Answer:
ToolBox.
Explanation:
A label control may be added to a form by double-clicking on the Label control icon in the ToolBox window.
difference between multidimensional arrays and an example
Answer:
The generic data structure of a n-dimensional array is a tensor.
An example with 3 dimension can be a cube that contains the following dimensions: users, items, time. That cube can represent the interactions of users with verifiied pages of public interests (influencers or company/media pages) in time slots (e.g. weekly timeslots).
Explanation:
You can represent in a sparse 3-dimensional array (tensor) the combinations of which user interacted with wich item in a given timeslow.
anyone wanna review my pc pls, its my first time building one and i just want one more look over at my part picker pls. https://pcpartpicker.com/list/2m4KNP
Answer:
sorry I cannot wanna review
The purpose of special effects in business publications is to increase the effectiveness of the communication. True False
How can the Calendar view be customized?
Answer:
A. The layout command group is used to change the views.
Explanation:
Answer:
it is a
Explanation:
Your Task
Think of an area that interests you: sports, arts, entertainment, international relief efforts, government, careers, or the weather.
Think of a question you would like to answer. Is it better to wait until the battery is low before you recharge your smartphone? How does a streaming service like Netflix or Hulu decide which shows to offer?
Look for a website where someone already collected a large quantity of data to answer that question. While commercial big data sets may have tens of thousands of values, for this project, look for a data set with at least 100 values.
You are not going to write a program to analyze these data because you have not yet covered how to read data files. You can describe how the researcher(s) who collected the data used them to answer your question.
To answer a question through commercial big data sets related to an area of interest, such as the question "How does a streaming service decide which programs to offer" It is essential to understand the definition of big data and what such data is used for.
What is big data?It corresponds to a tool for processing a large volume of data with strategic objectives for collecting, organizing and interpreting the data obtained, to obtain insights and aid in decision making.
Therefore, for businesses, big data is a strategic tool to help manage more focused and aligned with organizational objectives, being used by the marketing department to segment the market and generate value and positioning.
Find out more about big data here:
https://brainly.com/question/19049345
Lisa is developing a Web application using a framework and wants to include interactive elements using JavaScript. She decides to use a JavaScript library too but she is on a tight budget and cannot pay for a license. Which of the following would be the best option for Lisa to access a library?
a. Borrow the JavaScript code from another site
b. Use Kendo UI
c. Use the jQuery UI library
d. Use JavaScript code from the Foundation library
Answer:
The best option for Lisa to access a library is to:
c. Use the jQuery UI library.
Explanation:
The jQuery UI is an interactive user interface with the interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library. It is used for building highly interactive web applications. It comes free and is an open-source software distributed by the jQuery Foundation under the MIT License. The library, jQuery UI, was first published in September 2007.
help me choose framework in programming
Will there be another season in Star vs the forces of evil?
Answer: no the creator anounced that there will not be a fifth season
Explanation:
Making __________ cache a part of the processor caused manufacturers to move from sockets to slots in the late 1990s
Answer:
The description of the discussion has been illustrated throughout the explanation segment elsewhere here.
Explanation:
Processors started to incorporate constructed L2 cache, acquired as completely separate chips from multiple vendors of Static Random access memory chip. This same processor and after that usually consists not of even single, and therefore of many other processors, that everything positioned upon its motherboard, which would then be inserted into another motherboard socket.Susan works for an agency that manages artificial satellites in space. She suggested that they should use the satellites to generate thematic maps of different areas in her state. What does Susan actually want to create by using the satellites for thematic maps?
Susan wants to create ______ by using the satellites for thematic maps.
Answer:
satellite imagery
Explanation:
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using encryption to meet our security requirements
Answer:
Follows are the solution to this question:
Explanation:
Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.
Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.
Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.
They can search online for various data encryption. The changes over the last 25 years also actually occurred:
Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.
Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.
World War II would also see Enigma code, the perfect example of analog encryption.
Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.
Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.
Without it.
AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.
flowchart is written using english language.
true or false
the answer is true hope it helps
Which HTML tag is used to add an ordered list to a web page?
Answer:
<ol> Defines an ordered list
Answer:
<ol>
Explanation:
Fix the code so that the list of elements that end with "e".
