In general, bitmap images need to be modified before being used for mobile apps.
a) True
b) False

Answers

Answer 1

Answer:

True

Explanation:

If you are creating something like a mobile app, you will need to find a way to strip out a lot of the excess file size to make them work


Related Questions


A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS

Answers

Answer:

DNS

Explanation:

Hope this helps

DNS I thin hope that helps

QUICK!! URGENT!! I'll provide more point if u give me the right code for this specific program. I truly don't understand if statements :( ​

Answers

Answer:

5467373737474737377474747

If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder

Answers

Answer:

270 nsec

Explanation:

Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.

Formula to calculate the delay of a ripple-carry adder is;

  = 2( n + 1 ) x D

delay in a full-adder = 150 nsec.

number of full-adders = number of ripple-carry bits = 8

 = 2 ( 8 + 1 ) x 150

 = 18 x 150

 = 270 nsec

describe how to get started on a formal business document by using word processing software

Answers

Answer:Click the Microsoft Office button.

Select New. The New Document dialog box appears.

Select Blank document under the Blank and recent section. It will be highlighted by default.

Click Create. A new blank document appears in the Word window.

Explanation:

Who is a software engineer

Answers

A person who applies principles of software engineering to the design
Hope this helps !

7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain when an adjacency list is a clear winner in the efficiency of your algorithm

Answers

Answer:

The answer is below

Explanation:

Adjacency list is a technique in a computer science that is used for representing graph. It deals with a gathering of unorganized lists utilized to illustrate a limited graph. In this method, each list depicts the group of data of a peak in the graph

Adjacency List are most preferred to Adjacency Matrix in some cases which are:

1.  When the graph to is required to be sparsely.

2.  For iterability, Adjacent List is more preferable

Plz answer me will mark as brainliest ​

Answers

1 plus 1 is too and three to four is 111

In HTML5, the
(line break) tag does not require a closing tag.


true or false

Answers

True in HTML 5 line break tag doesn’t require closing tag

Write a program whose inputs are three integers, and whose output is the smallest of the three values. Use else-if selection and comparative operators such as '<=' or '>=' to evaluate the number that is the smallest value. If one or more values are the same and the lowest value your program should be able to report the lowest value correctly. Don't forget to first scanf in the users input.

Ex: If the input is: 7 15 3
the output is: 3

You should sketch out a simple flowchart to help you understand the conditions and the evaluations needed to determine what number is the correct answer. This type of tool can help determine flaws in a logical design.

Answers

Answer:

The Program written in C is as follows:

#include <stdio.h>

int main() {

   int num1, num2, num3, smallest;

   printf("Enter any three numbers: ");

   scanf("%d", &num1);    scanf("%d", &num2);    scanf("%d", &num3);

   if(num1 <= num2 && num1 <= num3) {

       smallest = num1;

   }

   else if(num2 <= num1 && num2 <= num3) {

       smallest = num2;

   }

   else {

       smallest = num3;

   }

   printf("Smallest: ");

   printf("%d", num3);

   return 0;

}

Explanation:

This line declares necessary variables

int num1, num2, num3, smallest;

This line prompts user for input of three numbers

   printf("Enter any three numbers: ");

This lines get input for the three numbers

   scanf("%d", &num1);    scanf("%d", &num2);    scanf("%d", &num3);

The following if/else statements determine the smallest of num1, num2 and num3 and assigns to variable smallest, afterwards

   if(num1 <= num2 && num1 <= num3) {

       smallest = num1;

   }

   else if(num2 <= num1 && num2 <= num3) {

       smallest = num2;

   }

   else {

       smallest = num3;

   }

The next two lines print the smallest value

   printf("Smallest: ");

   printf("%d", num3);

Create a survey questionnaire with at least 10 questions to find out how teens are using social networking sites. Your data should contain a minimum of 30 valley questionnaires in each respondent must answer all the questions for that questionnaire to be valid. Analyze the data collected using charts or graphs. What are your findings from the survey? Collate the findings by summarizing the answers for each question. Present a graph or chart to represent the data you collected.

Answers

Possible Questions:

- What social media platforms do you use on a daily basis?

- Where did you hear about these social media platforms?

- What made you join these social media platforms?

- What social media platform(s) do you prefer the most?

