Answer: A :is concerned with defending users’ freedom of use
C:makes source code available for editing
Explanation:
Answer:
a and c
Explanation:
Fill in the blank with the correct term.
A _____ sort starts by comparing the first item in the list to the remaining items, and swaps where the first item is greater than the later item.
Then it compares the second item in the list to the rest.
This continues until it compares the second last item to the last item.
Which of the following sentences use personification 
A. The stars in the sky are bright
B. The tree had leaves of green, yellow, and brown,
C. The truck pulled the heavy trailer out of the mud.
D. The snowflakes danced through the air.
Answer:
D
Explanation:
snowflakes cant dance.Its a human things.
which category does this fall in identity theft
Answer:
A crime.
Explanation:
It's illegal.
A shop has a sale that offers 40% off all prices.
On the final day they reduce all the sale prices by 20%.
Linz buys a radio on the final day.
Work out the overall percentage reduction on the price of the radio.
Answer: 52%
Explanation:
First they reduced the prices by 40% so now the prices are 60% of their original price.
They then reduced it by a further 20%.
= 20% * 60%
= 12%
Total reduction = 40% + 12%
= 52%
Which type of cryptography uses two mathematically linked keys, one key encrypting the data and the other decrypting the data?
Asymmetric
Encoding
Firewall
Symmetric
Answer:
Asymmetric.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
There are two (2) main types of encryption techniques used in cryptography and these are;
I. Symmetric encryption.
II. Asymmetric encryption.
Asymmetric encryption is a type of cryptography which uses two mathematically linked keys, one key encrypting the data and the other decrypting the data. These two keys are generally referred to as a public key and a private key respectively.
This ultimately implies that, a pair of key (two keys) that are different in values is required or needed to make a computer system secured.
In 5-10 sentences, describe the procedure for responding to an e-mail message.
Answer: See explanation
Explanation:
The procedure fur responding to an email message goes thus:
The first thing to do is to open the website of the email. Then, you would click on "compose".
When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.
Then you type the content of your message. When you're done with this, then you click on send.
____ describes the concept of spreading applications over more than one computer system. Group of answer choices
Answer:
Distributed Computing.
Explanation:
Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;
I. Autonomic computing: it comprises of systems which are self-managed. It is similar in operations with the autonomic nervous system in humans and is used in assembly lines for optimum automated production.
II. Grid computing: it is a collection of connected computing systems that function to achieve a common goal and are mainly located at various locations. It is commonly used for seismic analysis and weather forecasting.
III. Green computing: it is a programming concept that is based on the creation and use of technology in an environmentally friendly manner, thus, it focuses on the use of recyclable resources, power and resource management and energy efficiency management.
IV. Distributed Computing: it describes the concept of spreading applications over more than one computer system.
The terms Apps and Applications can be used interchangeably about software installed
on both computers and mobile devices. True or False
Answer:
False
Explanation:
Hope this helps and have a great day!!!!
373 + 891 = 891 + ____ find the whole number
Answer:
373
Explanation:
Answer:
373
Explanation:
Commutative property, If my answer helped, kindly mark me as the brainlest!!
While in the Current View command group for notes, which view options do you have available? Check all that apply.
Answer: A, B, C (is this for a Microsoft class?)
Explanation: Edge
Answer:
Icon
Note list
Last 7 days
Explanation:
When you open your word-processing program, it opens in a
field
menu
Answer:
B
Explanation:
What is plagiarism? Suppose you are an online store owner & you caught someone copying your store items and selling them at a lower price. What will you do? Keep in mind that your business in ONLINE
Answer:
Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.
when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself because you cannot have a monopoly of the market since it is an online business
Explanation:
Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.
when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself next time, because you cannot have a monopoly of the market since it is an online business hence there will be no action
Edhesive Intro to cs quiz 2 q#9
What is output?
Print (3 % 15)
Thanks!!
Answer:
5
Explanation:
AS we know that % is the sign of division in C language when we divide the 3 into 15 its 5
Answer:
5
Explanation:
stay safe and search answers up if you need
Answer:
Yes, Thank you
Jesus loves you!!
Explanation:
Sean is considering a career in construction but is worried about job security. Which of the following arguments might help convince him to
enter the construction industry? (Select all that apply.)
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
The educational requirements vary depending on the specific construction job.
Construction work varies by season, but all workers have come to expect this.
Answer:
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
Construction work varies by season, but all workers have come to expect this.
Explanation:
Answer:
Even when the economy is poor, demand for building maintenance remains high.
Because it is site specific, construction work is impossible to outsource.
Explanation:
Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use throughout a program.
Variables are used to store information that is referenced and manipulated in a computer program.
Variables provide a way of labeling data with a descriptive name
Variables are containers that hold information.
Answer:
Variables store data in memory; this data has limited use throughout a program.
Explanation:
In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information which can be modified or edited.
Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Some of the function of a Variable includes;
I. Variables are used to store information that is referenced and manipulated in a computer program.
II. Variables provide a way of labeling data with a descriptive name. This helps to make programming codes to be clear and easy to understand for everyone.
III. Variables are containers that hold information.
Generally, variables are essential in writing codes because they are used to label and logically store data in contiguous memory locations.
Hence, variables store data in memory; this data can be used throughout the program i.e they do not have limited use throughout a program.
Which of these lines of code will increment a variable?
A.
print(variable)
B.
count(variable)
C.
inc(variable)
D.
variable = variable + 1
Answer:
D
Explanation:
Answer:
D.
Explanation:
I got it right on the test.
Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart
Complete Question:
Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)
Group of answer choices.
a. Try an external device before replacing the motherboard.
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.
Answer:
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.
Explanation:
In this scenario, Sherri is considering replacing a processor on her laptop because the laptop is running slower than she would like.
Hence, Sherri should consider the following informations prior to taking the laptop apart;
I. Make sure you have the correct processor for the motherboard. She can get the specifications of the motherboard and processor on the manufacturer's website.
II. Verify that the laptop is not under warranty because if it still under warranty, taking the laptop apart would void the warranty granted by the original manufacturer.
III. Determine whether a teardown procedure is available. She should ensure there is a guide available for dismantling and re-coupling of the laptop.
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a
loop to control different elements on a screen?
Answer:
The search bars in search engines to find the most reliable information.
Explanation:
Which technology concept uses computer resources from multiple locations to solve a common problem?
Answer: Sounds like you are talking about “Distributed memory systems” which use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.
PLZ HELP
Alejandro decided to save some time by copying and pasting code into the editor, but the program didn’t work. What is the most likely explanation for this?
A.
There was no binary converter.
B.
Interpreters can’t read symbols from a different font.
C.
There was no code editor available.
D.
There was an error in the original code.
Answer:
B needed points but its right
;)
Explanation:
A professional interpreter's job is to make it possible for two or more parties who speak different languages to communicate with one another. Because of this, qualified interpreters are limited to translating spoken words. Thus, option B is correct.
What Interpreters can’t read symbols from a different font?Their responsibilities include accompanying clients on trips to help them communicate with others who speak different languages, translating speeches or presentations for audiences that are multilingual, and assisting with the conversion of spoken words into written communications.
Add > Symbol > Additional Symbols. Select the symbol in the resulting window, but also double-check that the font is set to your usual font on the line at the upper left. After that, type your shortcut. The symbol ought to display in the specified font when you use the shortcut.
Therefore, Interpreters can’t read symbols from a different font.
Learn more about font here:
https://brainly.com/question/7971447
#SPJ2
Explain the applications software that you use everyday
Answer:
Game software e.g PES, Star wars
How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or do you know any playback sites that aren't blocked ?
Answer:
if u use chrome u can probably look on chrome extensions and search you-tube unblocker and add it to ur chrome
Can someone help me plz
Answer:
ok but on what tho
Explanation:
plz explain yourself
witch is it?
i got it rong
Explanation:
first u need to learn spelling second theres no picture
The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.
Answer:
Const.
Explanation:
In C++ programming language, if you wish to have your compiler deny or prevent access to a member function in modifying (changing) a calling object's private member variables in a line of code, you should declare the member as a const function. Therefore, the member function is simply declared as a constant by the compiler.
The word const at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.
What value will the color variable have after these lines of code run?
Answer:
red
Explanation:
color is set to red in the last line of being defined.
use this (Find the surface area of a cylinder.)
Write a pseudocode plan for your program.
Write the code for your program.
Test your program. Run it at least three times with different inputs.
Save your program as a .txt file for you cannot upload a .py file.
Evaluate your project using this rubric.
Answer:
What's the best to use Microsoft Word or PowerPoint
Which of the following is a legal variable name?
A) O temperatureAM
B) 52
C) 1test
D) #data
Answer:
D #data
Explanation:
A) O temperatureAM is a legal variable name.
Taking a recipe and breaking it down into its individual sections, like ingredients, preparation, cooking instructions, and nutritional information, is an example of _____.
refinement
pattern recognition
decomposition
abstraction
Answer:
its C - Decomposition
Explanation:
100% edge
Fruits and vegetables lose some of their vitamins and phytonutrients, which are healthy plant molecules other than vitamins and minerals. The amount of nutrients destroyed increases with cooking time and temperature. Some nutrients can even start to be lost during food preparation. Thus, option C is correct.
What cooking instructions, include decomposition?Boiling results in the greatest loss of nutrients, while other cooking methods more effectively preserve the nutrient content of food. When it comes to preserving nutrients, stir-frying, roasting, and steaming are some of the best ways to prepare vegetables.
There are three different sorts of cooking techniques: combination cooking, moist heat cooking, and dry heat cooking. Heat is used in each of these techniques to modify food uniquely. These three ways can be used to categorize all forms of cooking, including grilling and steaming.
Therefore, taking a recipe and breaking it down into its individual sections, like ingredients, preparation, cooking instructions, and nutritional information, is an example of (decomposition).
Learn more about cooking here:
https://brainly.com/question/5190639
#SPJ2