Answer:
I would say that asking your friends is probably not a good way to research for a job.
Explanation:
It would definitely be helpful to talk to someone who already works at the job you want. Researching the company or job online is a good way to learn about them. And a guidance counselor can usually help point you in the right direction of what you'd like to know.
There’s a scientific theory out there that says that our brain uses an algorithm to create our thoughts and it’s called the Theory of Connectivity. This theory suggests that information comes into our brains, is processed, stored, and then results in an output. Does this process sound familiar to you? In what ways do our bodies take in input and respond, sometimes without our control? Give two examples
Answer:
1. Yes, the process sounds familiar to me. It looks like the mechanism of operation of the computer.
2a. Through reflex actions, our bodies take in input and respond sometimes without our control.
b. Two examples are sneezing and the scratch reflex.
Explanation:
The principle of the theory of connectivity which involves the input, processing, storage, and output of results is similar to the workings of the human body which has to accept input from the external surroundings which it processes and provides an output for. Reflex actions are involuntary actions made in response to a stimulus. When the body receives the input, the response is made most times before we are aware of it.
Scratch reflex occurs when the sensory neurons located on the periphery of our skins are activated due to stimuli that could be in the form of touch, an insect bite, etc. Sneezing is another example of a reflex action.
Answer:
The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.
Explanation:
When programming, the word "execute" means which of these?
to kill
to edit
to run
to revise
Answer:
to run!
Explanation:
hope this is helpful!
Which design principle involves mentally dividing up an image with two horizontal lines and two vertical lines
Answer:
the answer is Rule of thirds
Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines
The rule of thirds is a creation decide that places the subject in the left or right third of an image, leaving the other 66% more open. While there are various sorts of synthesis, the norm of thirds all around prompts persuading and particularly made shots. The Rule of Thirds puts your subject on the left-third or right-third of the edge, making a delightful synthesis.
Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines.
For more information:
https://brainly.com/question/18964599?referrer=searchResults
What is a class in CSS?
A.a grouping of HTML tags for which style properties can be declared
B.a selector used to define a unique style
C.a tag used to apply styles to a block of content
D.the part of a declaration describing the type of style to be applied
Answer:
A grouping of HTML tags for which style properties can be declared
Explanation:
CORRECT
It is common practice not to store user’s password in clear text. However, if an attacker has seized control of the password database, he is likely already capable of modifying any user data on the site as an administrator. Why bother hashing the passwords then?
Answer:
To prevent leakage of user's passwords.
Explanation:
I don't really know the premise of your question, but I assume it is this. If the hacker has access to the user's data, they may have the email address. If they cannot crack the password hash, then they may not attempt to login to the user's accounts on other websites.
Create a Python file named num_sum.py that contains: The definition of two functions: volume - accepts three parameters and returns the product of them, but displays nothing sum_of_nums - accepts 1 or more numbers and returns their sum, but displays nothing A print function call that includes a call to volume, passing 2, 3, and 4 A print function call that includes a call to sum_of_nums, passing 1, 2, 3, 4, and 5 Submit the Python program and screenshot. Following is an example showing how your screenshot might look:
Answer:
def volume(n1, n2, n3):
product = n1 * n2 * n3
return product
def sum_of_nums(*args):
total = 0
for n in args:
total += n
return total
print("The product: " + str(volume(2, 3, 4)))
print("The sum: " + str(sum_of_nums(1, 2, 3, 4, 5)))
Explanation:
Create a function called volume that takes three parameters, n1, n2, n3
Multiply the n1, n2, n3 and set it to product
Return the product
Create a function called sum_of_nums that takes *args as parameter (Since the function may take one or more arguments, we may use *args)
Initialize the total as 0
Create a for loop that iterate through args. Add each number to the total (cumulative sum)
When the loop is done, return the total
Call the functions with given numbers and print the results
*See the output in the attachment.
Hands-On Project 15-4 Make Network Cables
Using the tools and skills you learned about in this chapter, practice making a straight-through cable and a crossover cable. Use a cable tester to test both cables. Answer the following questions:
1. Which wiring standard did you use for the straight-through cable? List the pinouts (pin number and wire color) for each of the eight pins on each connector.
2. Will your crossover cable work on a Gigabit Ethernet network? List the pinouts (pin number and wire color) for each of the eight pins on each connector.
Answer:
1. You can use either standard (T-568A or T-568B) - but must keep the standard throughout the installation (can't mix A with B).
The B standard is preferred in the US. A is mostly used overseas (Europe)
For A the proper wiring sequence is:
1 - Orange/White
2 - Orange
3 - Green / White
4 - Blue
5 - Blue / White
6 - Green
7 - Brown / White
8 - Brown
2. Cross over connections use a different pinout for one side of the cable. The second side is wired normally.
Crossover connections are only used for device to device connections. ( as in the case of connecting two NIC cards together directly). They will not work if plugged into a switch or other network device.
