Answer:
c. she likes cooking over a campfire
Explanation:
it says it right in the story
why are there different types of input devices?
Answer: different inputs are made for different devices for hearing
Explanation:
Tormund wants to build a proxy firewall for his two computers, A and B. How can he build it?
A. by connecting computer A with computer B and computer B to the proxy firewall
B. by connecting a different firewall to each computer
C. by connecting computer A to computer B through the proxy firewall
D. by connecting only one of the computers to the firewall
Answer:
The most effective way for Tormund to build a proxy firewall would be to connect computer A to computer B through the proxy firewall. This would ensure that all traffic between the two computers would go through the firewall, and that the firewall would be able to filter and block any unwanted traffic. Additionally, this setup would allow Tormund to easily monitor and manage all traffic going between the two computers.
Explanation:
Hope this helps!
Which of the following network topology is most expensive
to implement and maintain?
The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.
What is Network topology?Network topology is known to be a term that connote the setting of the elements that pertains to a communication network.
Note that Network topology can be one that is used to state or describe the pattern of arrangement of a lot of different types of telecommunication networks.
Therefore, The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.
Learn more about network topology from
https://brainly.com/question/17036446
#SPJ1
Which of the following is the most expensive network topology?
(a) Star
(b) Mesh
(c) Bus
A designer creates a mockup of a website homepage for a youth services nonprofit. They incorporate elements that add hierarchy to the design, make text easy to read, and add visual style. What visual design element are they using?
Typography
Iconography
Layouts
Symbology
Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called Layouts.
What in web design is a mockup?An application or web page mockup is seen as a kind of a static design that includes a lot of the final design elements but is said to be not functional.
Note that A mockup often contains some placeholder data and is less polished than a live page. It is found to be helpful to break down each element of the definition.
Through the use of website mockup can help you realize your vision and decide on design concepts before developers begin to work. A sketch is the first step in the web design process before moving on to a wireframe.
Therefore, Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called Layouts.
Learn more about visual design element from
https://brainly.com/question/19584310
#SPJ1
Explain insert a ternary operator.?
Explain insert ternary operator.?
______________________________________
QUESTION;Explain insert ternary operator.?
ANSWER;The ternary operator is an operator that exists in some programming languages,which takes three operands rather than typical one or two that most operators use. lt provides a way to shorten a simple of else block. for example,consider the below JavaScript code. var num =4, msg = "";if (num === 4 )____________________________________
Information overload can put tension on your brain and cause you to feel
A. tired and forgetful.
B. busy and rushed.
C. depressed.
D. addicted.
A brain under stress from too much information might make you feel rushed and busy. Hence, option B is correct.
What is brain?Every physical function, including intellect, memory, emotion, touch, motor skills, vision, breathing, temperature, and hunger, is controlled by the sophisticated organ known as the brain. The spinal cord that protrudes from the brain is part of the central nervous system, or CNS.
In a typical adult, the brain weighs roughly 3 pounds and contains about 60% fat. The remaining 40% are made up of various water, protein, carbohydrate, and salt combinations. The brain does not function like a muscle on its own. It is composed of glial cells, neurons, blood vessels, and nerves.
To get more information about brain :
https://brainly.com/question/11950231
#SPJ1
What is Another name for a digital artist
A programmer
b graphic designer
c project manager
d Manager
Answer: B. Graphic designer
Explanation:
Programmers work with code, Project managers are in charge of planning and organizing different projects for people to do, and Managers manage staff workers.
Graphic designers primarily work on photo editing, video editing, designing logos for brands, etc.
a functions is where a relations has only one _ for every _.
Answer:
A function is where a relation has only one output for every input.
Explanation:
Hope this helps :)
input("Enter a number: ")
print(num * 9)
Note that in the above case, if a person save the input as num,
this will print the input 9 times.
How do you go about this code?Therefore, since there is 9 times:
So
num = input("Enter a number: ")
print(num * 9)
If a person actually want to do a real math calculations, then one need to input needs to be inside the number.
num = float(input("Enter a number: "))
print(num * 9)
This is one that do not bring about any errors where the user do not input a number.
Learn more about coding from
https://brainly.com/question/23275071
#SPJ1
Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.
Sample Run:
Enter the Yards: 3
Enter the Feet: 2
Enter the Yards: 4
Enter the Feet: 1
Sample Output:
Yards: 8 Feet: 0
The program accepts separate fabric lengths in feet and inches and displays the total fabric length in feet and inches.
What is programming?Creating a set of instructions that tells a computer how to perform a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.
The Python 3 program is as follows:
feet_1 = int(input('length in feets : '))
Prompts user to enter feet length of fabric 1
inch_1 = int(input('length in inch : '))
Inch length of fabric 1
feet_2 = int(input('length in feets : '))
Feet length of fabric 2
inch_2 = int(input('length in inch : '))
Inch length of fabric 2
inch_sum = inch_1 + inch_2
Sum of the inches
inch_left = inch_sum%12
Remainder in inches after converting to feets
inch_to_feet = inch_sum // 12
Whole number of the converted inch sum
feet_sum = feet_1 + feet_2 + inch_left
Total sum of the feet length
print('Feet : %d Inches : %d' %(feet_sum, inch_left))
Display the sum
Thus, this can be the format for given scenario.
For more details regarding programming, visit:
https://brainly.com/question/14368396
#SPJ1
Give Seven characteristics of a candidate key.
Answer: A candidate key is a key selected from the set of super keys.
Generally, a candidate key does not have null or empty values and consists of one or many attributes.
According to the above-mentioned student table, the id and phone do not have any redundant attributes.
A candidate key does not have null or empty values and consists of one or many attributes.
There can be more than one candidate keys for a table.
A candidate does not have any redundant attributes.
A candidate key is a super key with no redundant attributes.
Explanation:I hope this helps
Within the manufacturing industry, there are fourteen subindustries. Which of the
following is one of these subindustries?
A) Shipping and warehousing.
B) Petroleum and coal products.
C) Automobile manufacturing.
D) Concrete and steel.
Answer: A or B i done this before but my memorys quite blurry i rekon doing A
Explanation:
Which of the following statements is an example of the Measurable requirement of SMART goals?
a.
I want to graduate.
b.
I want to graduate with a GPA of 3.0 or higher.
c.
I want to graduate with good grades.
d.
I want to graduate someday.
Topology in networking essentially just means how the computers are interconnected with one another.
Answer:
Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field buses and computer networks.
There are five types of topology in computer networks:
Mesh Topology.
Mesh topology is a type of networking where all nodes cooperate to distribute data among each other. This topology was originally developed 30+ years ago for military applications, but today, they are typically used for things like home automation, smart HVAC control, and smart buildings.
Star Topology.
A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.
Bus Topology.
A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.
Ring Topology.
A ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.
Hybrid Topology.
A hybrid topology uses a combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.
.
.
.
Please mark as brainliest.
Answer: In network layout, in terms of drafting RFP's, how computers are interconnected with each other physically, is a physical topology. In terms of how everything is connected to each other with the cables, on paper, that is a logical topology.
Explanation: Physical Topology is related to how the network actually appears as if you were in the room, looking at it. While logical topology, is usually a schematic on paper, showing how all of the devices are connected, which ports are they connected to, what are the Ip's, Mac addys, and such.
What materials are used to make a steel headgear
Answer:
headgear or concrete structure A concise definition of a Headgear, is a steel or concrete structure constructed to facilitate the transfer of men, material and rock from underground as well as the housing of equipment and safety devices used for sinking and productionw
material used to make steel To make pure steel, iron and carbon are needed. On its own, iron is not very strong, but a low concentration of carbon - less than 1 percent, depending on the kind of steel, gives the steel its important properties. The carbon in steel is obtained from coal and the iron from iron ore.
