Answer:
true
Explanation:
in the dictionary they mean the same thing
Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from the database, and describe your observation.
Which one of the following is small and portable?
• Server
• Notebook
• Mainframe
• Desktop
Answer:
server is small and portable
how can computers be a threat to public safety??
help asap marking brainiest
When you create a _____ query, the value the user enters in the dialog box determines which records the query displays in the results. a. parameter
When a parameter query is created, the value entered in a dialog box by an end user determines the record that would be displayed in the results.
A query refers to a computational request for data (information) that are saved either in a database table, from existing queries, or from a combination of both a database table and existing queries.
Basically, there are four (4) main types of query and these include:
Select query.Action query.Aggregate query.Parameter query.A parameter query is designed and developed to display a dialog box that prompts an end user for data or field criteria, which determines the record that would be displayed in the results.
Read more: https://brainly.com/question/23388493
An engine that creates ignites fuel with highly compressed air.
Explanation:
An engine that creates ignites fuel with highly compressed air. air engine
A machine that converts energy to useful work.
Answer:
heat engine
A heat engine is any machine which converts heat into useful work for example, a steam engine or a car engine. Real heat engines are complex and there are many ways of converting heat energy into useful work. We can abstract and generalise the workings of any heat engine into three parts:
Explanation:
CAN I GET BRAINLIEST
Which of the following can you do after switching to Outline view? Select all the options that apply.
a. Change the level of text.
b. Change the order of slides.
c. Move text within a slide.
d. View an outline of the presentation.
On PowerPoint, the tasks that can be performed after switching to Outline view include:
a. Change the level of text.
c. Move text within a slide.
d. View an outline of the presentation.
PowerPoint can be defined as a software application (program) that is generally designed and developed by Microsoft Inc., to avail its end users an ability to create multiple slides containing textual and multimedia information which can be used during a presentation.
Generally, there are five (5) main view that are available in PowerPoint and these include:
Normal viewReading viewNotes pageSlide sorterOutline viewAn outline view allows an end user to see a whole (entire) presentation in logical order. Thus, the presentation is displayed as an outline comprising the titles and main text from each slide of the presentation.
Hence, the tasks that can be performed after switching to Outline view include:
1. Change the level of text.
2. Move text within a slide.
3. View an outline of the presentation.
Read more: https://brainly.com/question/19543735
Without proper synchronization, which is possible, a deadlock, corrupted data, neither or both? Give reasons for your answer.
need answer pls
Without proper synchronization, corrupted data is possible due to the fact that a shared datum can be accessible by multiple processes.
Data synchronization simply means the idea of keeping multiple copies of dataset in coherence with one another in order to maintain data integrity. It's the process of having the same data in two or more locations.
Without proper synchronization, corrupted data is possible because a shared datum could be accessed by multiple processes without mutual exclusive access.
Read related link on:
https://brainly.com/question/25640052
.tag is used to draw a horizontal line
Answer:
<hr> tag.
Explanation:
<hr> tag makes a line along the webpage :)
Project managers have the overall responsibility for planning, executing, and completing a project. (3 points) True False
Can someone pass me Unit 2 Basic Animations from CMU CS ACADEMY, I'll pay you if you pass it to me.
Answer:
i could but it depends on how much pay
Explanation:
Answer:
ii have the awmsers
Explanation:
unit two
# speedX should be -5 and speedY should be -25.
### Fix Your Code Here ###
Circle(350, 350, 50, fill='ghostWhite', border='black')
ballStitches = Oval(350, 350, 50, 95, fill='ghostWhite', borderWidth=3, dashes=True,
border=gradient('red', 'red', 'red', 'ghostWhite'))
gloveThumb = Oval(260, 375, 75, 120, fill='brown', border='black', rotateAngle=25)
glove = Oval(200, 375, 130, 150, fill='brown', border='black')
# This moves the ball to be 250 away from the mouse in the x-position.
ball.centerX = glove.centerX + 250
ball.centerY = mouseY
# Move the ball stitches to where the ball is.
### Place Your Code Here ###
ball=Circle(350, 350, 50, fill='ghostWhite', border='black')
Your company is building a new architecture to support its data-centric business focus. You are responsible for setting up the network. Your company's mobile and web-facing applications will be deployed on-premises, and all data analysis will be conducted in GCP. The plan is to process and load 7 years of archived .csv files totaling 900 TB of data and then continue loading 10 TB of data daily. You currently have an existing 100-MB internet connection. What actions will meet your company's needs
The actions will meet your company's needs is to Lease a Transfer Appliance, upload archived files to it, and send it to oogle to transfer archived data to Cloud Storage.
