who play back for blood?​

Answers

Answer 1

Answer:

who plays what for what...


Related Questions

The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers. O True O False​

Answers

Answer:

False

Explanation:

A mainframe computer is way more commonly available than a supercomputer as it is not as powerful/costly.

The statement "The terms mainframe computer and supercomputer are interchangeable: both refer to the largest, most powerfut computers." is false.

Is the statement true or false?

The terms "mainframe computer" and "supercomputer" are not interchangeable, as they refer to different types of computers with distinct purposes, architectures, and applications.

Mainframe Computer: Mainframes are large, powerful, and highly reliable computers designed to handle massive amounts of data processing and perform complex transactions. They have been traditionally used in organizations and industries that require high-speed processing, such as financial institutions, government agencies, and large corporations. Mainframes are known for their robustness, scalability, and ability to handle multiple tasks simultaneously. They are typically used for tasks like processing large databases, running critical business applications, and supporting many users concurrently.

Supercomputer: Supercomputers, on the other hand, are the most powerful computers in terms of processing speed and performance. They are specifically designed to solve extremely complex problems and perform intensive numerical calculations at very high speeds. Supercomputers are commonly used in scientific research, weather forecasting, simulations, and other computationally demanding tasks. They are optimized for parallel processing, which allows them to divide complex tasks into smaller parts and process them simultaneously.

While both mainframe computers and supercomputers are powerful machines, they serve different purposes. Mainframes are geared towards transaction processing and business applications in large organizations, whereas supercomputers are focused on scientific research and high-performance computing tasks. Their architectures, hardware, and software configurations are tailored to their specific functions, making them distinct types of computers in the world of advanced computing.

Learn more about supercomputers:

https://brainly.com/question/27291413

#SPJ3

An algorithmic solution to a problem is one in which a. a learned set of rules is used in answering the problem. b. the answer is arrived at by using the availability heuristic. c. the answer is arrived at by intuition. d. general and functional techniques are used in answering the problem.

Answers

Answer:

d

Explanation:

An algorithmic solution to any given problem is one in which is known to be a  learned set of rules is used in answering the problem.

What is Algorithmic solutions?

This is  known to be the solutions to a problem that targets how to handle a problem in a number of steps.

Therefore, An algorithmic solution to any given problem is one in which is known to be a  learned set of rules is used in answering the problem.

Learn more about algorithmic solution from

https://brainly.com/question/24953880

#SPJ6

what is a photographic print made from a negative image?

Answers

Answer:  The daguerreotype was a unique image, not capable of making multiple copies. then dried, placed under a negative, and exposed to light, producing a photographic print. dyeline process used today.

Explanation:

What are the advantages and disadvantages of working with APIs when developing applications?

Answers

Answer:

Disadvantage:-There is a lot of conveniences and advantages to APIs, but business leaders should also be aware of the disadvantages. As a single point of entry, an API is a gateway and can become a hacker's primary target. Once the API is compromised, all other applications and systems become vulnerable.

Nine of the top ten vulnerabilities listed in the OWASP Top 10 now mention APIs — and since APIs can be accessed over the internet, they will have all the same disadvantages as any other Internet-based resource.  APIs are vulnerable to man-in-the-middle attacks, CSRF attacks, XSS attacks, SQL injection, and DDoS attacks.

ADVANTAGE:- Automation: with APIs, computers rather than people can manage the work. Through APIs, agencies can update work flows to make them quicker and more productive

Explanation:

pLEASE MAKE ME AN BRAINLAEIST

!! please help!!

What technique is used in this code to repeat the process for each value in the array?

a. pause blocks
b. a repeat loop
c. a for loop
d. an array block​

Answers

Answer:

C: A for loop.

Explanation:

The for loop is used to repeat a section of code known number of times.

All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data​

Answers

Answer: A: a scanning device at the grocery store

Explanation:

how do ""night modes"" on computer screens help people fall asleep?

