you have a variable n with a non-negative value and need to write a loop that will keep print n blank lines what loop construct should you use

Answers

Answer 1

Answer:

write down same applications of AI in agriculture,health,education, and business


Related Questions

Write an expression (Links to an external site.) that evaluates (Links to an external site.) to true (Links to an external site.) if and only if the integer (Links to an external site.) x is greater than (Links to an external site.) the integer (Links to an external site.) y.

Answers

Answer:

index > last_index

c != str(" ")x == 0profits==losses

The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser.

Answers

Answer: Bookmark File

Explanation: Cache is like short term memory, like history on a web browser. You can manually clear it, just like on the web. If you bookmark a file though, it gets saved to memory, and you can call on it later

When an item in a menu is black, it means that _____.
(CORRECT ANSWER GET'S BRAINLIEST)
A) It is the only command that can be selected
B) A dialog box is present
C) The item can be selects
D) The item is unavailable

Answers

Answer:

no sure but I think c

Explanation:

because I am a awesome and cool perso

Answer:

the other person is wrong its d

actually no im wrong it is c lol

Calculate the time necessary to perform a multiply using the approach described in the text (31 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

Answers

The time that will be used to perform a multiplication using the approach is 28 time units.

How to calculate time taken?

From the information given, the following can be noted:

A = 8 (bits wide)

B = 4 time units.

The multiplication will be performed based on the adder stack. Since A = 8, then, A - 1 = 8 - 1 = 7.

Now, the time taken will be:

= 7 × B

= 7 × 4tu

= 28 tu

In conclusion, the correct option is 28 time units.

Learn more about time taken on:

https://brainly.com/question/10428039

True or false: Securing intellectual property digitally is the only security because that's how all IP is stored.

Answers

Intellectual property includes inventions, ideas, and writings. So you could use patents, trademarks, or copyrights to protect these things.

How many words is 3 pages double spaced times new roman 12?.

Answers

Have a good day tomorrow babe love love babe love baby babe love you baby baby babe babe

Which one of the following does NOT contain a
battery of some type?
A. Portable printer
B. Wired keyboard
C. UPS
D.
iPod

Answers

Answer:

B

Explanation:

took the test a day ago

it would be B. since it’s wired.

To include a column in the output that is not a result of an aggregate calculation, it must be included in the _____________ clause.

Answers

Answer:

group by

Explanation:

Which is true regarding how functions work? Group of answer choices A return address indicates the value returned by the function If a function returns a variable, the function stores the variable's value until the function is called again After a function returns, its local variables keep their values, which serve as their initial values the next time the function is called A function's local variables are discarded upon a function's return; each new call creates new local variables in memory

Answers

The true statement is that A function's local variables are discarded upon a function's return; each new call creates new local variables in memory.

What is function?

A function is known to be a term that tells the linkage between a set of inputs that are known to have one output each.

It is known to show the relationship between inputs where each input is said to be linked to one output. Note that a function's local variables are removed from memory when a function's return.

Learn more about function from

https://brainly.com/question/25638609

Now that you have explored several different languages (Python, HTML, CSS, and JavaScript), what can you do to keep straight which rules apply to which language?​

Answers

The applications are given below:

CSS applies to a stylesheet language or style.Python and JavaScript applies to programming languages.html  will show a horizontal rule and it applies to web browser.

What is CSS?

Cascading Style Sheets (CSS) is nown to be a type of a stylesheet language that is often used to depict a presentation of a document that are written in HTML or XML.

Python is known to be a high-level, all-purpose programming language. that is set up for design code readability.

