please help me with this. this my past homework and it's already stressing me out ehehe so it would make me happy if someone helped me :DD , please help me with atleast 5? thank you sm!​

Please Help Me With This. This My Past Homework And It's Already Stressing Me Out Ehehe So It Would Make

Answers

Answer 1

Answer:

14. editor

8. managers

12. news

5. nameplate

10. dummy


Related Questions

whats your favourite dramas , suggest me some ...........​

Answers

Grownish, vampire diaries, inventing Anna

Which of the following best explains how the Internet is a fault-tolerant system?


A: The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.



B: The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.


C: The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer.


D:
The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible

Answers

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

A.) The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

A software repository, also known as a 'repo'

Answers

A software repository is a storage location for software packages. Often a table of contents is also stored, along with metadata. A software repository is typically managed by source control or repository managers.

I hope this helps

Different between barcode reader an biometrics device

Answers

Answer:

See below

Explanation:

Overall, scanning a barcode with a barcode reader simply tells you that it can be scanned by that particular reader and does not guarantee quality. While barcode readers are used to read codes, barcode verifiers are used to grade the quality of codes

A. Discuss the pros and cons of the use of arrays and parallel arrays and provide an example of a real-life equivalent to an array and a parallel array.

Answers

In array, the accessing part is very simple by the use of the index number.

What are the pros and cons of arrays?

Pros of array

The accessing part is simple.The array represents multiple data items that are of the same typeThe search process can be applied to an array easily.

Cons:

The number of elements to be stored in arrays should be known beforehand. An array is static. Insertion and deletion are difficult in an array. Allocating more memory than required leads to a wastage of memory.

Pros and Cons of Parallel array:-

Pros:

Parallel arrays are  utilized in languages that support solely arrays of primitive varieties Parallel arrays are straightforward to know and use.

Cons:-

They have very little direct language support.

Learn more about array on:

https://brainly.com/question/26104158

Write a 2 page paper explaining why a compiler needs to know about both the target architecture as well as the target OS.

Answers

The target architecture and the operating system are important to the compiler to perform high level executions which are made in programming language.

What is a compiler?

A compiler simply means a computer program that is important in the translation of codes that are written in a particular language to another programming language.

In this case, they're vital to perform high level executions which are made in programming language.

The target architecture also sets the framework for the planning and assigning of resources to reach a desired state.

Learn more about compiler on:

https://brainly.com/question/26175597

A.Direction: identify the following examples of the ingredients used for sandwiches.

Answers

Answer:

i dont know how to answer may module because i dont have helper

Write about how this item was important to you.

Answers

What is important to you

What are the different selection structures in the C programming language?

Answers

Answer:

SELECTION STRUCTURES

Selection statements allow you to control the flow of program execution on the basis of the outcome of an expression.

different selection structures are:

1)if statements

2)if-else statements

3)if-else-if statements

4)switch statements

Explanation:

THE IF STATEMENTS

the first statement in the if block is only executed when the specified condition is true.If the condition is false then the contained statement will be skipped and execution continued with the rest of the program.

example:

public class IfDemo

{

public static void main(String[] args) {

int age;

Scanner inputDevice = new Scanner(System.in);

System.out.print("Please enter Age: ");

age = inputDevice.nextInt();

if(age > 18)

System.out.println("above 18 ");

}

}

THE IF-ELSE STATEMENTS

if the specified condition in the if statement is false, then the statement after else will be executed.

example:

public class IfElseDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

if ( age >= 18 )

System.out.println( "above 18 " );

else

System.out.println( "below 18" );

}

}

THE IF-ELSE-IF STATEMENTS

the statements after else can be another if or if-else statement, multiple if-else statements.When the condition is true, the associated statement will be executed and remaining conditions will be bypassed.

example:

public class IfElseIfDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

if ( age >= 18 && age <=35 )

System.out.println( "between 18-35 " );

else if(age >35 && age <=60)

System.out.println("between 36-60");

else

System.out.println( "not matched" );

}

}

THE SWITCH STATEMENTS

It is a multi way branch statement. It defines multiple paths of execution of a program.It provides a better alternative than if-else-if statements.

example:

public class SwitchDemo

{

public static void main( String[] args )

{

int age;

Scanner inputDevice = new Scanner( System.in );

System.out.print( "Please enter Age: " );

age = inputDevice.nextInt();

switch ( age )

{

case 18:

System.out.println( "age 18" );

break;

case 19:

System.out.println( "age 19" );

break;

default:

System.out.println( "not matched" );

break;

}

}

}

The different types of selection structures in the C programming language are:

1) if statements2) if-else statements3) if-else-if statements4) switch statements

What is C programming language?

The sequence statement, selection statements (of which there are three variants: if, if...else, and switch), and repetition statements are the only three forms of control structures available in C++.

