adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf

Answers

Answer 1

Answer:

this belongs on r/ihadastroke

Explanation:

Answer 2

Answer: ok

Explanation:


Related Questions

does anyone know what's wrong with this code

Answers

hmmm- I don’t see anything right now, I’m at the end of a semester in Computer technology.

1. why is manufacturing considered the biggest contributor to progress

Answers

Answer:

A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.

What is the name of the User-defined function that is mentioned in the code?

Answers

The name of the user defined function is: footballMatch

HELPPPP KOKICHI IS OUT TO KILL ME

Answers

Oh my- good luck with that-

Answer:

rest in piece :(

Explanation:

Rachel selected a part of her audio file in the audio editing software and increased its decibel value. Which audio editing effect has Rachel used here?
A.
fade out
B.
normalize
C.
noise Reduction
D.
amplify
E.
compressor

Answers

lmk when someone has an answer

Answer: D. Amplify

Explanation:

Correct Plato answer

PLEASE HELP ME!!! Please don't answer if you're just going to guess.

In this line from a data file, what do you call the comma?
dog, 23, 15
The comma is _____
-Choices-
a BOL set of characters,
an EOL set of characters,
a delimiter.

Answers

Answer:

a

Explanation:

Answer:

BOL

Explanation:

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

an option already selected by windows is called____ ( default option/ default selection)​.
this is urgent

Answers

Answer:

default option

Explanation:

what is the best wi-fi name you have ever seen?

Answers

Answer:

bill wi the science fi

Explanation:

You defined a class as follows.

def __init__(self, style, color):
self.style = style
self.color = color
This portion is the _____.


creator

instantiator

constructor

initiator

Answers

Answer:

instantiator

Explanation:

MRK ME BRAINLIEST PLZZZZZZZZZZZZZZZ

Answer:

instantiator

Explanation:

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

what os the full form of cpu​

Answers

Answer:

central processing unit

Central processing unit

Construct :
4 input NOR Gate Truth Table.

Answers

9514 1404 393

Answer:

  see attached

Explanation:

The output is always 0, except for the case where all 4 inputs are 0.

What defines employability

Answers

is this multiple choice or are you looking for the definition?

You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do

Answers

Answer:

Explanation:

The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.

what is the most popular monitor​

Answers

Probably a television or a radio I guess

Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.


kinetoscope

selenium

cotton

celluloid

Answers

The answer: Kinetoscope

Answer:

Celluloid

Explanation:

It is Sis

pls help!! which of the following is not a step required to view a web page?

Answers

The first one! It’s not required to view web pages

The _____________ command is used to stop the FOR...NEXT loop prematurely.​

Answers

Answer:

The exit command is used to stop the FOR...NEXT loop prematurely

select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada

Answers

Answer:

PythonPHP

Explanation:

Plato Correct!

The two programming languages most commonly used to create software for websites are Python and PHP.

We have,

Python is known for being easy to understand and read, which makes it popular for building web applications.

It has tools and frameworks that help developers create websites quickly.

PHP is a language specifically designed for web development.

It is used to write code that runs on the server and helps create interactive websites.

Many popular websites and content management systems, like WordPress, are built with PHP.

While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.

Ada is a programming language mainly used in specialized industries like aerospace and defense.

It is not commonly used for creating websites.

Thus,

The two programming languages most commonly used to create software for websites are Python and PHP.

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ4

Match the network topology to its description. 1. bus data is certain to reach its destination 2. mesh no danger of data collision with this topology 3. ring limited expansion capability 4. star nodes are connected to a central hub

Answers

Answer:

3,1,2

Explanation:

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure in a single component does not cause the website to become unavailable. What should you add to your configuration to accomplish this

Answers

Answer: Connect one server through a different ISP to the Internet

Explanation:

With RAID 1 configuration, data can be simultaneously copied from one particular disk to another, thereby creating a replica.

Since the person wants to provide redundancy so that a failure in a single component does not cause the website to become unavailable, one server should be connected through a different ISP to the Internet.

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

20 Points and Brainliest!!!!!!
Select the correct answer.
Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

I think E, sorry if I'm wrong.

Answer:

I think it might be C

Explanation:

Which file type is best for saving line art and animated images?

DOC
GIF
JPG
MP3

Answers

Answer: GIF


Hope this helps!!!

Answer:

GlF =Graphic interchange format is best for saving line art and animated images.

stay safe healthy and happy.

A small computer on a smart card has 4 page frames. At the first clock tick, the R bits are 1000 (page 0 is 1 and the rest are 0). At subsequent ticks, the values are 0110, 0101, 1010, 1101, 0101, 0011, and 1100. If the aging algorithm is used with a 16-bit counter, give the values of the four counters after the last tick. If page fault occurs, which page should be swapped out

Answers

Answer and Explanation:

Aging algorithm Aging algorithms are the NFU algorithm with modification to know the time of span and increment the page referenced. The ageing method sort customer invoices by date in four columns. By using the ageing algorithm, counters are shifted by 1 bit, and the R bit is added to the leftmost bit. The values of counters are

Page 0:  01101110

Page 1:   01001001

Page 2:  00110111

Page 3:  10001011

The system clock is 2ns and interval is 2ms for that one bit per interval is the ability to analyze the references in a tick. Counters have a finite number and have two pages, where counter value 0 have two pages. The page fault appears, and pick just one of them randomly.

one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..​

Answers

Explanation:

you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.

hope it helps ( brainleist please )

select the correct answer
which sentence correctly describes a low-level language?
A. programs are written in source code
B. programs are written in hexadecimal or binary code
C. programs are translated to machine code by a complier
D. programs can be easily written and debugged

Answers

A  low-level language are known to be programs that can be easily written and debugged.

What are program written in a low level language?

A low-level programming language is known to be a kind of  programming language that helps one to have some amount or no abstraction from a computer's instruction defined architecture.

They are known as commands or functions in the language map that are said to be structurally almost the same to processor's instructions. They are easy to write and also debug.

Learn more about  low level language from

https://brainly.com/question/23275071

What browser do you use?
Brave
Chrome
Firefox
Opera
Edge
Tor


Answers

Answer:

Explanation:

Need answer ASAP!!!!!

Select the correct answer.
What stage of software development incorporates planning to help make changes in the project plan based on reviews?
OA.project startup
OB. proposal stage
OC. periodic checks
OD. product delivery

Answers

Answer:

Option C

Explanation:

Periodic check are similar to period inspection done by a team comprising of software developers who check the flow and output of the core during the different stages of software development.  

The team also do the auditing to check whether the work products meet the different client requirement and thus revise the project plans.

Hence, option C is correct

Other Questions
w(x) = 3x 4; Find w(7) Use the model to find the product of 0.5 x 0.6.A)0.27B)0.30C)0.33D)0.35 You are watching a movie in which the main character agrees to be hypnotized. The hypnotist suggests that the character focus on an object and then suggests that he is getting sleepy. Then the character, while hypnotized, engages in a criminal act. What is your educated response to this depiction of hypnosis a website would like to test the hypotheis that the average length of an online video watched by a user is more than 8 minutes. A random sample of 37 people watched onlinevideos that averaged 8.7 minutes in length. It is believed that the population standard deviation for the length of online videos is 2.5 minutes. The website owners would like to set =.02 what is the conclusion for this hyptohesis test g A chemical equilibrium exists when: A chemical equilibrium exists when: there are equal amounts of reactants and products. the rate at which reactants form products is the same as the rate at which products form reactants. the sum of reactant and product concentrations equals one mole. reactants are completely changed to products. the rate at which reactants form products becomes zero. A race is 5 kilometers long. Harold ran 3/4 of the race. How many kilometers did Harold run? PLEASE HURRY What did Harry and his friends do instead of going to the Halloween feast? PLS HELP I GIVE CROWN AND 40 PT LOOK AT LE PICTURE A pacemaker:A. sends electrical impulses to a prosthesis, causing it to movethrough brain signals.B. measures the distance traveled with a prosthetic leg.C. tracks the speed traveled with a prosthetic leg and adjustsmovements accordingly.D. sends electrical impulses to the heart, causing it to beat moreregularlySUEMIT 6. How did Misha honor Janina's memory? U 1. With the points A(-4,-2) B(1, -3) C(2,-5) D(-1, 7).What are the new points if the scale factor of dilation is 3? Limestone scrubbing is used to remove SO2 in a flue gas desulfurization (FGD) system. Relevant reactions are given below. A limestone mix is used that consists of 94% CaCO3 and 6% inert material. The actual feed rate of the limestone mix is 36,000 lb/hr. The SO2 in the flue gas is 20,314 lb/hr and the FGD efficiency is 97%. If the resulting sludge has 58% solids, determine the total sludge production rate (lb/hr). Round your answer to the nearest whole number. In eukaryotic cells,the section of DNA being transcribed is a Please answer the following question: Fill in the blank in the following dialogue with the appropriate word below.____est-ce qu'on va la tour Eiffel?Prenez le bus vert!A. PourquoiB. QuandC. CommentO D. O PLEASE I NEED THIS ASAP! FIRST CORRECT ANSWER GETS BRAINLY! the two dot plots below compare the forearm lengths of two groups of school children.based on visual inspection of the dot plots, which group appears to have the longer average forearm length? A. Group B, because five children have a forearm length longer than 12 inches.B. Group B, because a child in the group has the least forearm length of 10 inches.C. Group A, because no child in the group has a forearm length longer than 12 inches.D. Group B, because four children in the group have the least forearm length of 10 inches. THIS IS WORTH 100 POINTS PLEASE CONTINUE WHAT I STARTEDTHIS IS VERY IMPORTANT (IT HAS TO BE 8 SENTENCES FOR EACH PROMPT)I AM A BOY, THUS YOU SHOULD BE WRITING ABOUT A BOYEmbarrassment1. One day I was going to the cafeteria and slipped on the floor and then realized that everyone was looking at me and laughing. I ran away and hid in the bathroom until lunch was over. The whole school made me feel that way. I was really embarrassed and didnt talk to anyone for a week after that incident.Regret2. I lied to my friend once, I didnt want to hang out with them so I lied and said I was busy. Later on, he saw me at the mall where I was clearly having fun with my other friends and not busy. I lost a friend that day and I really regret it.Argument3. I had an argument with my mom because I wanted these new shoes. My mom said we didnt have the money but I didnt understand at the time so I yelled at her. I really regret talking to her that way.Insecurities4. I feel insecure sometimes about my looks. I feel as if no one will like me for my personality and only look on the outside. In tilton school there are 380 students in key stage 3 240 students in key stage 4 110 students in key stage 5 phoebe is carrying out a survey. she needs a sample of 100 students Wilson, an employee in a private-sector bank, has been suspected of stealing company funds and subsequently threatening and harassing some of his coworkers who refused to participate in his plans. Wilson, however, completely denies the accusations and maintains that he is innocent. Because of the lack of strong evidence, the ethics committee of the company decides to administer a polygraph test to Wilson. To ensure compliance with the rules of the Employee Polygraph Protection Act, which of the following should the committee do while conducting the test?a. It should not inform Wilson or get his permission prior to conducting the test. b. It should not allow Wilson to stop the test at any time depending on his personal will. c. It should decide if Wilson is to be terminated or retained solely based on the results. d. It should only use licensed, bonded examiners to conduct the test. I AM GIVING OUT BRAINIESTdo all those pls