Data centric is simply known to be an architecture where data is said to be of primary and permanent asset, and applications is temporary.
Businesses is all about functionality, and as such, firms often buys or build application systems.Each application system is known to have its own unique data model, and its code is often linked with the data model used.
Conclusively, Transferring large datasets needs manpower that is the right team, planning early, and testing your transfer plan before its use.
Learn more data-centric business from
https://brainly.com/question/21810261
Given an array of String objects, use streams to count how many have a length less than or equal to three. StringLengthDemo.java
The array of String objects, use to count how many have a length less than
or equal to three is as follows:
string_object = ["brainly", "mathematics", "boy", "girl", "us", "joy", "key"]
x = []
for i in string_object:
if len(i) <= 3:
x.append(i)
print(len(x))
The code is written in python
The string array is declared.
Then an empty variable array is declared.
Then we loop through the array.
If any of the string length in the array is less than or equals to 3 , we append it to the empty array.
Then finally, we print the counted number of strings
learn more: https://brainly.com/question/22081416?referrer=searchResults
Fill in the blank with the correct response.
_____is considered a reliable source of free and trial software.
How has technology has impacted Ghana
Answer:
there are many ways that technology has impacted Ghana.
1. The republic of Ghana have been making some plans that can help with economic growth in the last decade.
2. Ghana has a higher productivity rate than the neighboring nations.
3. The republic of Ghana made a shift onto incentive-driven economic policies, so that way it could help improve leadership.
Which two are computing devices? (Choose two)
A. Unix
B. Laptop
C. Server
D. Mac OS
Answer:
ANS is no.B and no. C
hope it helps
Edhesive 4.3 code practice question 2
What is a storage device? Give one example of Primary magnetic storage, Primary optical storage and Portable storage.
Answer:
fácil solo ve a tu almacenamiento y aprende
Can someone help me explain Nvm scheduling in operating systems?
Low-power and short-latency memory access is critical to the performance of chip multiprocessor (CMP) system devices, especially to bridge the performance gap between memory and CPU
What does “The Principle of Least Privilege” mean as applied to security?
Answer:
The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions. ... Least privilege enforcement ensures the non-human tool has the requisite access needed – and nothing more.
Explanation: let me know if this helps!
What are two drawbacks of using netbook ? (Choose two)
A. Portability
B. Screen size
C. Boot up time
D. Storage capacity
Answer:
D and C
Explanation:
I would say D and C because they don't have fast processors they normally only use Celerons. and normally they only have a 64GB internal SSD.
It's definitley not a because they are extremely portable and have amazing battery life
I don't think its B because they have small screens but you can also get them in bigger 14" variants which is normally the generic size.
If you will choose among the multimedia mentioned, what will you use to promote this advocacy: Stop strand discrimination. We are all equal.
The media that I would choose to promote the arrest of discrimination would be television, radio, newspaper, and social media.
When we want to transmit a message to many people, the most appropriate thing is to use mass media, that is, media that have a large coverage of people, such as:
TVRadioNewspapers
On the other hand, in recent years people can expose their ideas or disseminate information through social networks, because their messages can become a trend among people and have an even greater reach than conventional media.
Another positive aspect of social networks is that they reach a greater diversity of people with different characteristics such as:
ReligionPolitical positionSocioeconomic positionEducational levelAgeSexBirthplaceTherefore, to spread an anti-discrimination message the best option is to spread it through mass media such as television, radio, newspapers and social networks.
Learn more in: https://brainly.com/question/23228635
What was the goal of the COMPETES Act of 2007?
Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."
Answer:
Increasing federal investment in scientific research to improve U.S. economic competitiveness.
Explanation:
Hope this helps!
identify another natural cyclic event, other than phases and eclipses, that is caused by the moon's gravitational pull on earth
Answer:
TEKS Navigation
Earth Rotation.