Due to the fact that C is compiled, it is a quicker language than Python. Since Python programs are interpreted, they typically run more slowly than C applications. When a variable is created in C, its type must be defined, and only values of that specific type are allowed to be given to it.

Therefore, the different selections of C programming languages are

1) if statements2) if-else statements3) if-else-if statements4) switch statements

To learn more about C programming language, refer to the link:

https://brainly.com/question/10937743

#SPJ2


Why is it pointless to expect cyberattackers to follow organizational legal measures?

A. because they do not abide by business rules and regulations

В. because they are obligated to the laws of the land

c. because cyberattackers are not legally held to the same standards as the common user

D because cyberattackers only exist virtually and therefore cannot ever be caught

Edmentum

Answers

Answer:

The answer is A.

What is the term given to large values of information collected from various sources?

A.
association
B.
classification
C.
neural networks
D.
big data

Answers

The term given to large values of information collected from various sources ; association.

What is the various?

The various can refer to a range of different things, depending on context. It could refer to different types of people, cultures, items, or anything else that can be seen as different or distinct from each other. It could also refer to different ways of looking at or doing something. For example, various methods of problem solving, various approaches to studying, various strategies for communication, etc. Ultimately, the various refers to the different options that exist in a given situation.

To learn more about various

https://brainly.com/question/26986135

#SPJ1

Line formatting can be accomplished by using..?

Answers

i did some research, and i found quite a few different answers. one of the most popular ones was the “border method” I also got “the space bar b, insert border c, and tab stops d. i am not very familiar with this stuff but i hope this helped!

what is communication​

Answers

Answer:

The transmission of information between two things?

step of opening browser on computer​

Answers

Regardless of which version of Windows you have, you can also open the browser from the start menu. Select the start button and type in Chrome. If the Chrome browser is on your computer, it will be displayed in the menu, where you can now see the icon and select it to open.

                                   <3

explain the importance of computer graphics?​

Answers

Answer:

Computer graphics are similar to the visual designs and textures we see in pc games and such everyday we use our computers. Just basically re-creatable images and re-creating images into art.

why are laptops more expensive than desktop with same features and power

Answers

It has the added feature of being portable but mostly laptop under perform desktops

1. A vehicle that is in bad shape is unsafe and costs more
to run than one that is maintained.
O True
O False

Answers

True
I believe that is the answer to the question

Answer:

True.

A damaged car costs repairs, and additional money and taxes to operate. A regular, undamaged car costs the original price.

I hope this helps!

How do I execute lines of script from Github? I already know how to execute javascript code but how do I execute it with python or any other type of code?

Answers

Umm you can get the code anytime


1. Welds made critical piping must be expertly
Completed, thoroughly inspected, and

Answers

Welds made on critical piping must be expertly​ completed, thoroughly​ inspected, and​ also at least as strong as the piping being welded.

What welding process is used on pipelines?

Welding processes are known to be the method that is used in a range of industries such as aerospace, automotive, energy, construction etc.

Pipe welding is known to be one that uses arc welding techniques, such as shielded metal arc welding (SMAW), gas metal arc welding (GMAW) and others. note that Welds that is done on critical piping have to be expertly​ completed, thoroughly​ inspected, and​ also at least as strong as the piping being welded.

Learn more about Welds from

https://brainly.com/question/5794222

Shandra recently bought a brand-new digital camera from a local camera shop but when she got it home, she noticed the lens was jammed. What would be an effective way for her to handle this situation?

Answers

return to the camera shop and bring the camera in. mention that the lens was jammed and she would like a refund. she should stay calm and handle the situation gently, as to not anger the shop keep. if she returns the camera and gets a refund then no harm no foul, no money or product was lost.
hope this helps :)

can i become a technichian

Answers

Answer:

yes you can...do a thorough research

What Was the first video game ever made? WORTH 98 POINTS

Answers

Answer:

Hello! :))

Your Answer is Pong.

Explanation:

It was  October 1958, Physicist William Higinbotham created the first video game. It was a  tennis game, similar to the classic 1970s video game Pong, and it was quite a success I must say. :D

I believe it is pong

Review Questions
1. Explain the difference between authentication and authorization.

Answers

authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files, and data a user has access to.

Write the syntax of GOTO, ON GOTO and IF THEN ELSE with examples.​

Answers

Answer:

GOTO:

goto label;

... .. ...

... .. ...

label:

statement;

Example:

/ Program to calculate the sum and average of positive numbers

// If the user enters a negative number, the sum and average are displayed.