- Why might you suggest these social media platforms to a friend?

- What does having and using this platform mean to you?

- What does your preferred platform allow you to do?

- Has using this platform changed you in any way? (Are you more connected, concerned, aware, etc.)

Write a program which:

Allows the user to input any of the following string: A1, A2, B1, B2, C1, C2

If the input is from the A category, the program must output "Footwear: ". And if the input is A1 it should output "Shoes" and if A2 it should output "Trainers"

B should output "Tops: "

B1 "Jackets"

B2 "TShirts"

C "Pants: "

C1 "Trousers"

C2 "Shorts"

If the user has not entered the correct data, the program must output "Incorrect input"

Answers

Answer:

Ill do this in C# and Java

Explanation:

C#:

public static void Main(string[] args)

       {

           string input = Console.ReadLine();

               switch (input)

               {

                   case "A1":

                       Console.WriteLine("Footwear:");

                       Console.WriteLine("Shoes");

                       break;

                   case "B1":

                       Console.WriteLine("Tops:");

                       Console.WriteLine("Jackets");

                       break;

                   case "C1":

                       Console.WriteLine("Pants:");

                       Console.WriteLine("Trousers");

                       break;

                   case "A2":

                       Console.WriteLine("Footwear:");

                       Console.WriteLine("Trainers");

                       break;

                   case "B2":

                       Console.WriteLine("Tops:");

                       Console.WriteLine("TShirts");

                       break;

                   case "C2":

                       Console.WriteLine("Pants:");

                       Console.WriteLine("Shorts");

                       break;

                   default:

                       Console.WriteLine("Incorrect Input");

                       break;

               }

       }

Java:

public static void main(String[] args)

   {

       Scanner myObj = new Scanner(System.in);  // Create a Scanner object

       String input = myObj.nextLine();

       {

           switch (input)

               {

                   case "A1":

                       System.out.println("Footwear:");

                       System.out.println("Shoes");

                       break;

                   case "B1":

                       System.out.println("Tops:");

                       System.out.println("Jackets");

                       break;

                   case "C1":

                       System.out.println("Pants:");

                       System.out.println("Trousers");

                       break;

                   case "A2":

                       System.out.println("Footwear:");

                       System.out.println("Trainers");

                       break;

                   case "B2":

                       System.out.println("Tops:");

                       System.out.println("TShirts");

                       break;

                   case "C2":

                       System.out.println("Pants:");

                       System.out.println("Shorts");

                       break;

                   default:

                       System.out.println("Incorrect Input");

                       break;

               }

       }

"Jean-luc Doumont notes that slide software is an effective presentation tool, especially when the speech goal is to:"

Answers

Hi, your question is incomplete. Here are the options:

A. persuade the audience.

B, encourage critical thinking.

C. increase discussion.

D. relay detailed information

Answer:

D. relay detailed information

Explanation:

Indeed, slide software (like MS Powerpoint) would be an effective presentation tool, especially when the speech goal is to relay detailed information.

For example, a graph showing the exponential growth in the number of smartphone users in the United States for the last 15 years would be effectively presented using a slide that shows this data because it will allow the audience to easily see the detailed information.

what is 9x9x9? pls help

Answers

Answer:

729. is answer...........

Answer:

729

Explanation:

The intentional defacement or destruction of a website is called: Group of answer choices spoofing. cybervandalism. cyberwarfare. phishing. pharming.

Answers

Answer:

cybervandalism

Explanation:

The intentional defacement or destruction of a website is called cybervandalism. This ultimately implies that, cybervandalism is carried out or done by someone through the use of computer technology such as an internet to destroy data (informations).

Additionally, the defacement or destruction of a website simply means changing the appearance and data relating a website. Some of the tools use for cybervandalism is a file transfer protocol (FTP), structured query language (SQL) injection etc.

In may 2005, President Donald Trump's Wikipedia web page was vandalized by an attacker.

It should be noted that intentional defacement or destruction of a website is called cybervandalism.

Cybervandalism can be regarded as the damage or destruction which is been carried out in digital form.

It may involves the cyber vandals which involves the defacing of a website.

Therefore, cybervandalism serves as intentional defacement or destruction of a website.

Learn more about cybervandalism at;

https://brainly.com/question/11408596

Jake or Peggy Zale must fix quickly the fax.

Answers

Answer:

Sentence: Jack or Peggy Zale must fix quickly the fax.

Correct: Either Jack or Peggy Zale must quickly fix the fax.

There are 2 errors in these sentence construction. In stating two persons as an option we must use the word "either" to indicate that you only have two choose from the two of them. The word "

Explanation:

The correct sentence would be "either Jake or Peggy Zale must quickly fix the fax".

In the question construction, there is a conjunction and misarrangement error.

In conclusion, the word " "either Jake or Peggy Zale must quickly fix the fax" is correct

Read more about conjunction

brainly.com/question/8094735

Which part of the formula is the argument?

=COUNTIF(A1:E59, "Greene City")

=

()

COUNTIF

A1:E59

Answers

Answer:

e on edege

Explanation:

just took the question on edge

Answer:

Guy above is right!

Explanation:

A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

A Windows user is locked out of her computer, and you must log into the local administrator account HelpdeskAdmin. Which would you use in the username field?

Answers

Answer: .\HelpdeskAdmin

Explanation:

If you wanted to log in as the local administrator then for the Username put a dot (.) and a backslash (\) in front of the Admin username.

The dot(.) will ensure that Windows knows that you are logging into a local computer as the administrator and so will grant you access. The relevant username therefore is, ''.\HelpdeskAdmin''.

I will use  .\HelpdeskAdmin as the username field.

What is a username field?

The username-field is known to be a kind of command that is said to specifies the value for the name that shows the characteristics in the login form and it is one that identifies the username field.

Note that the use of the .\HelpdeskAdmin as the username field is the right thing to do as the dot(.) will make sure that the Windows knows that the user is logging into a computer as the administrator.

Learn more about  local administrator from

https://brainly.com/question/14364696

If you want Nud3s add me on sc Kermit4lyfe1

Answers

Answer:

que pinga this is a hw website not snap

Explanation:

bro are you okay umm

Write a program that asks the user to enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663.

Answers

In python:

number = input("Enter a 10-character phone number: ")

for i in number:

   if i.isalpha():

       if i == "A" or i == "B" or i == "C":

           i = "2"

       elif i == "D" or i == "E" or i == "F":

           i = "3"

       elif i == "G" or i == "H" or i == "I":

           i = "4"

       elif i == "J" or i == "K" or i == "L":

           i = "5"

       elif i == "M" or i == "N" or i == "O":

           i = "6"

       elif i == "P" or i == "Q" or i == "R" or i == "S":

           i = "7"

       elif i == "V" or i == "T" or i == "U":

           i = "8"

       elif i == "W" or i == "X" or i == "Y" or i == "Z":

           i = "9"

   print(i, end="")

I hope this helps!

Code:

def phonenumber():

alpha = ['A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z']

n =[2,2,2,3,3,3,4,4,4,5,5,5,6,6,6,7,7,7,7,8,8,8,9,9,9,9]

phone = input('Enter phone number in format of XXX-XXX-XXXX : ').upper()

index = 0

for index in range(len(phone)):

if phone[index].isalpha():

print (n[alpha.index(phone[index])], end = ' ')

else:

print (phone[index], end = ' ')

phonenumber()

Compilation output is attached below:

Learn More:https://brainly.com/question/15687460

The purpose of performance profiling (experimental analysis) is to measure the program/algorithm performance. Assume that you have performed an experimental analysis of an algorithm, and profiling returned the following
times: for instances of sizes 2^10, 2^11, 2^12, 2^13, 2^14
the corresponding times are approximately 300 , 510 , 905 , 1750 , 3305 milliseconds.
In these collected running times, there is an extra overhead resulting from clocking program performance and OS functions calls, and this overhead has to be considered in analyzing data. That is, the measured time consists of two components: the time for executing the operations, plus the overhead from profiling.
The estimated overhead due to profiling is about 100 milliseconds independently of the input size. (that is, 100 is always an additive ``constant'' in the collected times).
Based on these experimental results, what is the running time, as a function of the problem size, for executing this algorithm? (c is a constant).
A. O(underroot(n)).
B. O(n^2).
C. O(n).
D. None of the listed.
E. O(n log n).

Answers

Answer:

C. O(n).

Explanation:

for better understanding, the os is a program that helps in telling how much resources can be used and when processor can be accessed.

to each programme data structures would load and unload every time that a programme is to be run.

while a programme is being managed there would be extra overheads and based on whatever type of os or programme that this is, it may or may not have fixed overhead

from our question overhead is fixed at 100ms

we have,

net time as: 300-100, 510-100, 905-100, 1750-100, 3305-100,

which is, 200, 410, 805, 1650, 3205

when we double 2¹ to 2¹¹ to 2¹² etc, the programme ran is also doubling

this says that run time is same as size of instance n

O(n)

Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() print() sort() order()

Answers

In python, the sort() function will alphabetically sort a list of strings

To write a block of code that will organize a list of items alphabetically  In python, the sort() function will alphabetically sort a list of strings.

What is python?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of paradigms for programming, including functional, object-oriented, and structured programming.

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Sorting in Python simply means putting the data in a specific format or order. The order of the data pieces can be sorted either ascendingly or descendingly. Python programming contains certain built-in functions that allow you to sort the list's elements, just like C++ and Java.

Therefore, Thus option (C) is correct.

Learn more about python here:

https://brainly.com/question/18502436

#SPJ2

40 POINTS IF YOu ANSWER FOR EACH STEP.
When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer with a quad core processor and has recently upgraded his RAM.

Apply the troubleshooting methodology to help DaJuan understand and resolve his problem. The steps of the methodology are listed for you. Copy them into a document and use them to write suggestions for DaJuan at each step.

1.Identify the Problem
2.Internet Research
3.Establish a Theory of Probable Cause
4.Test the Theory
5.Establish a Plan of Action
6.Implement the Solution or Escalate
7.Verify Full System Functionality
8.Document Findings.

Answers

Answer:

4 beeps indicate a Memory Read / Write failure. Try re-seating the Memory module by removing and reinserting it in the slot. This could mean it could've just jiggled loose after a while or dust, there could be a hundred other problems but those are the two most common.n

Explanation:

Write code that Uses the range() in a for loop to iterate over the positions in user_names in order to modify the list g

Answers

Answer:

Explanation:

The range() function is a built-in function in the Python programming language. In the following code, we will use this function to iterate over all the positions in the array called user_names and add them to the list g. (assuming that is what was meant by modifying the list g)

for i in range( len(user_names) ):

   g.append(user_names[i])

This simple 2 line code should do what you are asking for.

Given the dictionary, d, find the largest key in the dictionary and associate the corresponding value with the variable val_of_max. For example, given the dictionary {5:3, 4:1, 12:2}, 2 would be associated with val_of_max. Assume d is not empty.

Answers

Answer:

Here is the Python program:

d = {5:3, 4:1, 12:2}

val_of_max = d[max(d.keys())]

print(val_of_max)

Explanation:

The program works as follows:

So we have a dictionary named d which is not empty and has the following key-value pairs:

5:3

4:1

12:2

where 5 , 4 and 12 are the keys and 3, 1 and 2 are the values

As we can see that the largest key is 12. So in order to find the largest key we use max() method which returns the largest key in the dictionary and we also use keys() which returns a view object i.e. the key of dictionary. So

max(d.keys()) as a whole gives 12

Next d[max(d.keys())]  returns the corresponding value of this largest key. The corresponding value is 2 so this entire statement gives 2.

val_of_max = d[max(d.keys())] Thus this complete statement gives 2 and assigns to the val_of_max variable.

Next print(val_of_max) displays 2 on the output screen.

The screenshot of program along with its output is attached.

True or false? The following deterministic finite-state automaton recognizes the set of all bit strings such that the first bit is 0 and all remaining bits are 1’s.

Answers

Answer:gjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj

Explanation:

Kara's teacher asked her to create a chart with horizontal bars. Which chart or graph should she use?

Bar graph
Column chart
Line graph
Pie chart

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is the Bar graph.

Because we use this chart type to visually compare values across a few categories when the charts show duration or when the category text is long.

However, we can present information similarly in the bar graph and in column charts, but if you want to create a chart with the horizontal bar then you must use the Bar graph. In an Excel sheet, you can easily draw a bar graph and can format the bar graph into a 2-d bar and 3-d bar chart.

A column chart is used to compare values across a few categories. You can present values in columns and into vertical bars.

A line graph chart is used to show trends over months, years, and decades, etc.

Pie Chart is used to show a proportion of a whole. You can use the Pie chart when the total of your numbers is 100%.

Answer:

Bar graph option A

Explanation:

I did the test

Which of the following is NOT solely an Internet-based company?
Netflix®
Amazon®
Pandora®
CNN®

Answers

Answer:

I think it's Pandora, though I am familiar with others

Answer:

CNN

Explanation:

A CPU with a quad-core microprocessor runs _____ times as fast as a computer with a single-core processor.

two

three

four

eight

Answers

Four is the rught answer i don’t think so

Answer:

four

Explanation:

quad means four so it runs four times faster

create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python

Answers

Answer:

success = -10 <= number <= 10

Explanation:

I check that -10 is less than or equal to number, and number is less than or equal to 10.

Other Questions
Art Deco demonstrated a love forA. simplicityB. opulence and applied decoration.C. brute design graph y = -3/2x - 3 . Why is Winston Churchill important 10. Which of the following is NOT correctly matched?A. Salt: Na and C: ElementB. Water: H and O: CorapoundC. Carbon dioxside: C and O: Compound D. Magnesium chloride: Mg and C: Compound HELP 15 POINT AND WILL MARK BRIANLYEST. Emma said that when you multiply three negative decimals, the product will be positive.Use these numbers to answer the questions:-2.5, -3.8, -2.7, 4.5Part A: Is Emma's statement always true, sometimes true, or always false? Write two equations to support your answer. (10 points)Part B: Write a rule for multiplying three negative decimals. (5 points)Part C: Emma changed her statement to say that when you multiply two negative decimals and a positive decimal, the product will be positive. Is Emma's new statement always true, sometimes true, or always false? Write two equations to support your answer. (10 points) CONSTRUCTED-RESPONSE ITEM 14. Four people each deliver food to people's homes. 19 Constructed Responses.. Curtis charges a flat fee of $2.50 for each delivery plus $0.20 per mile for each mile he drives. For one delivery, Curtis drives 6 miles. ... A. How much does Curtis charge to deliver the food? Help the pic is right here Solve for x.X + 5 = 2xOX=3OX=-3OX=-5Ox=5 girl idk lamsoaodhaudbiabduwia i spam ur dad\ pick an art work that you feel reveals technology Mr Store who runs his photocopy business working 8 hours per day process 100 scripts. He estimates his labour cost to be 9 per hour. Also he has estimated that the total material cost for each script is approximately 2; while the daily expenses are 28. Calculate the multifactor productivity. In an effort to increase the rate of the photocopy process to 150 scripts, he decides to change the quality of ink thus raising the mate- rial cost to 2.5 per day. Is the new productivity better than before? If Mr Store would like to increase the photocopy process to 150 scripts without sacrificing the initial multifactor productivity, by what amount has the material costs to be increased? Can someone help? I need a answer by 10/29 How does an object's mechanical energy change as its speed (velocity) increases? please will give brain Select all of the following sets of angles that are possible for a triangle, please help me what level of protein structure is found in most enzymes and hemogoblin Your neighbor is asking you to invest in a venture that will double your money in 7 year(s). Compute the annual rate of return that he is promising you? Select the correct answer from each drop-down menu.Brenda is a crime scene investigator. She believes there is blood at the scene of the crime but needs to confirm her initial findings. Which of thefollowing techniques should she use to find probable evidence of blood and confirm that it is indeed blood?Brenda should uses ato confirm that it is indeed blood.test to find probable evidence of blood. If she does so, she should use a test Choose whether the following contains a conditional argument, another type of argument, or is not an argument. "Federal prosecutors will probably call a former doctor for Barry Bonds as a witness if Bond's perjury and obstruction of justice case goes to trial, according to court documents made public Thursday" (Schmidt 2007, C13). Bond's case will go to trial, so prosecutors will call a Bond's former doctor.A. Argument - ConditionalB. Argument - not ConditionalC. Not an argument A gardener has 27 pansies and 36 daisies. He plants an equal number of each type of flower in each row. What is the greatest possible number of pansies in each row?Please help!