Answer:
Explanation:
Enthalpy is the measure of total heat present in the thermodynamic system where the pressure is constant. Entropy is the measure of disorder in a thermodynamic system.
Is a i5 2400 and a GeForce GTX 1060 6GB bottlenecking?
Answer:
In terms of memory, the GTX 1060 6GB 's 6144 MB RAM is more than enough for modern games and should not cause any bottlenecks. This combination between GTX 1060 6GB and Intel Core i5-2400 3.10GHz has less than 15% bottleneck in many games and can cause minor FPS loss.
Explanation:
i wish i had one of these lol
Answer:
Yes very Much
Explanation:
Please No
How can you crop a photo in PowerPoint?
Answer:
Yea
Explanation:
jus click on the image and it should give you the option to crop it :)
In Word, blue underlining indicates which of these problems?
A grammatical error
B file error
C spelling error
D style mismatch
Answer:
The blue indicates a grammatical error, including misused words.
Hence, the answer is A
What does the measurement tell you?
Estimate at completion
Answer:
forecasted cost of the project, as the project progresses/"The expected total cost of completing all work expressed as the sum of the actual cost to date and the estimate to complete." - PMBOK Guide
Explanation:
When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to:
Options:
a. remove the hard drive
b. transport it while running
c. perform a clean shutdown
d. unplug it
Answer:
d. unplug it
Explanation:
Indeed, unplugging the computer often the best strategy for dealing with a computer that is powered on so to preserve (or collect) digital evidence. By so doing it allows the investigator to safely check through the computer found at the crime scene.
However, if the investigator decides to remove the hard drive or performing a clean shutdown, valuable evidence may be lost as a result. Also, transporting it while running isn't going to be a viable option.
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
Sample output with input: 17
Not special number
Answer:
special_num = int(input())
if special_num == -99 or special_num == 0 or special_num == 44:
print('Special number')
else:
print('Not special number')
Explanation:
#get input
special_num = int(input())
#if function to evaluate true or false(aka Boolean)
if special_num == -99 or special_num == 0 or special_num == 44:
#true evaluation
print('Special number')
#false evaluation
print('Not special number')
The program evaluates the number inputted by a user, checks if it is one of three special numbers and displays the appropriate message. The program is written in python 3 ;
special_num = int(input('enter number : '))
#allows user to input an integer value which is assigned to the variable named special number
if(special_num == -99) or (special_num ==0) or (special_num == 44):
#checks if the inputted value is one of the three special numbers using the assignment operator '==' and 'OR'
print('special number')
# if the condition evaluates to true, display the message ;special number
else :
print('Not a special number')
#if otherwise, display the message, not a special number.
Learn more :https://brainly.com/question/18929518
What is a class in CSS?
A.a grouping of HTML tags for which style properties can be declared
B.a selector used to define a unique style
C.a tag used to apply styles to a block of content
D.the part of a declaration describing the type of style to be applied
Answer:
A grouping of HTML tags for which style properties can be declared
Explanation:
CORRECT
What were the first computers made
Answer:
In 1943 he ENIAC computing system was built by John Mauchly and J. Presper Eckert
Explanation:
Answer:
ENIAC (Electronic Numerical Integrator and Computer)
3.3 Code Practice: Question 1
Instructions
Test if a date is a payday based on the day of the month (15th or the 30th).
Sample Run
Enter today's day numerically: 17
Sorry, not a payday.
Enter today's day numerically: 30
It's payday!
please help in python!
Answer:
date = int(input("Enter today's day numerically: "))
if date == 15 :
print("It's payday!")
elif date == 30 :
print("It's payday!")
else:
print("Sorry, not a payday.");
Explanation:
The program illustrates the use of if-conditions
The program in Python where comments are used to explain each line is as follows:
#This gets integer input for day
day = int(input("Enter today's day numerically: "))
#This checks if day is 50 or 30
if day == 15 or day == 30:
#If yes, this prints payday
print("It's payday!")
#If otherwise
else:
#If otherwise, this prints not a payday
print("Sorry, not a payday.")
At the end of the program, the program outputs payday or not a payday; depending on the input from the user
See attachment for sample run
Read more about Python programs at:
https://brainly.com/question/22841107
What is the name for the strip of frequently used icons on a computer? O App O Program O Toolbar O Utilities panel ILL MARK YOU BRAINEST
Answer: The name of the strip is the Toolbar.
Answer:
its quite obvious toolbar
Explanation:
Hands-On Project 15-4 Make Network Cables
Using the tools and skills you learned about in this chapter, practice making a straight-through cable and a crossover cable. Use a cable tester to test both cables. Answer the following questions:
1. Which wiring standard did you use for the straight-through cable? List the pinouts (pin number and wire color) for each of the eight pins on each connector.
2. Will your crossover cable work on a Gigabit Ethernet network? List the pinouts (pin number and wire color) for each of the eight pins on each connector.
Answer:
1. You can use either standard (T-568A or T-568B) - but must keep the standard throughout the installation (can't mix A with B).
The B standard is preferred in the US. A is mostly used overseas (Europe)
For A the proper wiring sequence is:
1 - Orange/White
2 - Orange
3 - Green / White
4 - Blue
5 - Blue / White
6 - Green
7 - Brown / White
8 - Brown
2. Cross over connections use a different pinout for one side of the cable. The second side is wired normally.
Crossover connections are only used for device to device connections. ( as in the case of connecting two NIC cards together directly). They will not work if plugged into a switch or other network device.
Normal side - use the pinout from question #1
Crossover side:
1 Green / White
2 Green
3 Orange / White
4 Brown / White
5 Brown
6 Orange
7 Blue
8 Blue / White
Explanation:
____ is NOT an effective way to do research about a job you want.
Answer:
I would say that asking your friends is probably not a good way to research for a job.
Explanation:
It would definitely be helpful to talk to someone who already works at the job you want. Researching the company or job online is a good way to learn about them. And a guidance counselor can usually help point you in the right direction of what you'd like to know.
how do i chose the brianliest answer
Answer:
you can choose the brainliest answer by clicking in a brainliest answer
Answer:
Click on the answer, then click brainliest
Explanation:
what is an operating system
Answer:
Explanation:
Online Dictionary defines 'Operating System' as "the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.''
Hope this helps!
What is Interface in computers
Answer:
An interface could be the design of the homescreen or the way a shell of a computer is designed. I could be wrong tho......
Explanation:
It is common practice not to store user’s password in clear text. However, if an attacker has seized control of the password database, he is likely already capable of modifying any user data on the site as an administrator. Why bother hashing the passwords then?
Answer:
To prevent leakage of user's passwords.
Explanation:
I don't really know the premise of your question, but I assume it is this. If the hacker has access to the user's data, they may have the email address. If they cannot crack the password hash, then they may not attempt to login to the user's accounts on other websites.
which team member on a project typically enjoys solving difficult problems? ILL MARK BRAINEST
Answer: the programmer.
Explanation: I did the test you used the picture on
Answer:
whats THE ANSWER IS HER WRONG
Explanation:
Give 2 bennifits of expert system
Answer:
Provide answers for decisions, processes and tasks that are repetitive.
Hold huge amounts of information.
Minimize employee training costs.
Centralize the decision making process.
Make things more efficient by reducing the time needed to solve problems.
here are a few
hope it helps : )
TCP is a more dependable protocol than UDP because TCP is_____ latent/connectionless/connection-oriented/encapsulated
Answer:
connection-oriented
Explanation:
Answer:
TCP is a more dependable protocol than UDP because TCP is
connection-oriented
Explanation:
Because I took a guess and that was the
Which design principle involves mentally dividing up an image with two horizontal lines and two vertical lines
Answer:
the answer is Rule of thirds
Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines
The rule of thirds is a creation decide that places the subject in the left or right third of an image, leaving the other 66% more open. While there are various sorts of synthesis, the norm of thirds all around prompts persuading and particularly made shots. The Rule of Thirds puts your subject on the left-third or right-third of the edge, making a delightful synthesis.
Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines.
For more information:
https://brainly.com/question/18964599?referrer=searchResults
Compare a Wi-Fi hotspot with a cybercafé.
Answer:
A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.
A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.
Explanation:
There’s a scientific theory out there that says that our brain uses an algorithm to create our thoughts and it’s called the Theory of Connectivity. This theory suggests that information comes into our brains, is processed, stored, and then results in an output. Does this process sound familiar to you? In what ways do our bodies take in input and respond, sometimes without our control? Give two examples
Answer:
1. Yes, the process sounds familiar to me. It looks like the mechanism of operation of the computer.
2a. Through reflex actions, our bodies take in input and respond sometimes without our control.
b. Two examples are sneezing and the scratch reflex.
Explanation:
The principle of the theory of connectivity which involves the input, processing, storage, and output of results is similar to the workings of the human body which has to accept input from the external surroundings which it processes and provides an output for. Reflex actions are involuntary actions made in response to a stimulus. When the body receives the input, the response is made most times before we are aware of it.
Scratch reflex occurs when the sensory neurons located on the periphery of our skins are activated due to stimuli that could be in the form of touch, an insect bite, etc. Sneezing is another example of a reflex action.
Answer:
The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.
Explanation:
Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
Answer:
In the following code, you can see the usage of malloc.
#include <stdio.h>
#include <stdlib.h>
int main(void) {
int* numberPointer1 = NULL;
int* numberPointer2 = NULL;
numberPointer1 = (int *)malloc(sizeof(int *));
numberPointer2 = (int *)malloc(sizeof(int *));
*numberPointer1 = 44;
*numberPointer2 = 99;
printf("numberPointer1 = %d, numberPointer2 = %d\n", *numberPointer1, *numberPointer2);
free(numberPointer1);
free(numberPointer2);
return 0;
}
Explanation:
Malloc allocates memory in the heap according to the input size and returns a pointer to the location where it was allocated, with an extra, it clears all allocated space.
Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ function, printMonthlySales, to calculate and print the total value of sales during a specific month by each department and in each store plus totals by store and department and overall sales. The return type of the function is void and the function must have 2 input parameters Sales array and the month the user specified (edit for correct month values!). The constants NUM STORES, NUM_MONTHS, and NUM_DEPTS must be accessed globally by defining the following global variables #define NUM DEPTS 2 #define NUM STORES 2 #define NUM-MONTHS 12 or const int NUM-MONTHS-12; or const in NUM_DEPTS 2; or const int NUM_STORES 2; The array Sales is initialized by the following statement within main() float storeMonthlySales[NUM STOREST[NUM MONTHS1[NUM DEPTS]- 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1,3.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 4.0, 4.1, 4.2, 2.1, 2.2,2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2 Output: Sales for month of value (where value represents "January", "March", etc.) Dept # value value col value sum Dept # Store Total Store # value row value sum tore # value row value sum Dept Total col value sum total overall sales User enters a new month as many times as they wish and run printMonthlySales against the new month alue Validate user input ("y" or "n") when asking if the user wants to enter a new set of values
Answer:
Y
Explanation:
YEZ
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?
A. Computer-aided design software
B. Sampling software
C. 3-D animation software
D. System software
Answer:System Software
Explanation:
3-D animation software is for 3d animation
Sampling software is for audio
Computer aided design is an artistic media
A video game developer is is a software developer and is specialized in video game development. It relates to the creation of video games. The video game publisher have maintained a studio. And it involves 3rd party developer.
For making the games he needs 3D animated software such as shade 3D or K-3D. In order to make the game he needs to have all automation software that provides him the visual effects.Hence the option C is correct.
Learn more about the aspiring video game developer.
brainly.com/question/21539732.
Create a Python file named num_sum.py that contains: The definition of two functions: volume - accepts three parameters and returns the product of them, but displays nothing sum_of_nums - accepts 1 or more numbers and returns their sum, but displays nothing A print function call that includes a call to volume, passing 2, 3, and 4 A print function call that includes a call to sum_of_nums, passing 1, 2, 3, 4, and 5 Submit the Python program and screenshot. Following is an example showing how your screenshot might look:
Answer:
def volume(n1, n2, n3):
product = n1 * n2 * n3
return product
def sum_of_nums(*args):
total = 0
for n in args:
total += n
return total
print("The product: " + str(volume(2, 3, 4)))
print("The sum: " + str(sum_of_nums(1, 2, 3, 4, 5)))
Explanation:
Create a function called volume that takes three parameters, n1, n2, n3
Multiply the n1, n2, n3 and set it to product
Return the product
Create a function called sum_of_nums that takes *args as parameter (Since the function may take one or more arguments, we may use *args)
Initialize the total as 0
Create a for loop that iterate through args. Add each number to the total (cumulative sum)
When the loop is done, return the total
Call the functions with given numbers and print the results
*See the output in the attachment.
What was the biggest problem with the earliest version of the internet in the late 1960’s?
Answer:
Explanation:
1.security issue
2. Computers were too big
3. Not very reliable
4. Networks couldn't talk to each other
5. Only be used in universities, governments, and businesses
INTERNET SAFETY RULES
Answer:
1. Keep Personal Information Professional and Limited
2. Keep Your Privacy Settings On
3. Practice Safe Browsing
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
5. Be Careful What You Download
6. Choose Strong Passwords
7. Make Online Purchases From Secure Sites
8. Be Careful What You Post
9. Be Careful Who You Meet Online
10. Keep Your Antivirus Program Up To Date
What is the result when you run the following line of code after a prompt >>>print(“2+4)
Answer:
2+4
or more honestly, it would return an error message.
Explanation:
So none of the answers are correct because:
no quotes will be printed.If you look more closely, the quotes are inversed in the statement, which is invalid syntax.see picture
Answer:
the answer is
'2 + 4'
Explanation:
I just took the test, so I know for 100% certainty, that this is the answer that is being accepted as the correct answer.
When programming, the word "execute" means which of these?
to kill
to edit
to run
to revise
Answer:
to run!
Explanation:
hope this is helpful!