// //Q2: Create a list of elements that end with the letter "e"
// //Hint: The last index item is always length-1
var nameElementE = [];
for (var i = 0; i < nameElement.length; i++) {
if (nameElement[i].substring(0,1)=="E"){
appendItem(nameElementE, nameElement[i]);
}
}
console.log(nameElementE);
// //Console.log out your final list
Answer:
It's
B
Explanation:
An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine- learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, the more accurately the service will identify them. Which of the following biometrics will MOST likely be used, without the need for enrollment?
a. Voice
b. Gait
c. Vein
d. Facial
e. Retina
f. Fingerprint
Answer:
The correct answer is D. Facial biometrics.
Explanation:
A face recognition system is a computer program for identifying people from photos or videos. Face recognition is performed according to the geometric characteristics of the face and is compared with a database. It is also possible to determine the sex and estimate the age of persons. The main advantage of these systems is that the people who are going to be recognized by it do not need to enroll or provide their data on some previous basis, but, on the contrary, this system can extract images even without the consent of those investigated .
Given sphereRadius and piVal, compute the volume of a sphere and assign sphereVolume with the result. Use (4.0 / 3.0) to perform floating-point division, instead of (4 / 3) which performs integer division.
Volume of sphere = (4.0 / 3.0) Ï r3 (Hint: r3 can be computed using *)
import java.util.Scanner;
public class SphereVolumeCalculator {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
double piVal = 3.14159;
double sphereVolume;
double sphereRadius;
sphereRadius = scnr.nextDouble();
*insert code*
System.out.println(sphereVolume);
}
}
Answer:
The code to this question can be defined as follows:
sphereVolume = (4.0/3.0)*piVal*sphereRadius*sphereRadius*sphereRadius; // defining a double variable sphereVolume that calculate and hold its value
Explanation:
Please find the complete code in the attachment file.
In the code, a class "SphereVolumeCalculator" is declared, and inside the main method Three double variable "piVal, sphereRadius, and sphereVolume" , in which "piVal" is used to hold a value, in the next step scanner class object is created for holding the "shereRadius" value and the sphereVolume is used for calculate and print its value.
How much tabs can you open with 8GB of ram?
Answer:
Infinite.
Explanation:
Every Tab on chrome generates separate process in Task Manager. So depends on your RAM how many tabs you want to open.At one limit all of your RAM occupied. That's the limit for you.
Consider the following method, which is intended to return the index of the first negative integer in a given array of integers. public int positionOfFirstNegative(int[] values) { int index = 0; while (values[index] >= 0) { index++; } return index; } What precondition is needed on the values array so that the method will work as intended?
Answer:
The answer is "The array values must contain at least one negative integer".
Explanation:
In the above-given code, a method "positionOfFirstNegative" is declared, that accepts an array "values" as a parameter, inside the method an integer variable index is declared, that use in the while loop to check array value is greater than equal to 0, if the conditional is true it will increments the index value and return its value, that's why in this question array value include at least one negative value.
Write a program that will take the three test grades as input and tell what her average test grade is?
Answer:
Explanation:
The following code is written in Python programming language and as requested takes three int/float variables. Then it sums up the three grades and places the result into a variable called sum. Then it creates a variable called average and divides the sum by three to get the actual average. Finally, it prints the value of the average variable to the user.
def average(gradeOne, gradeTwo, gradeThree):
sum = gradeOne + gradeTwo + gradeThree
average = sum / 3
print(average)
This lesson discussed some changes seen in very young children using computers. Which of these was mentioned in the lesson as
being associated with increased screen time?
O improved development of mental abilities
O poorer development of mental abilities
O more hours of sleep at night
O less hours of sleep at night
Answer:
B poorer development of mental abilities
Explanation:
Very young children were found to have poorer development of mental abilities with increased screen time.
Poorer development of mental abilities. The correct option is B.
What are mental abilities?
The ability to learn or remember information, the capacity to comprehend the context and implications of your actions, and the possession of the attributes (capacity, ability, power) necessary to complete a task are just a few examples of the many varied definitions of mental ability.
A child's physical health has been discovered to be negatively impacted by excessive use of electronics or computers. According to one study, children who watched more television and played more video games were more likely to develop obesity, sleep disorders, and stomach problems. The study of languages may be hampered by excessive TV viewing.
Therefore, excessive use of computers has adverse effects on the mental health of children.
To know more about mental abilities follow
https://brainly.com/question/3951300
#SPJ2
A message can be...........
differently by different people.
Answer:
Hope this help, did some research :D
Explanation:
" Audiences play a role in interpreting media messages because each audience member brings to the message a unique set of life experiences. Differences in age, gender, education and cultural upbringing will generate unique interpretations. "
what came first the chicken or the egg?
Answer:
The Egg comes first.Explanation:
The egg is the first stage of a chicken after the mother births the egg. she must protect it until it hatches. once it hatched, a chick will come out the egg. then, the chick will start to grow into a chicken.
Answer:
The chicken
Explanation:
To birds made a BIRD egg, but unexpected a chicken came out, which then made chicken eggs
Analytical Engine was designed in
Answer:
1838
Explanation:
Analytical Engine was designed in 1838. The designer is Charles Babbage, who was an English mathematician and widely known for his innovation in the engineering world. He is often considered to be the father of computers.
Following his inability to finish the creation of Difference Engine, Charles Babbage would later when ahead to conceived the Analytical Machine in 1834
He eventually finished the design of an Analytical Machine by 1838.
Answer:
Charles Babbage
Explanation:
Just did test
Why to use different passwords for social media accounts? Use in your own words.
Answer:
well for one reason some people could guess your password and look at your stuff and i wouldn't want to be lame and have the same password it's fun making your own password.
Explanation:
Answer:
For protection
Explanation:
So a person cant hack u...
If a person knows one of ur acc pswrd, and they know u have a diff one, they can try to use the same pass from the first one to be able to log into ur other social media account. So it's best to use different ones to prevent hacking
Hope this helped!
Sry i took long, i wrote something but it kept sayin that it included sum inappropriate
Which of the following describes the purpose of a goal? Choose all that apply.
It provides a marker by which to measure performance.
It doesn’t specify a direction.
It identifies guidelines of behavior.
It documents a commitment for action.
How is computer science used in entertainment? (Please don’t use GoogIe)
Answer:
If you are talking in general then you could say computer science is what makes up most indie games. Games like Spelunky and Undertale are games that were programmed to make the characters have movement and abilities. You can also make websites that could have interactive parts or areas that show some kind of media using html with a bit of other programming languages.
Computer science is used in entertainment as the knowledge of the use of computer is used in making animations and movies that people can just relax and watch.
How is computer used in entertainment?Computers is known to be an electronic machine that helps use to have a lot of access to a lot of devices such as keyboards, etc. that can be used for entertainment.
Conclusively, Computer games are known to be used mostly for entertainment because its users can manipulate it to their taste. The use of computer is therefore important in entertainment.
Learn more about computer from
https://brainly.com/question/24540334
The back panel is the best place for which of the following?
Question 3 options:
charts appropriate for the brochure
main title and purpose of brochure
contact information and maps
touching story about cause
Answer:
Imma contact info and maps
Explanation:
It's the most reasonable
Answer:
contact information and maps
Describe how sharing and collaborating a spreadsheet can help the author of the spreadsheet.
hurry and answer you will get a brainly this is for a school assignment
The author can save an Excel workbook as a shared workbook if they want multiple users to work in it at once. Then, users can enter data, add rows and columns, modify calculations, and alter formatting.
What is spreadsheet?Data that has been arranged into rows and columns can be stored, displayed, and edited using spreadsheet software. The spreadsheet is one of the most used tools for personal computers. A spreadsheet is typically used to record numerical data and brief text strings.
A spreadsheet is a computer program used for tabular data organization, calculations, and storage. Spreadsheets were developed as electronic replacements for the old-fashioned paper accounting spreadsheets. The software runs on the data entered into a table's cells.
Thus, The author can save an Excel workbook as a shared workbook.
For more information about spreadsheet, click here:
https://brainly.com/question/8284022
#SPJ2
When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
Answer: False
Explanation:
The statement in the question is wrong. When measuring processor speed, a megahertz is slower than a gigahertz.
We should note that:
1 megahertz = 1 million cycles per second
1 gigahertz = 1 billion cycles per second.
Therefore, we can see that a gigahertz is faster than a megahertz.
Digital cameras have electronic sensors that record information to create pictures. What acronym refers to the sensitivity
of the electronic sensor?
DPI
ISO
LED
DMD
Answer:
ISO
Explanation: