Answer:
Usb drive
Explanation:
Crazy Sentence Program. Create a program that prompts the user for the name of an animal, a color, the name of a vehicle, and the name of a city. Then print a sentence that contains the user input in the following order. Include the additional words in the sample output as part of your output. Example: Assume the user enters the words: tiger, green, motorcycle, and Wildwood. The output would be: The green tiger drove the motorcycle to Wildwood.
I agree with you ✔✔✔
most computers have temporary holding areas called __________.
Answer:
Random Access Memory (RAM)
what is the most popular game design engine today
Unreal Engine and Unity
Answer:
i think its an gamemaker
Explanation:
18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *
EDIT
FILE
F0RMAT
INSERT
Explanation:
FORMAT
because it is used for the general appearance of the page
RAM is like a computers ___, while a hard drive is like a computers___
A. brain/ nervous
B. nervous system/ brain
C. long-term memory/ short-term memory
D. short-term memory/long-term memory
Answer:
D. short-term memory/long-term memory
Explanation:
RAM is like a computer's short-term memory, while a hard drive is like a computer's long-term memory. Then the correct option is D.
What are RAM and Hard drive?Random Access Memory is referred to as RAM. RAM is referred to as Basic Memory or Main Memory. Each RAM memory location may be accessed at the same speed. The computer will slow down if RAM is low. RAM has a brief read/write (R/W) period. Transistors and other electronic components make up RAM, which has no moving mechanical elements.
Hard Disk Drive is referred to as HDD. Another name for HDD is supplementary memory. HDD has mechanical moving components like an arm, a pin, etc. HDD read/write times are faster. It could take longer or shorter to access different parts of the HDD. The impact of HDD on system speed is minimal.
A hard drive is comparable to a computer's long-term memory, whereas RAM is like short-term memory. D is the best choice in that case.
More about the RAM and Hard drive link is given below.
https://brainly.com/question/17944253
#SPJ2
All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data
Answer: A: a scanning device at the grocery store
Explanation:
how to prevent truncation of data when importing into sas studio
Answer:
Set the length BEFORE pulling the dataset. You cannot change the length of character variable after it has already been set. Then remove any format that might be attached to it. In fact why not just remove any formats attached to any of your character variables.
You have answered 12 of 23 questions.
ing
1
Question # 13
A group of computers that share resources are called what?
2
O A server
3
O A personal computer
O A router
1
O A network
Read Question
Answer:
the answer is a network because the others are for different things
how do ""night modes"" on computer screens help people fall asleep?
Answer:
it doesn't really help people fall asleep but
Explanation:
When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.
Answer:
Answer it doesn't really help people fall asleep but some people it can
Explanation:
Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open
For any of you coding experts. I'm just beginning to take coding seriously and I want to know which coding language is the easiest for beginners. Any tips?
this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.
Answer:
A
Explanation:
Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
What is content filtering ?Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.
As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.
Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
To learn more about content filtering , visit
https://brainly.com/question/13129235
#SPJ2
Help me please please i need it tommorow
Since brochures are for marketing purposes,
I'll choose to introduce an internet service provider(ISP).
1. My service is targeted to people in need of secure and fast internet connection. Thus, home owners, corporate companies, institutions or individuals.
2. My brochure is to highlight the service that I'll produce and explain the significance it'll have in people's daily lives.
3. The most important message to be conveyed by the brochure is that the ISP is highly reliable, safe, available, inexpensive and easy to use and access.
4. Here use Canva to format the brochure. (Let me try to create one and I'll add). Personally, my brochure will include an introduction, importance, impact and awareness of my service,and contacts.
5. Graphics I'll use are,
* High resolution photos(like 300 dpi to make sure it's clean during printing).
* Right font for the text.
* The right folds to allow easier folding after printing.
* Highly designed brand logo and name.
* Inviting color tone.
* White space must be used strategically to avoid information cluttering.
Can someone help me code the statments in the picture?
Answer:
(In this section I will put the code with no comments and I'll put the code plus comments in the explanation below :)
public class Main
{
public static void main(String[] args)
{
double cost = ParkingSpot.getPrice(4);
System.out.println(cost);
}
}
//End OF Main class
//ParkingSpot class
public class ParkingSpot
{
public static double getPrice(int hours)
{
double cost = 4.25 * hours;
if (cost < 7.00){
cost = 7.00;
}
if (hours > 3){
cost = cost * 0.25;
}
return cost;
}
}
Explanation:
(Here I will add the comments so you better understand what is written and whats going on :)
public class Main
{
public static void main(String[] args)
{
/* the code should be written in the ParkingSpot
* class. You may use this main method to call
* methods to test your code
*/
/*We send an integer representing x amount of hours, also calling the
method and displaying the result
*/
double cost = ParkingSpot.getPrice(4);
System.out.println(cost);
}
}
//End OF Main class
//ParkingSpot class
public class ParkingSpot
{
/* Finish the static class getPrice. The parameter hours indicates the time parked.
*/
public static double getPrice(int hours)
{
//Here we set the rates
/*
It costs 4.25 per hour to park in the ParkingSpot
If the total cost come in at less than 7.oo, the price should
be adjusted UP to 7.00, the minimum Price Allowed
If the number of hours is more than three hours,
a 25% discount should be appllied
*/
double cost = 4.25 * hours;
//If the cost is less than 7.00 we set the price up to 7.00
if (cost < 7.00){
cost = 7.00;
}
/*If hours is more than 3 (meaning 4 or it would have said 3 and/or more),
a 25% discount will be appllied*/
if (hours > 3){
cost = cost * 0.25;
}
//Return cost of parking for x amount of hours
return cost;
}
}
The String otherObjects() method relies on the ____________.
a) name.indexOf() method
b) name.equals() method
c) name.compareTo() method
d) name.length()
What is a process of adding details to a model to make it less abstract
Answer:
refinement
Explanation:
https://brainly.com/question/19274876
how many levels of heading tags are allowed in html?
Answer:
six levels
Explanation:
HTML defines six levels of headings. A heading element implies all the font changes, paragraph breaks before and after, and any white space necessary to render the heading. The heading elements are H1, H2, H3, H4, H5, and H6 with H1 being the highest (or most important) level and H6 the least.
Answer:
six levels
Explanation:
In your opinion., which Zelda character is the hottest? Be honest.
Answer:
link<3
Explanation:
ASAP! WILL MARK BRAINLIEST + 100 POINTS!!
Match each word to its description.
Answer:
Windows- operating system most commonly used by businesses
Spreadsheet, word processing- types of application software
data- type of file created when word processing document is saved
system calls- instructions for the OS provided by application software
documents- folder where documents you create go by default
Recycle Bin- where documents go when you delete them.
toggling- switching from one setting to another
Help menu- best place to get assistance in a word-processing program
I hope this helps, please let me know if any are incorrect.
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.
No food or drinks near the computers. NO EXCEPTIONS.
Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.
Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.
Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.
Do not change computer settings or backgrounds.
Ask permission before you print.
SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.
If you are the last class of the day, please POWER DOWN all computers and monitors.
Keep your files organized
Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.
Log off
Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.
Each person may only use one computer at a time
Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.
Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.
Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.
.Explanation:
sorry about only 9 rules
Susan is excited to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which are the valid suggestions for Susan? The Internet is a medium used by numerous individuals. As a user of it, the responsibility of privacy and security rests with the user. Susan should be aware of the potential risks associated with improper use of the Internet. She should hence share her Social Security number whenever asked for it. She should be careful when using third-party applications and download applications from trusted and secure sites only. Susan should also be careful while using social networking websites. Susan should update her location information whenever possible. She should not click on any unknown links and use secure browsing and strong passwords. An example of a strong password is susanishere.
Answer:
a
Explanation:
what is the term used to describe image file that contains multiple small graphics?
this device enables connectivity between two lans or a lan and a larger network.
Answer:
I'm pretty sure it's a cable. A lan cable specifically.
Explanation:
Which type of basic building blocks (constructs) is the following algorithm?
Answer:
Sequence
Explanation:
please answer it is important!!!! i will mark you branliest
Answer:
Machine - consists of the numeric codes for the operations that a particular computer can execute directly
Assembly - provides the information of any error in the code.
High level - Require translation.
Require translation.Portable.
Require translation.Portable.Easier to read, write and maintain as commands are similar to English.
Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.
what tv show inspired the term spam for junk email?
Answer:
a 1970s monty python's flying circus TV sketch
PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
Answer:
class Cat:
isHungry = None
play = Cat().isHungry = True
eat = Cat().isHungry = False
if play:
print("I am hungry, I cannot play")
else:
play = Cat().isHungry = False
if eat:
print("I am full, I cannot eat")
else:
eat = Cat().isHungry = True
Explanation:
Just simple if and else statements.
write measure five safety measures can be taken to stay safe in social media
Answer:
*Use a strong password for your accounts
*Set your account to private if given the chance to do so
*Be very selective with friend requests
*Click links with caution
* Don't over share your life
what is the correct keyboard shortcut to cut a cell value
Answer:
Cntrl+X
Explanation:
Do it on your computer
The keyboard shortcut to cut a cell value is Ctrl +X.
What is Ctrl X?
Control x can be written as ctrl x
To cut a text means to remove the text from where it was initially and retain the ability to paste the cut text in a desired cell.To do this, we use the cut function which is ctrl x. This cuts the text while ctrl v would paste the text in the desired location.The shortcut ctrl x can be clearly described as the action removes the text or item and stores it in the clipboard, rather than copying it to the clipboard.For example, you can cut a picture out of the beginning of a Word document and paste it further down within your document. Alternatively, you can cut a block of text out of Word and paste it onto a PowerPoint slide.
So, the keyboard shortcut to cut a cell value is Ctrl +X.
Learn more about ctrl x,
https://brainly.com/question/14447287
#SPJ6
What is wrong with the following code? publicstatic char grade(int score) { if (score >= 9) { return 'A'; } else if (score >= 8) { return 'B'; } else if (score >= 6) { return 'C'; } else if (score > 4) { return 'D'; } else if (score < 4) { return 'F'; } }
Answer:
c) No return statement for all possible logic paths
What device on a network enables work to be performed for a business?
server
router
endpoint
modem
Answer:
Option B or Router must be correct.
Kind request:
Please give me brainliest if my answer was useful :D