Help me with this question asap please :)

Help Me With This Question Asap Please :)

Answers

Answer 1

Answer:

I think it's sequence as there is a pattern of connection in the words


Related Questions

Describe the ideal environment for a computer to work properly

Answers

The ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

What is a computer?

Computer is an electronic device, that perform various of tasks easily that take humans much time.

It is a machine on which we can work and contains a screen and operators, like keyboard and mouse.

Thus, the ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

Learn more about computer

https://brainly.com/question/21080395

#SPJ1

Question 4 of 10
which phrase best describes algorithmic bias?
o a. when systematic errors in a program create unfair outcomes
b. when companies avoid using algorithms in their software
c. when programmers purposely create biased software
d. when people insist on doing things without technology

Answers

The phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

What is Algorithmic bias?

This is known to be a term that tells about the systematic and repeatable errors as seen in a  computer system that forms "unfair or bad" outcomes.

Therefore, we can say that the phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

Learn more about algorithmic bias from

https://brainly.com/question/22236556

#SPJ1

Cloud Kicks wants a report Co categorize accounts into small, medium, and large based on the dollar value found In the Contract Value field. What feature should an administrator use to meet this request

Answers

The feature that the administrator can use to meet this request is known as Bucket Column.

What is a bucket column?

A bucket column is known to be formed when a person define a lot of categories (buckets) that are known to be used to group report values.

Therefore, The feature that the administrator can use to meet this request is known as Bucket Column. as one can report, sort, filter, and group via the use of bucket columns.

Learn more about accounts from

https://brainly.com/question/24756209

#SPJ1

Jake is a 6-year-old boy. his mother wants him to learn scissor skills for improving his finger grip. so, she hands him several colorful papers and a pair of scissors. jake does not have difficulty understanding which object cuts the other. what is this type of reasoning called?

a.
analogical
b.
deductive
c.
common sense
d.
inductive

please answer so brainly doesnt get rid of it.

Answers

According to this, I think it is common sense.

A related database stores data in the form of______

Answers

Answer:

Lists.

Explanation:

A relational database stores data in the form of lists.

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}

Answers

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

which is the following career pathway for human services

Answers

The career pathway for human services includes:

Consumer servicesCounseling and mental health services, etc.

What are career pathways?

This is known to be the likely career choices that one can make based on a specific field.

Note that  the career pathways within the human services cluster are:

Consumer services.Counseling and mental health services.Early childhood development and services.Family and community services.Personal care services.

Learn more about  career pathway from

https://brainly.com/question/9719007

#SPJ1

What are principles of an API test design?

Answers

Answer:

The five most important principles of an API test design are:

Setup: Create objects, start services, initialize data, etc

Execution: Steps to apply API or the scenario, including logging

Verification: Oracles to evaluate the result of the execution

Reporting: Pass, failed or blocked

Clean up: Pre-test state

1. Sunday Times wants an analysis of the demographic characteristics of its readers. The

Marketing department has collected reader survey records containing the age, gender, marital

status, and annual income of readers. Design an application (Flowchart) that accepts reader

data and, when data entry is complete, produces a count of readers by age groups as follows:

under 20, 20–29, 30–39, 40–49, and 50 and older. Hint: Refer to the program discussed in

class Figure 6-15




2. Create the logic (Flowchart) for a program that calculates and displays the amount of money

you would have if you invested R10000 at 4 percent simple interest for one year. Create a

separate method to do the calculation and return the result to be displayed.

The main program (Flowchart) should prompt the user for the amount of money and passes it

to the interest-calculating method. ​

Answers

Answer:

GIRL

Explanation:

DALAGANG FILIPINA

14 YEARS OLD

NEED FRIENDS

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Answers

They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures

Amazon's simply walk out technology and Kroger's edge technology both employ intelligent agent technology.

What is the intelligent agent?

The Intelligent agent is a software that may complete tasks or make judgments depending on its surroundings, input from users, and past experiences. These applications can be used to collect data automatically on a predetermined schedule or in response to human input in real time.

In general, intelligent software agents are computer programs that may be installed on a computer system or network and launched to carry out tasks in the background, frequently while the computer is busy with other tasks.

Therefore, it is an intelligent agent.

To learn more about the technology, refer to:

https://brainly.com/question/15059972

#SPJ2

how to transfer crypto from coinbase to coinbase wallet

Answers

Answer:

Open Coinbase Wallet on your mobile device.

Tap to go to your Settings.

Tap Buy or Transfer.

Select the supported crypto.

Enter the amount you want to transfer then tap Continue.

Follow the remaining steps to complete your transfer.

You work as the IT administrator for a growing corporate network. You are in the process of creating an iSCSI storage area network (SAN) on the CorpisCSI server. The server is currently connected to the network using an Ethernet cable. To increase the server's performance, yoru have decided to replace the existing Ethernet connection with a fiber optic connection. In this lab, your task is to complete the following: . Connect the CorpisCSI server to the switch using the appropriate fiber optic cable. . Examine the port types on the switch. Examine the server's fiber optic NIC. . When connecting the server, use the color coding on the end of the fiber optic cable to identify the Tx and Rx connection ends Connector A (red) Tx. - Connector B (black) is Rx. . Remove the server's previous Ethernet network connection and place the Ethernet cable on the Shelf. . Verify that the server is connected to the network through the fiber optic connection. C When connecting fiber optic cables, the transmit (T) port on one device is connected to the receive (Rx) port on the other device. The fiber cables in this lab have already had their Rx and Tx connectors switched as necessary. You can view component information in the Details window on the Specification tab

Answers

The steps in the above scenario are:

Connect to an iSCSI target:Then  Create a volume:

How do you Connect to an iSCSI target?

This can be done by:

Select CORPSERVER from Hyper-V Manager, Make sure to Maximize the window to view all virtual machines.Then Right-click CorpFiles16 and select Connect.Use the Server Manager on CorpFiles16 to select Tools > iSCSI Initiator.Via the Target field, enter the server name of the target server.Then click.Select Quick Connect and then Done and then OK.

Note that the steps in the above scenario are:

Connect to an iSCSI target:Then  Create a volume:

Learn more about IT admin from

https://brainly.com/question/26096799

#SPJ2

Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the new role for the vendors and invoices table, update and insert permission for the invoicelineitems table, and select permission for all user tables.

Answers

Answer:

USE AP CREATE ROLE PaymentEntry

GRANT UPDATE, DELETE ON Invoices TO PaymentEntry

GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry

EXEC sp_AddRoleMember db_datareader, PaymentEntry

how long is the ap computer science principles exam

Answers

Answer: The exam is 2 hours long.

Explanation:

Answer:

Approx. 2.05 hours long. Brainliest is appreciated + good luck on all your tests and exams! :( <3

Question #1
dropdown
choose the term described.

a variable in a program that represents a class and is created by an assignment statement

function created within a class
definition

constructor
method
instance

Answers

Answer:

instance - a variable in a program that represents a class and is created by an assignment statement

method - function created within a class definition

Explanation:

A class is made up of the members fields and methods.

Fields are variables in the class and methods are functions in the class.

An instance is a copy of the class also called an object

In what year was the earliest documented use of the word computer?.

Answers

Answer:

1613

Explanation:

referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. This means that at first, "a computer" was a "person".

Python

write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. if the input is: 5 2 4 6 8 10 then the output is: all even if the input is: 5 1 3 5 7 9 then the output is all odd if the input is: 5 1 2 3 4 5 then the output is: not even or odd your program must define and call the following three functions. def getuservalues(). getuservalues reads in, creates, and returns the list of integers. def islisteven(mylist). islisteven returns true if all integers in the list are even and false otherwise. def islistodd(mylist). islistodd returns true if all integers in the list are odd and false otherwise.

Answers

def is_list_even(my_list):

   for i in my_list:

       if(i%2 != 0):

           return False

   

   return True

   

   

def is_list_odd(my_list):

   for i in my_list:

       if(i%2 == 0):

           return False

   

   return True

   

def main():

   n = int(input())

   lst = []

   

   for i in range(n):

       lst.append(int(input()))

   

   if(is_list_even(lst)):

       print('all even')

   

   elif(is_list_odd(lst)):

       print('all odd')

   

   else:

       print('not even or odd')

       

       

if __name__ == '__main__':

   main()

Zenith Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
A. Metasploit
B. Honeypot
C. Nessus
D. Nmap

Answers

Answer:

B. Honeypot

Explanation:

Honepots, like the name suggest, are sort of baits for the hackers. Honeypot pretty much decoys made to mimic the actual company computers. Hackers fall for it and think they hit jackpot. Once hackers try to extract info from the honeypot, the security analyst can either track the hackers to report to authorities or this is a way to distract hackers from the real protected data.

Pin number was changed and i let the culprit go without a kiss kiss how do i get it back

Answers

Answer:

I cant comprehend to even understand this

Explanation:

16
Select the correct answer.
St. Charles school's music community is organizing a fundraiser. They want to create a simple but attractive website. However, they don't have
too much time to invest in creating the website. Which web builder can the music community use to create a good website in less time?
OA text editor
OB.
WYSIWYG web builder
OC.
template builder
O D.
dynamic web builder
OE.
static web builder
Reset
Next

Answers

WYSIWYG web builder is web builder can the music community use to create a good website in less time. As it allows the person to easily advertise and sell music.

What website builder do artists use?

The most usable website builders for artists

Squarespace. Overall, For artists on a budget, the finest website builderWix is the finest website builder for artists. Shopify is The greatest website builder for artists that want complete control over their online presence.Voog is the greatest website builder for musicians that wish to sell to followers.

Thus, option B is correct.

For more information about website builder, click here:

https://brainly.com/question/15104973

#SPJ1

The ___ event is used to get things started and to set up vital initial information?

Answers

Answer:

Start-up

Explanation:

The start-up event is used to get things started and to set up vital initial information?

File encryption is the science of writing the contents of a file in a secret code. your encryption program should work like a filter reading the contents of one file, modifying each character in the input file into a code, and then writing the coded characters out to a second file. the second file will be a version of the first file but written in a secret code. must be c++

Answers

Answer:

The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques

Explanation:

The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques

How to remove onedrive account from computer?.

Answers

Answer:

To disable: In the taskbar, select OneDrive icon > Help & Settings > Settings > Account > Unlink this PC > Unlink account.

To uninstall: Go to Add/Remove Programs > Apps & Features > Microsoft OneDrive > Uninstall.

1. To disable: In the taskbar, select OneDrive icon > Help & Settings > Settings > Account > Unlink this PC > Unlink account.

2. To uninstall: Go to Add/Remove Programs > Apps & Features > Microsoft OneDrive > Uninstall.

What is a benefit of being a member of a professional organization?

Answers

Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.

Explanation:

An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?

Answers

The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.

How document be protected?

There are many ways a computer file can be protected. The ways to protect the document are,

Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.

Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.

Learn more about the data protection here;

https://brainly.com/question/4219149

#SPJ2

different between simplex and duplex data transmission mode​

Answers

In simplex mode, Sender can send the data but that sender can't receive the data. In half duplex mode, Sender can send the data and also can receive the data but one at a time. In full duplex mode, Sender can send the data and also can receive the data simultaneously.

What are some of the options available when previewing a worksheet before printing? Check all that apply.

applying styles
adjusting margins
inserting images
zooming in and out
navigating through pages
adding functions

Answers

Answer:

applying style to the worksheet before printing

software that requires a monthly subscription fee is called

Answers

Answer:

Software as a service

Explanation:

You may hear this as (SaaS) for short.

Type the correct answer in the box spell all words correctly.
karl has designed an interactive stories website for kids. he has implemented an alphabetical format for browsing through the stories. which
structure will he use for easy navigation?
kart implements a
structure for users to advance through the chapters.
reset
nexus

Answers

Kart should implement a main navigation structure for users to advance through the chapters.

The types of navigation.

In Computer technology, there are three main types of navigation used on websites and these include the following:

Structural navigationUtility navigationAssociative navigation

In this scenario, Kart should implement a main navigation structure for users to advance through the chapters on this interactive stories website for kids.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

Every javafx main class __________. group of answer choices implements javafx.application.applicatio extends javafx.application.application overrides start(scene s) method overrides start() method

Answers

Two concepts central to JavaFX are a stage and a scene.

Other Questions
11. John Quincy Adams did not actively campaign for reelection becauseA. he planned to move out of the country.B. he did not believe the office of president should be a popularity contest.C. he believed in restoring a king as the commander in chief. D. he did not wish to be president. Read the sentence.sayeed johnson, who is running for mayor, will be speaking at the city library tonight.which terms describe the underlined portion of the sentence? select two options.appositiveclausenonrestrictivephraserestrictive What was the overall effect of the Napoleonic Wars and the Congress of Vienna on European countries. How did the Zheng king try to maintain order in his kingdom 25) Ted spent $25 on a shirt and $89 on a pair of shoes. Ted had $40 left in his wallet. How much money did Ted have before he spent moneyon a shirt and shoes?A) $114B) $144C) $154D) $164 Chase goes to a restaurant and the subtotal on thebill was a dollars. A tax of 7% is applied to the bill.Chase decides to leave a tip of 15% on the entire bill(including the tax). Write an expression in terms of xthat represents the total amount that Chase paid. Answer right and ill give brainlyist 4) The United States was extremely_____before Japan bombed_______ What is the main idea of this passage from the Washington Constitution? This document recommends that all citizens participate in public service. This document recognizes that liberties come from a higher power. This document will ensure that all citizens lead happy, successful lives. This document will require all citizens to serve the same God. a protein produced by the mutated sequence will differ in what? I have four marble, One red,Oneblue,OneGreen,Oneyellos.Without replacing the first marble, you choose a second marble. What is the probalility of choosing red and then green? School Choice: Good Intentions, Extremely HarmfulSince the desegregation of schools in America, the question of school choice has been at the center of many heated debates. Some argue that charter schools or school choice programs put public schools at risk. Those people also argue that some neighborhood schools would suffer if kids had the freedom to commute to schools of their choice. Others argue that parents should control where their students learn, even though it means going to a school outside of their zoned area. However, school choice highlights the problem with the inequities in the school system. All schools should be built up to provide students with quality education, and school choice prevents that from happening.Select the correct answer.Read the introductory paragraph of an argument.What type of claim did the author make?A. fact claimB. policy claimC. value claimD. cause claim For the exact binomial test, we are using the binomial distribution assuming ____________________ to compute the probability of observing the equal number of successes or more extreme number of successes. I need help solving this HELP PLSS!!!!!What is one example of foreign policy?OA. A government raising taxes on importsOB. A school creating a program for students who need to learnEnglishOC. A company opening an office in another countryOD. A city passing a law to ban discrimination Which sample size will produce the widest 95% confidence interval, given a sample proportion of 0.5? entrails:plural noun1. inner workings2. deep parts3. remote parts4. innardsRead the sentence.The marine biologist dumped a bucket of fish entrails into the water to attract sharks.Which definition explains how the word entrails is used in the sentence?Definition 1Definition 2Definition 3Definition 4 Children with average IQ scores showed a peak thickening of cortical gray matter around the age of 8, while children with superior IQ scores experienced a peak thickening at around ____. Why did the formation of League of Nation mandates in the former Ottoman Empire lead to conflict? A. The mandates conflicted with regions formed by earlier agreements.B. The mandates were different sizes, which made some stronger than others.C. The mandates had different resources that were important to other regions.D. The mandates were formed without consideration of cultural, religious, and ethnic borders. How will building a road through the rainforest affect the Rainforest ecosystem? Is the effect positive, negative, or both? Explain why.