Answer:
office access cars
Explanation:
HOPE THIS WILL HELP U, MARK ME AS A BRAINLIST
Answer:
office access card
bank debit card
Explanation:
Which of the following is an example of Arabic numbering in an outline?
ii
2
II
B
Answer:
d:b
Explanation:
I need help
Match each work with its definition
Job Market = The job opening that are available when you are ready to go to work
Hard skills = Measurable physical and mental abilities that allow you to complete a job
skill set = Nontechnical skills needed by most workers for success on the job
goal = learning as you do the work
these are the ones that I can answer the rest of the choices I am not able to see
What is computing device
Please do mark me as Brainiest. I would be so happy!!!
Answer:
Any electronic equipment controlled by a CPU, including desktop and laptop computers, smartphones and tablets. It usually refers to a general-purpose device that can accept software for many purposes in contrast with a dedicated unit of equipment such as a network switch or router.
Have a great day.
Answer:
Explanation:
What type of file is MyFile.exe?
executable file
data file
helper file
batch file
Answer:
DExplanation:
executable fileThe type of file MyFile.exe is executable file. The correct option is first.
What is file?File contains lot of data related to same or different data.
The file format for the given file name MyFile.exe is not data file not helper file. The format is clearly understood as executable file, in short ".exe".
Thus, the first option is correct.
Learn more about file.
https://brainly.com/question/4461652
#SPJ2
Is this statement True or False?
Data always contains facts
A. True
B. False
Answer:
A. The statement is true
Edhesive 4.3 code practice question 1 PLZ SOMEONE
topic: Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you with 15 hugs! This year, she, unfortunately, cannot see you on your birthday, so instead, she wants to send you virtual hugs!
Create a program that prompts the user for how old they are turning and then using a loop, output a virtual hug for every year old they are.
The following prints a single “virtual hug.”
Answer:
x = int(input("How old are you turning? "))
c = 0
while (c != x):
c = c + 1
print("**HUG**")
Following are the python program to calculate the virtual hugs:
Python Program:age = int(input("How old are you? "))#defining the age variable that inputs age value in number
for x in range(0,age):#defining the loop that counts and prints the number of HUG value
print("**HUG**")#print message
Output:
please find the attached file.
Program Explanation:
Defining the 'age' variable that inputs age value by using the input and int method that takes only numeric value.After the input value, a for loop is defined this loop that counts the age value and prints the number of 'HUG' values, by using the print method.Learn more on python programs here:
brainly.com/question/17796174
This technology had the biggest impact on the capabilities of diagnostic testing.
A.computers
B.the Internet
C.transportation
D.the microscope
Answer:
Computers
Explanation:
They run the tests in a multitude of ways and can provide clear data in organized and profficient ways and it's fast.
Answer:
A = Computers
Explanation
I know it is Computers
Which is the best description of a computer virus?
a program that can damage a computer
a hacker who adds programs to a computer
a scam that steals information from a computer
a biological disease that destroys a computer
Answer:
A- a program that can damage a computer
Explanation:
The best description of a computer virus is a program that can damage a computer. The correct option is A.
What is a computer virus?Any software that has been designed to be dangerous is frequently referred to as "virus" as a catch-all word. The definition of a virus is a computer program that has the ability to replicate itself, infect other programs, and propagate to other systems, although a virus is merely one sort of malware.
The analogy of the "computer virus" was chosen because it resembles biological viruses that affect the human body in terms of structure, behavior, and effects. Computer viruses have the ability to infiltrate other programs and take over control or negatively impact the program's functionality.
Therefore, the correct option is A, a program that can damage a computer.
To learn more about a computer viruse, refer to the link:
https://brainly.com/question/29446269
#SPJ2
Captions are used to identify or give information about
O books
O magazines
O authors
O images
Answer:
images
Explanation: i know this because i read magazines all the time specially rollingstone
destiny is concerned that readers won't realize the importance of the facts I her investigative report.what can she do to make the heading more informative?
The correct answer is D. Use action verbs and refer to benefits
Explanation:
One of the most effective ways to emphasize information is to use action verbs; these are words that express actions rather than states. In the case of a report action verbs such as prove, show or research can be used to explain facts or results because these emphasize information and make readers understand the importance of information rather than words such as seem. Moreover, in a research report writers might want to refer to the benefits because this catches the readers' attention as they will be interested in knowing how the information in the report contributes to their life or the world.
Answer: Use action verbs and refer to benefits
Explanation: Ape x
Why would online learning make you lazy
Answer:
ummm..... it's so boring....
In the excerpt, "A wrong is unredressed when retribution overtakes its redresser,” which of the following is a synonym for redress? lecture grievance rectify announce
Answer:
The answer is Rectify
What do donnas actions and thoughts reveal about her character
Need help with these
16: True
~~~~~~~~
17: D
~~~~~~~~
18: D
Please help fast! Thank you if you can do this.
Which of the following is not Media connector?
a. BNC
b. terminator
c. RJ-45
d. NIC
Answer:
B
Explanation:
itz B
Option b (terminator) is not a media connector.
The separating point between the lighted portion of the whole of the planet moon or even just the unlit disc of a planetary could be defined as a terminator.
The other given option is a media connector, such as:
Option a (BNC) - A usually utilized plug as well as a connector with a strong attachment to audio, picture, and social networks application areas.Option c (RJ-45) - A popular data transmission connector with an eight-pin modularity connector as well as completely twisted wires.Option d (NIC) - It is being used to link computers by wires and wirelessly to such a networking system.Thus the above is the correct answer.
Learn more about media connector here:
https://brainly.com/question/7581177
The following code is intended to find the average of three numbers entered from the keyboard. What is wrong with the code? print ("Enter 3 numbers: ") n1 = float(input ("Enter a number: ")) n2 = float(input ("Enter a number: ")) n3 = float(input ("Enter a number: ")) print (n1 + n2 + n3 /3)
Answer:
It is missing ( ) in the last line
Explanation:
ASAP What is the answer to this question ?
Best answer will recieve BRAINLIEST!!
Answer:
256
Explanation:
is this math it wont load the picture
What is the value of the variable result after these lines of code are executed?
>>> a = 3
>>> b= 2
>>> c=0
>>> result = a* b-c* b
The value of result is
PLEASE HELP
the value of result is 6
a * b = 6
c * b = 0
6 - 0 = 6
The value of the variable result after these lines of code are executed. The value of the result is 6.
What are the values in codes?A value is a representation of any item that may be manipulated by a program in computer science and software programming. The values of a type are represented by its members.
The "value of a variable" is determined by the environment's associated mapping. Values coding is a coding technique that explores the subjective aspect of human experience.
Value coding, in particular, is concerned with classifying the values, attitudes, and belief systems presented by participants. A value, like a letter or a number, is one of the fundamental objects that a program works with. Python allows you to print values.
Given that a = 3, b= 2, and c=0
a x b - c x b
3 x 2 - 0 x 2
6 - 0 = 6
Therefore, the value of the result is 6.
To learn more about variables, refer to the link:
https://brainly.com/question/18968869
#SPJ5
which og the figures ilustration kinetic potential energy? where only the water of your energy
Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen. Rhianna wants to be able to look at an image on her document closely. Which most likely describes how each person would set their page?
Carly will set the page to Page Width, and Rhianna would zoom to 150%.
Carly will zoom to 150%, and Rhianna would set the page to Page Width.
Carly will set the page to Page Width, and Rhianna would zoom to 15%.
Carly will zoom to 15%, and Rhianna would set the page to Page Width.
Answer:
a
Explanation:
Answer:A
Explanation: I just took the test on edgen
What do the following white characters symbol represent?
a) ¶
b) .
If you were to go back in time, what games might you find kids playing at the local arcade? List and describe at least two games.
Answer:
Pac-Man Battle Royale, Space Invaders Frenzy
Explanation: Pac-man Battle Royal, came out in 2011 not that long ago. Space Invaders Frenzy came out in 1978. That came out A WAY long time ago.
all beauty salons must be well-lighted and ventilated and must be good____condition.
I'm assuming working condition
what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for less private files ?
I recommend Google Drive, it allows up to 15gb of free storage. You can access it anywhere since it is from Google. Another one you can try is Dropbox which only allows up to 2gb.
which of the following is NOT an example of a compound
A, Gun Powder B, SALT C. Smoke from cars D. Oxygen
Answer:
D.
Explanation:
feels most right bro . pretty sure, not fully confident :)
what is data Communications
Transmission of digital data between 2 or more computers and a computer network or data network
Answer:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
Which of these is a way to portray motion in a painting?
use of primary colors
use of realism
use of space
use of angles
hurry !!!
The answer is use of angles
--disable-frame-rate-limit --disable-gpu-vsync --max-gum-fps="9999"
how can i disable my frame rate i will give 30 points for the person who tells me please cuz im caped at 60 fps
Answer:
is ma's mks wiwiwiwhwhuwuwiwwiwjjwjwjwjwwjjwjw
which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?
A. 5 volts
B. 3.3 volts
C. 12 volts
D. 100 volts
Answer:
D. 100 volts
Explanation:
Electrostatic discharge (ESD) can be defined as a swift or sudden discharge of static electricity between two (2) objects coming in contact. An electrostatic discharge occurs between the two objects because the objects are having a different amount of electrons and charge. Thus, when they come in contact it results in a huge buildup of electromagnetic field known as an electrostatic discharge (ESD).
Also, voltages from an electrostatic discharge (ESD) are capable of destroying the internal components of a computer. Generally, a 100 volts ESD would be the minimum to short circuit a computer's hardware components.
Additionally, an electrostatic discharge (ESD) can be prevented through the use of an antistatic wrist strap, antistatic bags etc.
There are different ranges of voltage. 100 volts is known to be the voltages from an ESD discharge that would be the minimum to short a computer's hardware components.
Electrostatic discharge (ESD) is know to be one of the sources of electricity that can lead to damage to computer equipment.
It is very important follow proper handling guidelines and also environmental issues, and use appropriate equipment so as to make power to be stable and hinder data loss and the damage of equipment.
Learn more ESD discharge from
https://brainly.com/question/4918499