#include <stdio.h>

int main() {

  const int maxInput = 100;

  int i;

  double number, average, sum = 0.0;

  for (i = 1; i <= maxInput; ++i) {

     printf("%d. Enter a number: ", i);

     scanf("%lf", &number);

     

     // go to jump if the user enters a negative number

     if (number < 0.0) {

        goto jump;

     }

     sum += number;

  }

jump:

  average = sum / (i - 1);

  printf("Sum = %.2f\n", sum);

  printf("Average = %.2f", average);

  return 0;

}

In your program, your ball dropped. What condition made the ball stop when it reached the origin of the axes you had drawn?

Answers

The condition that made the ball stop when it reached the origin of the axes you had drawn is the gravitational force that is of the interaction between two objects with mass.

What is the force that act on an object when you drop a ball?

The gravitational force is known to be a kind of interaction that exist between two objects with their mass.

Note that for a falling ball, the two objects with their known mass are said to be the Earth and also the ball. The power of this gravitational force is said to be proportional to the product of the two said masses.

Learn more about gravitational force from

https://brainly.com/question/72250

Answer:  while ball.pos.y > 0

Explanation: This is the aswer if you are looking fo the equation.

Write a console application that requests the user to enter the name of their Pet and the year their pet was born. Calculate the age of the pet and display the name and age of the pet.

Answers

Console applications are computer programs that run on text only interface

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This imports the date module

from datetime import date

#This gets the pet name

petName = input("Pet name: ")

#This gets the pet year of birth

petYear = int(input("Year of birth: "))

#This calculates the pet age

age = int(date.today().year) - petYear

#This prints the pet name and age

print(petName,' is',age,'years old')

Read more about computer programs at:

https://brainly.com/question/16397886

5. Height, weight, time, and distance are examples of what?

Answers

Answer:

They're examples of: Measurement of time.

Explanation:

distance or weight are examples of variable the varribles too

:) Hope this helps Let me know If I need to revise

height, weight, time, and distance are all examples of measurements.

Describe the different compents of QBASIC editor window​

Answers

Answer:

The QBasic Editor Screen has three parts. They are- Editor Window, Immediate Window and Output Window.

What is the function of network security
It protects information from users.
It protects networks from intruders,
It secures networks from users,
It protects users from networks,

Answers

It protects users from networks

and other data from breaches intrusion and other threats.

Answer:

it protects netorks from intruders

Explanation:

i took the test

Which of these is a correct example of the creation of a list in Python? A. names = [“James”, “Omar”, “Hazel”, “Lee”, “Mia”] B. names = (“James”, “Omar”, “Hazel”, “Lee”, “Mia”) C. list[names] = [“James”, “Omar”, “Hazel”, “Lee”, “Mia”] D. list(names) = (“James”, “Omar”, “Hazel”, “Lee”, “Mia”)

Answers

Answer:

A.

The round brackets () are called tuples. Tuples are another way of storing data, and are slightly different from lists.

Lists are changeable.

Tuples are not changeable outside their codeline.

Other Questions
(I NEED THIS ANSWERED NOW PLEASE) Zeros that follow non-zero numbers and are also to the right of a decimal point are ________ significant.fill in the blank please. A particular habitat has experienced many changes in environmental conditions over the last 75 years. Which is MOST likely a characteristic of a species that has the best chance to survive these environmental changes? In federal midterm elections, voters choose candidates who will run for president in the next election new Justices to replace those who have retired who will represent them in the House and Senate the candidates who will run for governor in their state help!! You see a large number of waves that are very tall. What is the appropriate wave description?A. Small frequency; small amplitudeB. Large wavelength; large amplitudeC. Large frequency; small amplitudeD. Large frequency; large amplitude What is the effect of repeating the phrase piano moan in the poem what is the main idea of natural change to the environment Escribe la funcin que representa cada situacin: PLEASE HELP I NEED BEFORE 11:59 Can someone explain how to do this cause Im confused Democracy DeniedIs this statement true or false?Japanese Americans were forced to relocate to guarded camps because they were becoming successful businesspeopletruetalse Please help. Solve the following system of linear equations by substitution. Show all work. Y= -24x -3y=18 Why does the author decide to retell even more passengers reactions to the ship hitting the iceberg? How is this style different from a newspaper article? A Night To Remember No lying help me please _________refers to the angle in which the artist uses to compose the artwork. good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated.the last row is 9 110,568220568220Calculate efficiently in your head. A cyclist bikes a certain distance in 25 minutes.How long would it take the driver of a car traveling 5 timesfaster than the cyclist to travel the same distance? 9 MULTIPLY BY 1 OVER 4 PLS HELP ^_^ What is 7.5 x2.7= show the work What is mRNA?A. Creates proteins on the ribosomeB. Transfers amino acids to the ribosome during protein synthesis C. Carries copies of instructions to make proteins from the DNA to the rest of the cellD. Carries amino acids to the growing polypeptide chain on the ribosome Why does king use this allusion? to compare two historic documents to urge patriotic responsibility to issue a call for action to state a moral dilemma