Answer:
IP adress
Explanation:
the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data
Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:
1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence
file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite
Answer:
she gives 10 dollars an hour
Explanation:
no
Drag each label to the correct location on the image.
Identify the parts of the URL.
World Wide Web
server name
resource ID
protocol
domain name
Answer:
1) Resource ID
2) Server Name
3) Domain Name
4) World Wide Web
5) Protocol
The correct location is Resource ID, Server Name, Domain Name, World Wide Web, Protocol respectively.
What is a website?The Online Etymology Dictionary states that in 1994, the word "website" first appeared in the English language.
It combines "Web," used in the meaning of the Internet, with "Site." The study of word origins and how their meanings changed over time is known as etymology. The web address of every website begins with "http://".
The website may be one of many various forms, such as an e-commerce website, a social media website, or a blog website. Each website serves a unique purpose, but they all have the feature of having numerous linked web pages.
Resource ID, Server Name, Domain Name, World Wide Web, and Protocol are the right locations, accordingly.
Thus, this is the correct answers for the given situation.
For more details regarding a website, visit:
https://brainly.com/question/29777063
#SPJ2
Which is the best autoclicker for godbrigding
Why was slavery more common in South Carolina than in North Carolina?
Check all of the boxes that apply.
Answer:
South Carolina, more south the more farms and agriculture so more farms mean's more workers needed.
Explanation:
The _______ conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).
Which of the following is true regarding computer science careers? There are a limited number of jobs in this field. There are not different job types in this field. The number will increase over the next several years. You must be a programmer to work in this field.
Answer: There are several types of jobs in this field
Explanation: i did the test
The practice of applying technology to address difficult organizational issues is known as computer science. Thus, option D is correct.
What is the carrier in the computer science?Computers and technology have been incorporated into almost every economic sector, industry, and even organization operating in the modern economy, which is why this field is so crucial.
Because it allows me to pursue my two interests in problem-solving and creating engaging experiences, computer science is my field of choice.
I can come up with problems that are unique to a user, create and brainstorm solutions, and then put those ideas into practice through coding.
Computer scientists build, develop, and improve supply chains, content algorithms, and even job application platforms. We are already living in the age of computer science.
As technology grows increasingly pervasive in our lives and the economy, computer science becomes more crucial.
Learn more about computer science here:
https://brainly.com/question/20837448
#SPJ2
What do you mean by Data Types? Give Examples.
Ms Access question
Answer:
This answer is quite late, but data types are basically categories that differentiate stuff in python.
A few examples would be:
String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.
Int - An integer. Any whole number.
Float - Any decimal number.
List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)
Also, sorry if my English isn't perfect. English isn't my first language.
Explanation:
Don't know. Just some stuff I remember from my python class. ∞
The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?
Answer: 45.45%
Explanation:
Time Passed: 4 hours
Difference in Temperature: 20°F
20/44 = .45454545454545
.45454545454545*100 = 45.45%
Correct me if I am incorrect.
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
Answer: Database administration
Explanation:
What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that they receive B. Switches cause more data collisions than hubs b C. Switches are capable of sending and receiving data at the same time D. Switches send each packet to all of the computer that are connected to them.
Answer:
A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time
Explanation:
Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.
Hope this helps! Have a great day!
Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.
Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "
What is Get-childitem command?Get-childitem command in computer applications is used to get the items in specific locations.
Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.
Similarly, the Get-member command used to gets the members, the properties, and methods of files.
Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member
Learn more about Computer commands here: https://brainly.com/question/25243683
"schools should use a wireless network instead of a wired network".
discuss this statement.
(6 marks)
hi there!
Answer:
I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.
hope this helps.
Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding
please help
Felicity wants to take her DSLR camera on vacation, but she can take only one bag. Why is taking a DSLR camera with her not a good idea?
The reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy.
A digital single-lens reflex (DSLR) camera is being used by photographers especially for shooting stunning landscapes or portrait images. DSLR cameras are durable and can be used with a variety of lenses and attachments, they have a long battery life, and provide faster shooting speeds with better autofocus.
Therefore, the reason why taking a DSLR camera with her is not a good idea is because a DSLR camera and its accessories usually require their own bag and can be heavy, whereas she can only take one bag with her.
Learn more about digital single-lens reflex (DSLR) camera here:
https://brainly.com/question/13972212
Answer:
I got the answer here:
Explanation:
How does a cell phone change the
incoming signals from a caller into sound that
you can hear
Answer:
they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.
Explanation:
Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end
Explanation:
¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?
Answer:
flow chart of sales amount and commission %of sales
software ............. the hardware what to display on the user's screen
Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.
In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.
It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.
Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.
Learn more about slideshow on:
https://brainly.com/question/25327617
Answer:
"True"
Explanation:
I took the test!
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
Answer: Application
Explanation:
I need an If else statement that sorts three numbers from a file from least to greatest
how to send an email to multiple recipients individually outlook
Answer:
Include multiple people in the "To" section. picture attached below.
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106
I am very stuck and still don’t know how these work.
Answer:
Encrypt this binary string into ciphertext: 110000. Include
in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y
-Decrypt this ciphertext into a binary string: 106
Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.
Explanation: ……………..
Why should you pay your full credit card balance by the due date every month?
Answer: to avoid late fees and interest
Explanation:
Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP
imagery functions as a coding system to help individuals acquire movement patterns. this describes
Answer:
Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.
The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.
Answer:
ipconfig
Explanation:
That is the actual
command
Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat
_______________ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.
Answer:
account recovery
Explanation:
account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.
PLEASE I NEED HELP ASAP PLEASE PLEASE!!!
For a list of numbers entered by the user and terminated by 0, find the sum of the positive numbers and the sum of the negative numbers. C++ language only.
Answer:
Following are the program in the Python Programming Language
#set variables to 0
positive_sum=0
negative_sum=0
#print message
print("Enter 0 to terminate")
#set the while loop
while(True):
#get input from the user
num=float(input("Enter positive or negative numbers: "))
#set if statement to check condition
if(num==0):
break
elif(num>0):
positive_sum+=num
else:
negative_sum+=num
#print output with message
print()
print("sum of positive numbers: ", positive_sum)
print("sum of negative numbers: ", negative_sum)
Output:
Enter 0 to terminate
Enter positive or negative numbers: 1
Enter positive or negative numbers: 3
Enter positive or negative numbers: 5
Enter positive or negative numbers: -7
Enter positive or negative numbers: -2Enter positive or negative numbers: 0
sum of positive numbers: 9.0
sum of negative numbers: -9.0
Explanation:
Here, we set two integer data type variables "positive_sum", "negative_sum" and initialize to 0.
Then, we set the while infinite loop inside the loop.
Set a variable "num" and get input from the user in it.
Set the if conditional statement and check condition the variable "num" is equal to 0 then, loop will terminate.
Set the elif statement and check condition the variable "num" is greater than 0 then, add that input and store in the variable "positive_sum"
Otherwise, add that input and store in the variable "negative_sum".
Finally, we print the output with the message.
Fill in the blank: With ticket ________, you are able to edit ticket properties according to which team owns the ticket.
Answer: records customization
Explanation: