question/25817628
Answer:
A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political, economic, medical, technology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.
Explanation:
just took the test and did well youre welcome hope this helps
What are at least three common technologies used within this pathway?.
Multitasking , in a variety of environments, long distance communications
Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement
Answer:
The answer is Deterrent
Explanation:
Deterrent controls are administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to govern an organization's security execution. Deterrent controls are used to ensure that external controls, such as regulatory compliance, are followed. I hope this helps! ^-^
Will : 2*1*3 get tommyinit off of the screen or no explain your answer
Answer:
2 to the 1 to the 1 2 3 please get tommyinnit off my screen, yes
Explanation:
his unfinished symphony
what should you do if an online friend asked to meet you after school?
ᵖˡˢˢˢˢ...
Answer:
I'm going to agree if they had some decision when we meet to each other because I want to meet them in personal.
Explanation:
That's my own opinion
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company
The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.
What are some ways to handle against email phishing attacks?People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:
Be on guard towards the handing of sensitive information. Never click on alarming messages. Do not open any form of attachments that is suspicious or strange.Learn more about phishing attacks from
https://brainly.com/question/2537406