Answers

Answer 1
Self attribute skills

Related Questions

Can someone help me with this please

Answers

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.

Which visual aid would best support her topic?

Answers

Answer: a map showing the different sizes of the moon's craters

Explanation:

the reason for this is because the student wants to show what the surface of the moon looks like.

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

What type of information is appropriate for headers and footers? Check all that apply.

Answers

Answer:

C,  E,F,G  are correct

Explanation:

Answer:

C,E,F,G  are correct.

Explanation:

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware

Answers

It is a citation for the answer

Can you help me to write a code with functions,arrays,and pointers in c++?
It can be a basic game or an interesting program.
But a little bit complicated :)
Please I need help :(((​​

Answers

Answer:

Your search for complete and error-free projects in C and C++ ends here! Here, we’ve enlisted all the mini-projects, projects, games, software and applications built using C and C++ programming language — these are the projects published in our site or available with us at the moment. You can download all these projects (with source code) for free; make sure to check their individual post description as well.

First thing, most students learn C and C++ as their first programming language. They quickly become able to write programs that include functions, arrays and pointers, file handling and data structure, etc. But, when it comes to building a mini-game, an application, or a small project, incorporating all these features in one compact program becomes difficult.

In such case, reference projects always come in handy. The C and C++ projects published in our site will teach you how to get started, give you ideas and topics regarding your project, and sharpen your programming skills in C and C++. Here, you’ll find short and simple as well as long and complicated projects.

Physical components of a computer system such as a keyboard, mouse, or modem.

Question 25 options:


Software


Network


Browser


Hardware

Answers

Answer:

D

Explanation:

D: Hardware. These are the things like mouse or Modem that you can touch physically.

Software is what the computer runs to make itself useful.

Network is the connection (either virtual or physical) that connects computers together.

Browser is a software program used to navigate the internet

A healthcare crisis where millions of patient medication records were tampered with is an example of what type of breach?

A.
integrity breachc.

B.
codependency breach

C.
authentication breach

D.
AIC Triad breach

Answers

A healthcare crisis where millions of patient medication records were tampered with is an example of; A: Integrity Breach.

To answer this question, let us access each of the options;

A) Integrity breach; This is a breach that occurs when where there is an unauthorised or accidental alteration of the personal data of individuals or a group.

B) Codependency breach; This is not really a breach in this context as it happens when there is an imbalanced relationship between two or more people.

C) Authentication breach; This is a type of breach that is more common with a breach of passwords and login details.

D) AIC Triad breach; AIC is Availability, Integrity and confidentiality. So it combines Availabilty breach, integrity breach and confidentiality breach.

In this question, the patient medication records were tampered with which means that they were altered and from our definitions above, this is an example of integrity breach.

Read more about security breach at; https://brainly.com/question/15957125

WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?​

Answers

Answer:

I think answers is it never ends

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

Which of the following statements best explains how multitasking works in the human mind?

Answers

Multitasking is a myth—everyone can only process information one piece at a time.

Answer: He's right

Explanation: I got the answer too

I'm confused as to if subclasses can call the supers without any implementation and what the right answer is

Answers

Answer:

E

Explanation:

Since Example1 and Example2 inherit from Example0, all classes have the method doNothing() at their disposal, so you can call it from e0, e1 and e2.

However, the arguments of this method are Example1 and Example2, so you cannot pass Example0 as a first argument, and you cannot pass Example0 or 1 as a second argument. That only leaves answer E.

You can call the inheritance relation an "is a kind of" relation. So Example1 is a kind of Example0, and Example2 is a kind of Example1, but also Example2 is a kind of Example0.

Now you can understand why e2 can be passed as an argument for Example1, because e2 is a kind of Example1.

please answer ASAP!!!!!!

Answers

Answer:

the first constructor invocation will work.

pet temp("mouse", 5.99);

Explanation:

This will create a pet object on the stack, using the constructor.

If you want to create an object on the heap, you would use the new operator:

pet* pTemp = new pet("mouse", 5.99);

how many pages is 1500 words double spaced 12pt font?

Answers

Answer:

6 pages

Explanation:

what is syllabus of diploma in computer after class 10​

Answers

Answer:

[tex] \: [/tex]

List Of Best Computer Courses After 10th :

Certificate Program In MS OfficeBasic Computer CourseWeb Designing CourseDigital Marketing CourseData Entry CourseGraphic Designing CourseWeb Development CourseAnimation And VFX CourseComputer Science Diploma/EngineeringDiploma In Financial Accounting

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

many phone fraud scammers are expessily cunning because they approach the target to try to sell

Answers

Answer:

improved computer security programs

Explanation:

Answer:

Improved computer security programs.

Explanation:

Just took the quiz

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially.

Required:
Which character can he type after each command to have them run one after the next without requiring further input from him?

Answers

Answer:

um

Explanation:

what subject is this again?


What is the missing line of code?
22
>>> books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
>>>
dict_keys([294, 931, 731])
O books allo
O books.values()
O books
O books.keys()

Answers

Answer:

books.keys()

Explanation:

I ran the code and the awncers though python and books.keys() is the one that came up with the awncer

books.keys() is the missing line of code with respect to the books with the help of Python language.  Thus, option D is correct.

What is a code?

In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.

Code is a developing company that focuses on producing aesthetically pleasing, code-correct internet, application forms, and phone application.

The correct code will be according to the Python language will be in addition to books.keys():

books.keys()

books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}

books.keys()

dict_keys([294, 931, 731])

Therefore, option D (books.keys()) is the correct option.

Learn more about code, here:

https://brainly.com/question/17204194

#SPJ2

what is a saved link to a particular web page?​

Answers

Answer:

A bookmark

Explanation:

A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.

Software that is used to detect and eliminate computer viruses. Question 3 options: Wi-Fi Cable Internet Antivirus Application Browser

Answers

Answer:

Anti Virus

Explanation:

Antiviruses (Windows Defender, McAfee, Avast) scan your computer/device for viruses.

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

is there actually a difference between left and right twix

Answers

one has more caramel and one has more cookie

Please help please help

Answers

Answer:

Bonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az

ExplanationBonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az:

This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:

Answers

RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.

Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.

Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card

Read more about hardware implementation

brainly.com/question/25803633

Ethan is afraid that his poor grades will get him kicked out of his university at the end of the semester. He decided to remotely access the dean's computer and change his grades in the school system. If caught, Ethan will have to confess to committing what?

A.
virtual education

B.
grade hacking

C.
a computer crime

D.
educational fraud

Answers

Answer:

Computer Crime

Explanation:

You're evading someones privacy and gaining access to their computer or device without consent. Therefore, it is a computer crime.

Answer:

Educational fraud

Explanation:

Ethan changed his grades in the school system claiming to have better grades then he really does.

What is my mistake in this case?

Answers

Answer:

I think it suppose to be #print out house

Answer:

i guess take the hint, bro.

Explanation:

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

Other Questions
How would a harsh winter most likely affect the rabbit population size? which of the following most closely describes one way the author of "the choice" transforms "the road not taken"? "the choice" drew on the plot from "the road not taken" but did not reflect the same ideals. "the choice" followed the same basic plot as "the road not taken" except that bernadette made the opposite decision that the traveler made in the poem. "the choice" modernized "the road not taken" using the metaphorical situation of a young girl "traveling" though life instead of a real traveler on an actual journey. "the choice" and "the road not taken" both dealt with nature, but that was the only real similarity after the transformation. the story's author changed the poem's characters, plot, and theme. What statement is incorrect about natural selection A firm with market power engages in price discrimination in order to: Which detail from "Space Junk!" best conveys that the author isconcerned that space junk will have a negative impact on ourplanet?A "Although space is extremely vast, most of the junkthat is worrisome is orbiting earth."B "This collision added another 2,000 pieces of junk tothe growing pile of space debris."C "Currently, there are around 900,000 pieces ofdebris between 1 centimeter and 10 centimeters inlength orbiting in our space system, and this numberis growing."D "In our modern world, we have become more andmore dependent on satellites to help us with manythings." Which number comes next in the series? 7, 10, 10, 13, 16, 16, question and options are in the picture! Objects 1 and 2 attract each other with a gravitational forceof 18.0 units. If the mass of Object 1 is doubled mass of object 2 is tripled AND thedistance separating Objects 1 and 2 is halved, then the gravitational force will be new gravitational force will beunits. The length of a rectangle is four times its width. If the perimeter of the rectangle is 50 m, find its length and width. Of the following types of auto insurance, which will cover damages to a vehicle that were not the result of a collision?a.Uninsured motorist insuranceb.Comprehensive physical damage insurancec.Collision insuranced.Underinsured motorist insurance What is the first step to masking a woodcut? a. The artist draws a sketch on paper and transfers it onto the wood using tracing paper. b. A drawing is made on wood. c. The artist does the cutting without a drawing. d. none of the above Pls help with these questions! The diameter of a cylindrical construction pipe is 6 ft. If the pipe is 26 ft long, what is its volume?Use the value 3.14 for it, and round your answer to the nearest whole number.Be sure to include the correct unit in your answer. what is the equation for: 32 is the sum of a number x and 9 2. Calculate an expression for dy/dx and d2y/dx2 in terms of t if the parametric pair is given as tan(x) = e^at and e^y = 1 + e^2atHint: Turn tan(x) = e^at and e^y = 1 + e^2at into expressions suited to your calculation. The opposite of 358 is on the (same or opposite) side of zero on a number line as 358. The opposite of 429is on the (same or opposite) side of zero on a number line as 429. Pick one of the themes of geography and explain one way it has affected your life. Texte 1 +Qui me dirait l'heure ? Aucune horloge ne sonnait dans les clochers ou dans lesmonuments. Je pensai : Je vais ouvrir le verre de ma montre et tter l'aiguille avec mesdoigts, Je tirai ma montre elle ne battait plus.. elle tait arrte. Plus rien plus rien plusun frisson dans la ville, pas une lueur, pas un frlement de son dans Fair. Rien Phis rien ! Plus!mme le roulement lointain du fiacre, - plus rien!J'tais aux quais, et une fracheur glaciale montait de la rivire,La Seine coulait-elle encore ?Guy de Maupassant, La nuit (1885)1. Qu'y a-t-il d'trange dans ce rcit ?2. Identifiez les types de phrases. Quels signes de ponctuation traduisent l'motion ?3. Quel autre procd d'criture permet de traduire le trouble du personnage ? The function f is defined below. f(x)=2x3 Find f(1). what is factor write its type