Normal side - use the pinout from question #1
Crossover side:
1 Green / White
2 Green
3 Orange / White
4 Brown / White
5 Brown
6 Orange
7 Blue
8 Blue / White
Explanation:
Class description: A MyString class should behave much like the c++ string class. The class should use a dynamically allocated char array to hold a character string. If the amount of memory allocated to the array is too small to complete some necessary task (e.g., assigning a new character string to the object) the object should automatically double its capacity until it is large enough to complete the task. If it's discovered that the object is using less than 25% of its capacity the object should shrink to half its capacity until it is using more that 25% of its capacity.
Assignment: Implement the MyString class using a header and implementation file named MyString.h and MyString.cpp respectively. Even though MyString.h will be provided on the upload site, create own version for testing code locally. Make sure to properly test code on by creating a test driver that fully tests every function created in the MyString class
Memory Requirements: MyString should start with 10 bytes of allocated memory and should grow in size by doubling. So, we should be able to predict the capacity of MyString as acquiring a patten of 10, 20, 40, 80, ⦠bytes of memory depending of the number of characters stored.
Attributes:
int size â the number of characters currently stored in the string object. Do NOT count the NULL character.
int capacity â the number of bytes currently allocated. This should always be at least size + 1. The extra byte is needed to store the NULL character.
char *data â character pointer that points to an array of characters.
Member Functions:
MyString( ) Constructor
MyString(const char *) Constructor with an initialization character string
~MyString( ) Destructor
MyString(const MyString &) Copy constructor
MyString& operator = (const MyString&) Overloaded assignment operator, make a copy of MyString object
bool operator == (const MyString&) const overloaded equivalence relational operator
char& operator [ ] (int) overloaded [ ] should return a char by reference
void operator += (const MyString&) overloaded += operator, use to concatenate two MyStrings
MyString operator + (const MyString&) const Create a new MyString object that is the concatenation of two MyString objects
void getline(istream&, char delimit = â\nâ); reads an entire line from a istream. Lines are terminated with delimit which is newline â\nâ by default
int length( ) const; return the length of the string
friend ostream& operator<< (ostream&, MyString&); overloaded insertion operator
How can you crop a photo in PowerPoint?
Answer:
Yea
Explanation:
jus click on the image and it should give you the option to crop it :)
3.3 Code Practice: Question 1
Instructions
Test if a date is a payday based on the day of the month (15th or the 30th).
Sample Run
Enter today's day numerically: 17
Sorry, not a payday.
Enter today's day numerically: 30
It's payday!
please help in python!
Answer:
date = int(input("Enter today's day numerically: "))
if date == 15 :
print("It's payday!")
elif date == 30 :
print("It's payday!")
else:
print("Sorry, not a payday.");
Explanation:
The program illustrates the use of if-conditions
The program in Python where comments are used to explain each line is as follows:
#This gets integer input for day
day = int(input("Enter today's day numerically: "))
#This checks if day is 50 or 30
if day == 15 or day == 30:
#If yes, this prints payday
print("It's payday!")
#If otherwise
else:
#If otherwise, this prints not a payday
print("Sorry, not a payday.")
At the end of the program, the program outputs payday or not a payday; depending on the input from the user
See attachment for sample run
Read more about Python programs at:
https://brainly.com/question/22841107
INTERNET SAFETY RULES
Answer:
1. Keep Personal Information Professional and Limited
2. Keep Your Privacy Settings On
3. Practice Safe Browsing
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
5. Be Careful What You Download
6. Choose Strong Passwords
7. Make Online Purchases From Secure Sites
8. Be Careful What You Post
9. Be Careful Who You Meet Online
10. Keep Your Antivirus Program Up To Date
give the imporntance of having standard funiture in the laboratory
Answer:
I guess if there is experiment going on in absence one of those furniture then the experiment isn't successful
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
Sample output with input: 17
Not special number
Answer:
special_num = int(input())
if special_num == -99 or special_num == 0 or special_num == 44:
print('Special number')
else:
print('Not special number')
Explanation:
#get input
special_num = int(input())
#if function to evaluate true or false(aka Boolean)
if special_num == -99 or special_num == 0 or special_num == 44:
#true evaluation
print('Special number')
#false evaluation
print('Not special number')
The program evaluates the number inputted by a user, checks if it is one of three special numbers and displays the appropriate message. The program is written in python 3 ;
special_num = int(input('enter number : '))
#allows user to input an integer value which is assigned to the variable named special number
if(special_num == -99) or (special_num ==0) or (special_num == 44):
#checks if the inputted value is one of the three special numbers using the assignment operator '==' and 'OR'
print('special number')
# if the condition evaluates to true, display the message ;special number
else :
print('Not a special number')
#if otherwise, display the message, not a special number.
Learn more :https://brainly.com/question/18929518
Give 2 bennifits of expert system
Answer:
Provide answers for decisions, processes and tasks that are repetitive.
Hold huge amounts of information.
Minimize employee training costs.
Centralize the decision making process.