Moon Phases.
Tides.
Cyclical events happen in a particular order, one following the other, and are often repeated: Changes in the economy have followed a cyclical pattern. an example would be pamdemic and vircus it is belived that a new pamdemic starts every 100 years.
Explanation:
The rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth
The gravitational pull of the moon's causes the two bulges of water on the Earth's oceans:
where ocean waters face the moon and the pull is strongestwhere ocean waters face away from the moon and the pull is weakestIn conclusion, the rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth
Read more about gravitational pull
brainly.com/question/856541
Which invention made it possible to have an entire computer for a single circuit board
Answer:
ok lang
Explanation:
Please help me !!!!!!!
Answer:
Explanation:
CTRL+F
To open the Find pane from the Edit View, press Ctrl+F, or click Home > Find. Find text by typing it in the Search the document for… box. Word Web App starts searching as soon as you start typing
The major advantage of the Waterfall approach to software development is the _____. Group of answer choices high degree of management control high level of user interaction throughout the process rapid pace of product iterations informality of ongoing evaluation
A major advantage of the waterfall approach in software development life cycle (SDLC) to software development is the: A. high degree of management control.
What is software development life cycle (SDLC)?
Software development life cycle (SDLC) can be defined as a strategic process (methodology) that defines the key steps or stages that are for the creation and implementation of high quality software programs (applications).
The types of models in SDLC:
Generally, there are six (6) types of models in software development life cycle (SDLC) and these are:
Agile ModelV-Shaped ModelIterative ModelSpiral ModelBig Bang ModelWaterfall ModelWhat is a waterfall model?
In SDLC, a waterfall model refers to a process which involves the sequential breakdown of software development into linear stages (steps or phases). Thus, its development stages takes a downward flow like a waterfall and as such, each stage must be completed before starting another and without any overlap in the process.
In conclusion, a major advantage of the waterfall approach in software development life cycle (SDLC) to software development is the high degree of management control because its development stages and there isn't any room for overlap.
Read more on waterfall model here: https://brainly.com/question/18369405
11.23. Sort the words in a sentence Define a function called sorted_word_list, which takes a sentence (a string) as a parameter. Complete the function to make and return a list of the words in the sentence in sorted order.
The function to make and return a list of the words in the sentence in sorted order is as follows:
def sorted_word_list(x):
sorted_characters = sorted(x)
return list(sorted_characters)
print(sorted_word_list("string"))
The code is written in python .
We declared a function named sorted_word_list with a parameter x. The parameter accept a string.
sorted_characters is a variable that stores the sorted strings.
Then we return a list of the sorted string using the return statement.
Finally, we call the function using the print statement.
The values that are bolded in the code are python keywords.
read more: https://brainly.com/question/13973680?referrer=searchResults
Natural language generation is focused on?
While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.
- BRAINLIEST answerer
Partially-filled Arrays
Write the function rindby() which stands for remove mark>if not divisiby by. The function removes all elements from the array that are not evenly divisible by the argument n. You can find out if a number is evenly divisible by n using the remainder operator: % (there will be nothing left over).
The function returns the number of items removed or -1 if the array was originally empty.
The function takes 3 arguments:
the array of int that may be modified.
the size of the array (use size_t as the type)
the int n used to check for divisibility
Here are two short examples:
int a[] = {2, 3, 4, 5, 6};
size_t size = 5;
int removed = rindby(a, size, 2);
// removed->2, a = [2, 4, 6], size = 3
size = 0;
removed = rindby(a, size, 3);
// removed-> -1, no change otherwise
In the first case, the numbers 3 and 5 are removed because they are not divisible by 2. Only the numbers that are divisible by 2 are left in the array.
In the second, size has been set to , so the input array is empty and the function returns - 1.
Exam C++ Quick Reference
p1.cpp
1 #include // size_t for sizes and indexes
2 using namespace std;
3
4 ////////////////WRITE YOUR FUNCTION BELOW THIS LINE ///////////////
5 int rindby(int all, size_t& size, int number)
6 {
7 int result;
8 // Add your code here
9 return result;
10 }
11
Answer:
um
Explanation: