Answer:
cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child p0®n0graphy and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Which of these is a correct example of the creation of a list in Python? A. names = [“James”, “Omar”, “Hazel”, “Lee”, “Mia”] B. names = (“James”, “Omar”, “Hazel”, “Lee”, “Mia”) C. list[names] = [“James”, “Omar”, “Hazel”, “Lee”, “Mia”] D. list(names) = (“James”, “Omar”, “Hazel”, “Lee”, “Mia”)
Answer:
A.
The round brackets () are called tuples. Tuples are another way of storing data, and are slightly different from lists.
Lists are changeable.
Tuples are not changeable outside their codeline.
explain the importance of computer graphics?
Answer:
Computer graphics are similar to the visual designs and textures we see in pc games and such everyday we use our computers. Just basically re-creatable images and re-creating images into art.
list the multimedia contents that are included while creating a presentation
Describe the different compents of QBASIC editor window
Answer:
The QBasic Editor Screen has three parts. They are- Editor Window, Immediate Window and Output Window.
whats your favourite dramas , suggest me some ...........
Write the syntax of GOTO, ON GOTO and IF THEN ELSE with examples.
Answer:
GOTO:
goto label;
... .. ...
... .. ...
label:
statement;
Example:
/ Program to calculate the sum and average of positive numbers
// If the user enters a negative number, the sum and average are displayed.
#include <stdio.h>
int main() {
const int maxInput = 100;
int i;
double number, average, sum = 0.0;
for (i = 1; i <= maxInput; ++i) {
printf("%d. Enter a number: ", i);
scanf("%lf", &number);
// go to jump if the user enters a negative number
if (number < 0.0) {
goto jump;
}
sum += number;
}
jump:
average = sum / (i - 1);
printf("Sum = %.2f\n", sum);
printf("Average = %.2f", average);
return 0;
}
A. Discuss the pros and cons of the use of arrays and parallel arrays and provide an example of a real-life equivalent to an array and a parallel array.
In array, the accessing part is very simple by the use of the index number.
What are the pros and cons of arrays?Pros of array
The accessing part is simple.The array represents multiple data items that are of the same typeThe search process can be applied to an array easily.Cons:
The number of elements to be stored in arrays should be known beforehand. An array is static. Insertion and deletion are difficult in an array. Allocating more memory than required leads to a wastage of memory.Pros and Cons of Parallel array:-
Pros:
Parallel arrays are utilized in languages that support solely arrays of primitive varieties Parallel arrays are straightforward to know and use.Cons:-
They have very little direct language support.Learn more about array on:
https://brainly.com/question/26104158
In your program, your ball dropped. What condition made the ball stop when it reached the origin of the axes you had drawn?
The condition that made the ball stop when it reached the origin of the axes you had drawn is the gravitational force that is of the interaction between two objects with mass.
What is the force that act on an object when you drop a ball?The gravitational force is known to be a kind of interaction that exist between two objects with their mass.
Note that for a falling ball, the two objects with their known mass are said to be the Earth and also the ball. The power of this gravitational force is said to be proportional to the product of the two said masses.
Learn more about gravitational force from
https://brainly.com/question/72250
Answer: while ball.pos.y > 0
Explanation: This is the aswer if you are looking fo the equation.
Which of the following best explains how the Internet is a fault-tolerant system?
A: The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.
B: The Internet is fault-tolerant because there are usually multiple paths between devices, allowing messages to sometimes be sent even when parts of the network fail.
C: The Internet is fault-tolerant because users can transmit messages using a variety of different protocols, allowing them to use devices from any manufacturer.
D:
The Internet is fault-tolerant because users usually understand and accept the fact that servers sometimes fail, allowing network engineers to repair faulty devices as quickly as possible
Answer:
A
Explanation:
The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.
This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy
A.) The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.
Different between barcode reader an biometrics device
Answer:
See below
Explanation:
Overall, scanning a barcode with a barcode reader simply tells you that it can be scanned by that particular reader and does not guarantee quality. While barcode readers are used to read codes, barcode verifiers are used to grade the quality of codes
can i become a technichian
Answer:
yes you can...do a thorough research
Write a console application that requests the user to enter the name of their Pet and the year their pet was born. Calculate the age of the pet and display the name and age of the pet.
Console applications are computer programs that run on text only interface
The main programThe program written in Python, where comments are used to explain each line is as follows:
#This imports the date module
from datetime import date
#This gets the pet name
petName = input("Pet name: ")
#This gets the pet year of birth
petYear = int(input("Year of birth: "))
#This calculates the pet age
age = int(date.today().year) - petYear
#This prints the pet name and age
print(petName,' is',age,'years old')
Read more about computer programs at:
https://brainly.com/question/16397886
Which of the following is something you can add to your camera or device to modify the light coming into the lens?
Effect
Filter
Reflection
Refraction
In order to modify the light coming into a camera lens, you should add: D. Refraction.
What is a camera lens?A camera lens can be defined as a transparent optical instrument that is used in conjunction with a digital camera, so as to refract rays of light coming into the lens.
This ultimately implies that, a refraction when installed or added to a camera or device, it helps to modify the light coming into the lens and produce a real image.
Read more on lens here: brainly.com/question/1503574
Answer:
Filter.
Explanation:
A filter is something you add to your camera to modify the light coming into the lens.
How much do you think robots would need to understand human emotions?
Answer:
In the future, a lot.
If we can get robots to understand the concept of emotions, we can create a whole new world and future that is better for everyone. The robots could do so much more.
-learning computers with potato
Shandra recently bought a brand-new digital camera from a local camera shop but when she got it home, she noticed the lens was jammed. What would be an effective way for her to handle this situation?
How do I execute lines of script from Github? I already know how to execute javascript code but how do I execute it with python or any other type of code?
1: Ideal Toy Company has to develop a new toy “Magic-Bulb”. Magic-Bulb is a box having 8 buttons and 8 bulbs on it. Buttons are associated with numbers 0 to 7 (i.e. 1 number written on 1 button). For any number pressed by user Magic-Bulb turns a specific bulb on. Bulbs “Green”, “Yellow”, “Pink”, “Orange”, “Red”, “Purple”, ”Blue” and ”White” are associated with numbers 0, 1, 2, 3, 4, 5, 6 and 7 respectively. Your task is to design Logic diagram for Magic-Bulb’s circuit using the concepts studied so far. Make truth table for Magic-Bulb Write functions equations using AND and NOT operations only Write functions equations using OR and NOT operations only Draw logic circuit diagram for part b Draw logic circuit diagram for part c Are these single-output circuits or multiple-output circuits?
Explanation:
A part of the answer. The full image can't be uploaded. Am sorry. I did not check that.
step of opening browser on computer
Regardless of which version of Windows you have, you can also open the browser from the start menu. Select the start button and type in Chrome. If the Chrome browser is on your computer, it will be displayed in the menu, where you can now see the icon and select it to open.
<3
what is communication
Answer:
The transmission of information between two things?
5. Height, weight, time, and distance are examples of what?
Answer:
They're examples of: Measurement of time.
Explanation:
distance or weight are examples of variable the varribles too
:) Hope this helps Let me know If I need to revise
height, weight, time, and distance are all examples of measurements.
What Was the first video game ever made? WORTH 98 POINTS
Answer:
Hello! :))Your Answer is Pong.
Explanation:
It was October 1958, Physicist William Higinbotham created the first video game. It was a tennis game, similar to the classic 1970s video game Pong, and it was quite a success I must say. :D
1. A vehicle that is in bad shape is unsafe and costs more
to run than one that is maintained.
O True
O False
Answer:
True.
A damaged car costs repairs, and additional money and taxes to operate. A regular, undamaged car costs the original price.
I hope this helps!
Why is it pointless to expect cyberattackers to follow organizational legal measures?
A. because they do not abide by business rules and regulations
В. because they are obligated to the laws of the land
c. because cyberattackers are not legally held to the same standards as the common user
D because cyberattackers only exist virtually and therefore cannot ever be caught
Edmentum
Answer:
The answer is A.
Create a program that uses a Java method to determine the length of a line by inputting the X,Y coordinates of the line endpoints. Show the result with a precision of four decimal places.
Answer:
import java.lang.Math;
import java.util.Scanner;
class lineLength {
private double x1;
private double x2;
private double y1;
private double y2;
public lineLength(double x1, double y1, double x2, double y2){
this.x1 = x1;
this.x2 = x2;
this.y1 = y1;
this.y2 = y2;
}
public String toString(){
double length = Math.sqrt( ( ( this.x2 - this.x1 ) * ( this.x2 - this.x1 ) ) + ( ( this.y2 - this.y1 ) * ( this.y2 - this.y1 ) ) );
String answer = String.format("%.4f %n", length);
return answer;
}
}
class Main{
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
System.out.println("Please input x1, y1, x2, and y2");
double x1 = scanner.nextDouble();
double y1 = scanner.nextDouble();
double x2 = scanner.nextDouble();
double y2 = scanner.nextDouble();
lineLength test = new lineLength(x1,y1,x2,y2);
System.out.println(test);
}
}
Explanation:
we use formula
[tex]\sqrt{(x_2-x_1)^2+(y_2-y_1)^2}[/tex]
Line formatting can be accomplished by using..?
Review Questions
1. Explain the difference between authentication and authorization.
A software repository, also known as a 'repo'
answer please help me
Write about how this item was important to you.
Does anyone know soul land?