Make things more efficient by reducing the time needed to solve problems.
here are a few
hope it helps : )
TCP is a more dependable protocol than UDP because TCP is_____ latent/connectionless/connection-oriented/encapsulated
Answer:
connection-oriented
Explanation:
Answer:
TCP is a more dependable protocol than UDP because TCP is
connection-oriented
Explanation:
Because I took a guess and that was the
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?
A. Computer-aided design software
B. Sampling software
C. 3-D animation software
D. System software
Answer:System Software
Explanation:
3-D animation software is for 3d animation
Sampling software is for audio
Computer aided design is an artistic media
A video game developer is is a software developer and is specialized in video game development. It relates to the creation of video games. The video game publisher have maintained a studio. And it involves 3rd party developer.
For making the games he needs 3D animated software such as shade 3D or K-3D. In order to make the game he needs to have all automation software that provides him the visual effects.Hence the option C is correct.
Learn more about the aspiring video game developer.
brainly.com/question/21539732.
What was the biggest problem with the earliest version of the internet in the late 1960’s?
Answer:
Explanation:
1.security issue
2. Computers were too big
3. Not very reliable
4. Networks couldn't talk to each other
5. Only be used in universities, governments, and businesses
What were the first computers made
Answer:
In 1943 he ENIAC computing system was built by John Mauchly and J. Presper Eckert
Explanation:
Answer:
ENIAC (Electronic Numerical Integrator and Computer)
what is an operating system
Answer:
Explanation:
Online Dictionary defines 'Operating System' as "the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.''
Hope this helps!
Compare a Wi-Fi hotspot with a cybercafé.
Answer:
A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.
A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.
Explanation:
Why was the newspaper readership the highest in 1995?
Is a i5 2400 and a GeForce GTX 1060 6GB bottlenecking?
Answer:
In terms of memory, the GTX 1060 6GB 's 6144 MB RAM is more than enough for modern games and should not cause any bottlenecks. This combination between GTX 1060 6GB and Intel Core i5-2400 3.10GHz has less than 15% bottleneck in many games and can cause minor FPS loss.
Explanation:
i wish i had one of these lol
Answer:
Yes very Much
Explanation:
Please No
What is Interface in computers
Answer:
An interface could be the design of the homescreen or the way a shell of a computer is designed. I could be wrong tho......
Explanation:
Difference between entropy and enthalpy is
Answer:
Explanation:
Enthalpy is the measure of total heat present in the thermodynamic system where the pressure is constant. Entropy is the measure of disorder in a thermodynamic system.
Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
Answer:
In the following code, you can see the usage of malloc.
#include <stdio.h>
#include <stdlib.h>
int main(void) {
int* numberPointer1 = NULL;
int* numberPointer2 = NULL;
numberPointer1 = (int *)malloc(sizeof(int *));
numberPointer2 = (int *)malloc(sizeof(int *));
*numberPointer1 = 44;
*numberPointer2 = 99;
printf("numberPointer1 = %d, numberPointer2 = %d\n", *numberPointer1, *numberPointer2);
free(numberPointer1);
free(numberPointer2);
return 0;
}
Explanation:
Malloc allocates memory in the heap according to the input size and returns a pointer to the location where it was allocated, with an extra, it clears all allocated space.
What does the measurement tell you?
Estimate at completion
Answer:
forecasted cost of the project, as the project progresses/"The expected total cost of completing all work expressed as the sum of the actual cost to date and the estimate to complete." - PMBOK Guide
Explanation:
ASAP.
13. How do distracters impact your study time? They cause you to lose focus and lose time. They make studying almost impossible. They cause you to lose focus and that results in lower grades. They make you drowsy and distracted.
Answer:
A
Explanation:
You could pick any answer and make a case for it. It depends on what you have been told.
I would pick A but I wouldn't be surprised if the answer isn't the last one.
Write a program that calculates and displays the amount ofmoney available in a bank account that initially has $8000 deposited in it and that earns interest atthe rate of 2.5 percent a year. Your program should display the amount available at the end of eachyear for a period of 10 years. Use the relationship that the money available at the end of each yearequals the amount of money in the account at the start of the year plus 0.025 times the amountavailable at the start of the year [20 points].
Answer:
Written in Python
import math
principal = 8000
rate = 0.025
for i in range(1, 11):
amount = principal + principal * rate
principal = amount
print("Year "+str(i)+": "+str(round(amount,2)))
Explanation:
This line imports math library
import math
This line initializes principal amount to 8000
principal = 8000
This line initializes rate to 0.025
rate = 0.025
The following is an iteration from year 1 to 10
for i in range(1, 11):
This calculates the amount at the end of the year
amount = principal + principal * rate
This calculates the amount at the beginning of the next year
principal = amount
This prints the calculated amount
print("Year "+str(i)+": "+str(round(amount,2)))
how do i chose the brianliest answer
Answer:
you can choose the brainliest answer by clicking in a brainliest answer
Answer:
Click on the answer, then click brainliest
Explanation:
In Word, blue underlining indicates which of these problems?
A grammatical error
B file error
C spelling error
D style mismatch
Answer:
The blue indicates a grammatical error, including misused words.
Hence, the answer is A