Learn more about html  from

https://brainly.com/question/4056554

Write JAVA code that will randomly place a blue dot into a circle of radius 100 centred on a square black canvas of side length 500. See attached picture:

Answers

Answer:

// Drawing (or printing) texts on the graphics screen:

drawString(String str, int xBaselineLeft, int yBaselineLeft);

// Drawing lines:

drawLine(int x1, int y1, int x2, int y2);

drawPolyline(int[] xPoints, int[] yPoints, int numPoint);

// Drawing primitive shapes:

drawRect(int xTopLeft, int yTopLeft, int width, int height);

drawOval(int xTopLeft, int yTopLeft, int width, int height);

drawArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);

draw3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);

drawRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)

drawPolygon(int[] xPoints, int[] yPoints, int numPoint);

// Filling primitive shapes:

fillRect(int xTopLeft, int yTopLeft, int width, int height);

fillOval(int xTopLeft, int yTopLeft, int width, int height);

fillArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);

fill3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);

fillRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)

fillPolygon(int[] xPoints, int[] yPoints, int numPoint);

// Drawing (or Displaying) images:

drawImage(Image img, int xTopLeft, int yTopLeft, ImageObserver obs);  // draw image with its size

drawImage(Image img, int xTopLeft, int yTopLeft, int width, int height, ImageObserver o);  // resize image on screen

Explanation:

Please help!!! Question 8

Answers

Answer: To break out of some block of code.

Different Betweens in SRAM and DRAM !






Thank!
[tex] \: \: \: [/tex]

Answers

Answer:

Explanation:

Application Differences:

SRAM

SRAM stands for Static Random Access Memory  DRAM stands for Dynamic Random Access Memory

Faster access is due to the usage of transistors to store single bit of data  

SRAMs are used for cache memories due to faster access time  

DRAM

DRAM stands for Dynamic Random Access Memory

DRAMs are used for main memories due to comparatively slower access time.

DRAMs use capacitor to store bits where each capacitor holds a single bit

Parameter differences  

Speed: SRAMs are faster due to presence of transistors. DRAMs are slower due to presence of capacitors

Size: Due to complexity involved in the internal circuits, SRAMs are smaller in capacity for same size of the chip. DRAMs are larger as compared to SRAMs since their capacity for a given physical size is more.

Cost: SRAMs are costlier and the per bit storage cost is more than that of the DRAMs. DRAMs are cheaper and the per bit storage cost is less than that of the SRAMs

SRAM :

SRAM has lower access time, so it is faster compared to DRAM.SRAM is costlier then DRAM.SRAM requires constant power supply, which means this type of memory consumes more power.Due to complex internal circuitry, less storage capacity is available compare to the same physical size of DRAM memory chip. SRAM has low packaging density.

DRAM :

DRAM has higher access time, so it is lower than SRAM. DRAM costs less compair to the SRAM.DRAM offers reduced power consumption, due to the fact that the information is stored in capacitor.Due to the small internal circuitry in the one-bit memory cell of DRAM, the large storage capacity is available.DRAM has high packaging density.

Hope Helps!!

Can someone please help me with this question?

Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are something to be afraid of? Why or why not?

Answers

Answer:

There are many good reasons to fear or not fear computers that are controlled by AI.

Fear:

The AI can do things without people asking it to.The AI could be hàcked into, making it easier for hàckers and scam.mers to get into the computer and take information.TBH, I don't really like things that aren't natural and/or created by God.

Don't Fear:

AI's can do many things that humans cannot do.AI's can do things faster and more efficiently than humans can.AI's can be used to help us with many things that are impossible or very hard for humans to do.

Explanation:

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

−Kallmekrish

Write a short thesis statement about the IoT (Internent of things) I just need this just for ideas on my thesis statement. :)

Answers

The Internet of Things, or IoT for short, is a relatively new topic in the world of technology. This topic is both engaging and innovative for students pursuing their bachelor's and master's degrees. They can write their M.Tech. or Ph.D. thesis in this field. The internet has become an integral component of our everyday lives. The Internet of Things (IoT) concept is centered on the combination of comfort and the Internet.

What is a shortcut for adding a timeline marker

Answers

Answer:

To add a marker to a clip in the Timeline, do the following:

Set up a keyboard shortcut for Add Clip Marker in Edit > Keyboard Shortcuts (Windows), or Premiere Pro > Keyboard Shortcuts (Mac OS).