Explanation:
i hope it helped it is from my science book
You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle’s database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don’t know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.
Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision-making.
A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:
Hello, Ms. Roye,
I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.
One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.
I would urge you to rethink your use of this version of Oracle
What is a Memo?
This refers to the written message that is usually used in a professional setting to communicate.
Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.
Read more about memo here:
https://brainly.com/question/11736904
#SPJ1
Which computer-related job duties belong to the discipline of information
technology?
O A Planning, creating, testing, and maintaining applications used by
devices
OB. Planning, creating, testing, and maintaining physical computer
systems
OC. Analyzing organizational operations to find opportunities for
improvement
OD. Analyzing computer systems to protect computer networks from
cyber threats
SUBMIT
Answer:
The answer is D, Analyzing computer systems to protect computer networks from cyber threats.
Explanation:
State two functions of a computer case?
Answer:
Provides a standardized format for the installation of non-vendor-specific hardware.
Protects that hardware and helps to keep it cool.
Explanation:
The computer case serves two primary functions:
Protecting the internal components from damage, dust, and other environmental factors.Providing a framework to hold and organize the internal components and connect them to external devices and power sources.What is a computer case?A computer case, also known as a computer chassis or tower, is a housing that encloses and protects the internal components of a computer, including the motherboard, central processing unit (CPU), power supply, hard drives, and other peripherals.
The case is typically made of metal or plastic and is designed to provide a framework that holds the components securely in place and protects them from physical damage, dust, and other environmental factors.
Computer cases come in a variety of shapes and sizes, including full-tower, mid-tower, and mini-tower designs, and often include features such as cooling fans, front-panel ports, and tool-less installation mechanisms to make it easier to assemble and maintain the components inside.
Learn more about computer here:
brainly.com/question/15707178
#SPJ2
In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a program that reads the width and height of the wall and the number of windows, using the following prompts.
Wall width:
Wall height:
Number of windows:
Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts
Writting the code:import java.util.Scanner;
public class WallArea {
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
final int areaOfWindows = 6;
System.out.print("Wall width: ");
double width = sc.nextDouble();
System.out.print("Wall height: ");
double height = sc.nextDouble();
System.out.print("Number of windows: ");
double numberOfWindows = sc.nextDouble();
double area = (width * height) - (numberOfWindows * areaOfWindows);
System.out.println("Area: " + area);
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2 × radius) Circumference (diameter × π) Surface area (4 × π × radius2) Volume (4/3 × π × radius3) For convenience, the program can import the math module. Below is an example of the program input and output: Radius = 5 Diameter : 10.0 Circumference: 31.41592653589793 Surface area : 314.1592653589793 Volume : 523.5987755982989
A program that takes the radius of a sphere (a floating-point number) as input and then outputs the parameter of the spheres is given below:
The Codefrom math import pi
r = radius
radius = int(input("Radius = "))
print (float("Diameter : " + int(input(float(2 * radius))))
radius = int(input("Radius = "))
diameter = <...calculate diameter...>
print('Diameter =', diameter)
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Which is the best defense against ESD?
< Prev
Stand-off on motherboard
ZIF socket
Ground strap
The best defense against ESD is known to be called Ground strap.
What does grounding strap mean?The ground strap is known to be a term that connote the grounding connection that tends to runs from a vehicle's engine to the area of the negative battery terminal or that of the chassis.
Note that in the case above, both the negative battery terminal as well as the chassis of a said vehicle are known to be grounded.
Therefore, based on the above, one can say that the best defense against ESD is known to be called Ground strap.
Learn more about Ground strap from
https://brainly.com/question/14989495
#SPJ1
I computer use binary, octal, and decimal number system true or false
Answer: No/False
Explanation: Computers are designed to work in binary, which converts hexadecimel numbers into binary, which is 0's and 1's, to then run the functions of a computer. Octal is a programming language used by early IBM. And the decimal number system doesnt really apply seeing as binary already does those equations easily.
1. For the Boolean functions E and F, as given in the following truth table
XYZ E
F
1
1 0
0
1
1
0
0
0
1
1
1
0
1
1 1 0
0
0
0
0
1
1
1
1
00
0
1
1
0
0
0
0
1
0
1
0
1
1
XYZ
XYZ
बोर
xyz
XFF
XFI
XYZ
xyz
Note
letters in bold mean that it's a compliment.
a.
List the minterms and maxterms of each function
b. List the minterms of E and F
c.
List the minterms of E+ F and E.F
d. Express E and F in sum of minterms algebraic form.
e. Simply E and F to expressions with a minimum of literals
Answer:
xxxxxxxxxxxxyyyyyyyyyyyyppppppppp537888264778
If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False
Using pseudocode, provide an algorithm that would test to see if any two people in a group of about 30 people have the same birthday.
(problem is given by the image)
The program that prompts the user for three integers and displays their average as a floating point is given below:
The Code:import java.util.Scanner;
public class ArithmeticSmallestLargest {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int num1;
int num2;
int num3;
int sum;
int average;
int product;
int largest;
int smallest;
System.out.print("Enter First Integer: ");
num1 = input.nextInt();
System.out.print("Enter Second Integer: ");
num2 = input.nextInt();
System.out.print("Enter Third Integer: ");
num3 = input.nextInt();
sum = num1 + num2 + num3;
average = sum / 3;
product = num1 * num2 * num3;
largest = num1;
smallest = num1;
if(num2 > largest)
largest = num2;
if(num3 > largest)
largest = num3;
if(num2 < smallest)
smallest = num2;
if (num3 < smallest)
smallest = num3;
System.out.println("The sum is " + sum);
System.out.println("The average is " + average);
System.out.println("The product is " + product);
System.out.println("Largest of three integers is " + largest + " and the smallest is "+ smallest + ".");
}
}
Read more about java programming here:
https://brainly.com/question/18554491
#SPJ1
Is Computer Science a science? explain
Answer:
Computer Science is a science because it is a systematic and logical approach to discovering how computers work and to solving problems through the use of computers.
Explanation:
Hope this helps!
Answer:
Computer science is considered a science because it involves the study of algorithms and computational systems, which are based on scientific principles such as logic and mathematical principles. It involves the use of scientific methods, such as experimentation and data analysis, to design and develop new technologies and systems. Additionally, computer science research often involves collaboration with other scientific fields, such as biology, physics, and engineering, to solve complex problems and advance scientific knowledge. Overall, computer science is a field that applies scientific principles and methods to the study of computational systems and technologies.
Explanation:
Does the source MAC address match your PC interface?
Answer: Yes, it does
Explanation:
The
tests the ability of a networking technician to install,
maintain, troubleshoot, and support a network, and understand various aspects of
networking technologies, including TCP/IP and the OSI models.
COMPTIA NETWORK+
COMPTIA A+
COMPTIA ACCESS
COMPTIA A+
The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies, including TCP/IP and the OSI models.
Who is a Network Technician?This refers to a person that oversees a network to check and control the vulnerabilities in it.
Hence, we can see that The COMPTIA NETWORK+ tests the ability of a networking technician to install, maintain, troubleshoot, and support a network, and understand various aspects of networking technologies.
Read more about network certifications here:
https://brainly.com/question/14472075
#SPJ1
Answer:compita network+
Explanation:I just did it and got it right big w
Which of the following is true about primitive data types?
A. They can only represent numeric data.
B. Primitives have built in methods.
C. They can hold words and numbers at the same time.
D. They hold only one piece of data at a time.
E. There are a total of 2 primitive types.
Answer:
They hold only one piece of data at a time.
Explanation: I got it right