Select the clip.

Place the Playhead where you want to place the marker.

Press the keyboard shortcut you created for Add Clip Marker.

Explanation:

hope this helps!

Answer:

Ctrl+3 (windows) & Cmd+1 (mac)

i hope you mead adobe premium

Identify a characteristic that is a disadvantage of cloud-based hosting.

Answers

The characteristic that is a disadvantage of cloud-based hosting is  loss of control over data location.

What is Cloud hosting?

This is known to be a kind of applications and websites that often makes them accessible via cloud resources. Here, a network of linked virtual and physical cloud servers is said to be the one that host the application or website.

The Disadvantages of cloud computing are:

There is a data loss or theft.There is also data leakage.There is account or service hijacking, etc.

See options below

a. ongoing support costs

b. increased management requirements

c. significant development effort

d. loss of control over data location

Learn more about cloud-based hosting from

https://brainly.com/question/19057393

You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose?

Answers

Answer:

I would use a manually created blacklist.

Filters like those found in Internet Explorer and Netscape can help users block out objectionable or obscene material. In this situation, I could add my own web addresses to the list of blocked sites.

Another method of filtering would be to install hardware-based filters that look for certain keywords in a user's browsing history and flag that information as unacceptable. This would give me more control over what is blocked, but again would not allow me to personally review each page flagged by the filter before it became available to students.

I would go with a manual blacklist because it will provide an extra level of protection to the computer lab without being very cumbersome or prone to bugs.

Explanation:

My own original answer.

one of the safest and easiest investments for young people is

Answers

Answer:

Young investors have the single most valuable resource on their side⁠—time. Compound interest and dividend reinvestment are proven methods of building long-term wealth.

What does it mean when your excel table has headers?.

Answers

Answer:

A table header is a row at the top of a table used to label each column.

Explanation:

What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?.

Answers

Answer:

Application software

Explanation:

i think

A user guide is a type of
O accessibility tool
0 comment
O version control
O documentation

Edge

Answers

When we buy a new object, it usually comes with a user guide, a tool to guide us in its use, and the manufacturer's recommendations.

What is a user guide?

A user guide is a tool that indicates all the recommendations and instructions that the manufacturer advises the consumer to avoid.

For example, if I buy a car, I need to know how it works so as not to misuse it and damage it. Therefore, manufacturers include this tool in the box of all their products.

Learn more about user guide in: https://brainly.com/question/6689072

Answer:

Documentation

Explanation:

A user guide is a type of documentation.


Should spreadsheets be used to maintain a checkbook?
YES

NO

Answers

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

There was an error that prevented this video from playing espn.

Answers

Answer:

That tends to happen because brainly does not allow videos, rather only pictures. Otherwise, there is no way to provide video through brainly questions or answers.

A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer.

Answers

Answer:

Virtual Machine

Explanation:

I had to look this up, since there were no options from the question. If this is wrong, let me know!

Which component of windows prompts the user for credentials or permissions to minimize the dangers of unintended software installations?.

Answers

Answer:

User Account Control (UAC)

Explanation:

User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unwanted actions or unintended software installation. Windows firewall protects the system from network attacks. Windows Firewall with Advanced Security (WFAS) is a feature with provides advanced firewall settings beyond the program or service rules enforced by Windows Firewall. Windows Defender scans software for malicious code.

Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a country’s political scenario affect the freedom of media?
ASAP

Answers

in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.

Conduct research online or through other means on one source of renewable energy. Describe the applications and benefits of the energy source.
Earth Science (Plato)

Answers

A source of renewable energy is Solar energy.

What is the source of the solar energy?

The sun is known to be the source of Solar energy. This is known as any type of energy that is gotten from the sun.

Solar energy is formed by nuclear fusion that occurs in the sun. Fusion is said to take place when protons of hydrogen atoms does collide in the sun's core and fuse to form a helium atom.

Solar power  or energy benefits includes thermal or electrical energy. One can also get the cleanest and most abundant renewable energy source from here.

Learn more about renewable energy from

https://brainly.com/question/545618

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond

Answers

Answer:

Request timeout

Explanation:

If a computer makes a request and does not hear a response within an acceptable amount of time, the computer assumes that no answer is coming and reacts accordingly.

The method that allows a computer to react accordingly when it requests data from a server and the server takes too long to respond is request timeout.

What is response timeout?

A response timeout is known to be a situation that often occurs after the request has been sent to the CICS server.

Conclusively, In the aspect of request timeout, this  message is one that often comes up when there is a kind of  firewall that is said to be blocking the connectivity as in the case of the serve in the above question.

Learn more about computer from

https://brainly.com/question/24540334

Legacy systems can be described as all of the following except? Usually found on a mainframe. Old systems that often require hard-to-use command languages. Systems that most often have detailed information that can be accessed by a system at a higher tier. A system that often holds the middle tier of a multiple-tier system. A system that is already in place, from the past.

Answers

A legacy system refers to outdated infrastructure, applications, and processes, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

What is a legacy system?

It describes software or IT systems that have been around for a long time and that, from a technological point of view, should be replaced by a more modern version.

A legacy system has often been used for a long time and is no longer technologically up to date, however these old applications are still used for various reasons, for example because they form the basis of newer software.

Therefore, we can conclude that legacy systems are those computer systems that have become outdated but are still used by companies, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

Learn more about legacy systems here: https://brainly.com/question/7494597

Other Questions
In Act 1, Scene 1, of Romeo and Juliet how does the language used by the Montague servants compare or contrast with thelanguage used by the Prince? Why were white Southerners so eager to deny African Americans their rights?A. They wanted African Americans to move to Northern cities.B. They wanted the Republican party to control their state governments.C. They wanted to maintain their place within a racial hierarchy.D. They wanted African Americans to found their own new states. To decide is a difficult matter Islam was an important religion in the African empires of ____ and _____ MARKING BRAINIEST IF RIGHT A genetic cross involving two unlinked genes is represented.AaGG x aaGgWhich genotype is NOT possible in the offspring produced by the cross? Multiply: 329 x 684I need to put a comma or nothel pleaseee Susie is baking blueberry muffins and goes through the following steps: she preheats the oven, mixes all the ingredients in the order in which they are presented in the recipe, greases the muffin pan, places the batter in separate cups, places the pan in the oven, and then sets the timer. Type of memory and why: procedural memory; this memory allows us to some specific tasks without much thinking about them 1 Learning Module 4 Assignment: Complete all sections of the assignment (there are 5 parts) Andrea bought tacos from a food truck and left a 25\%%, percent tip of \$2. 00$2. 00dollar sign, 2, point, 00. What was the price of Andrea's tacos, before tip?. Sunlight, wind, and water are considered ____resources.Question 3 options:renewablenonlivingfossilnonrenewable 'How big is the building?' said the boy - Change in indirect Technology that transfers page images composed inside a computer directly to printing plates is called: which set of elements have chemical properties similar to carbon Which of the following inequalities matches the graph? (2 points) Dilate ABC below using A as the center and ascale factor of 2. Leave all construction marks? a major regulator of bone growth ?a.pthb.calcitoninc.growth hormonee.active vitamin D Argue the importance of planning for higher education as an important step in one's life What is the molarity of a solution prepared by dissolving 8 grams of BaCl2 in enough water to make a 450. 0 mL solution? (Hint: must convert grams to moles first). pls helpppYou have 2 bags, bag 1 had 5 green marbles, 6 red marbles, 7 pink marbles and 3 yellow marbles. bag 2 had 6 green marbles 2 red marbles 3 pink marbles and 8 yellow marbles if you pull one from each what is the probability of getting a pink marble from each bag? 2 In which lines that's the poet used a metaphororyour mighLast Line3 In what way can war'constrict the heart?4 What do you learn about the horses?5 What might a giant's palm' refer to?6 What is the inevitable fate that awaits the sole