Answers

Answer:

it doesn't really help people fall asleep but

Explanation:

When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.

Answer:

Answer it doesn't really help people fall asleep but some people it can

Explanation:

Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open

An object on the computer use to store data, information and settings is known as?​

Answers

Answer:

Hard disk maybe.......

What are megapixels?
A. the size of an image captured by a camera
B. giant pixels inside the camera
C. a computer store
D. a video game played in a camera

Answers

Answer:

A.

Explanation:

A. It's the total number of pixels in an image obtained by multiplying the dimensions (height times width). For large images, this multiplication can be in the millions (=mega), hence the term mega pixels.

what is know of father of computer

Answers

Answer: Charles Babbage is the father of the computer.

Explanation:

help help help

Read the list of courses from a technical school (w3schools).

Which courses would prepare for you for a career in web development?
(Choose more than one answer)

Designing for Usability
Introduction to Networks
Technical Writing
Cybersecurity

Answers

The courses that would prepare you for a career in  web development are:

Designing for UsabilityTechnical Writing

To prepare for a career in web development, the following courses from a technical school like W3Schools would be beneficial:

Designing for Usability: This course focuses on user-centered design principles and techniques, teaching you how to create web interfaces that are intuitive, user-friendly, and visually appealing. It covers topics such as user research, information architecture, wireframing, and prototyping.Technical Writing: Effective communication is crucial in web development. This course teaches you how to write clear, concise, and well-structured technical documentation. You'll learn about writing for different audiences, organizing information, using appropriate language and style, and documenting code and processes.

Taking these courses will help you develop important skills for a career in web development. Designing for Usability will enhance your ability to create user-friendly websites, while Technical Writing will improve your communication skills, enabling you to document and explain your work effectively.

Courses like Introduction to Networks and Cybersecurity may be valuable in other IT fields, but they are not directly related to web development and may not be as relevant to this specific career path.

For more such question on Designing

https://brainly.in/question/56183783

#SPJ8  

Which statement correctly describes one aspect of the team's commitment at the end of PI Planning?​

Answers

The statement that describes one aspect of the team's commitment at the end of PI Planning is a team does not commit to uncommitted objectives.

What does teams do in pi planning?

PI planning are known to be a kind of face-to-face events that are held every  8-12 weeks after the former PI event was held.

In this event, a lot of teams do come together to map out, plan and set out the work that they needs to do, review backlogs, discuss which features will benefit them , form or update their product roadmap, and others.

Learn more about PI Planning from

https://brainly.com/question/6500846

Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are composed of shapes and all other design elements are shapes in some way. 2. The color is the basic tool for combining colors. 3. Red violet and blue green are examples of tertiary colors. 4. The arrangement of furniture on each side of a dominant point is referred to as radial balance. 5. Color is the way one feels or perceives about a surface.​

Answers

ANSWER:

TRUEFALSEFALSETRUETRUE_________________

CARRY ON LEARNING

CAN YOU BRAINLEST ME PLEASE

Answer:

1. False coz colour isnt a shape

2. True

3. True

4. True, I think

5. Can be true

Explanation:

please answer it is important!!!! i will mark you branliest

Answers

Answer:

Machine - consists of the numeric codes for the operations that a particular computer can execute directly

Assembly - provides the information of any error in the code.

High level - Require translation.

Require translation.Portable.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.

Help po thank you po ​

Answers

Answer:

hope helpful

Explanation:

a

c

b

c

d

have a great day

How can I use HTML to express a personal value

Answers

Answer: Order list

Explanation:

We can use HTML to express a personal value as a order list of some of our personal feelings.

What is HTML?

HTML stands for Hyper Text Markup Language. It is defined as the preferred markup language for texts intended for web browser display. HTML is the name of the language that describes how Web pages are organized. HTML allows authors to publish documents with headings, text, tables, lists, graphics, etc. online. Utilizing hypertext links, you can instantly access internet content by clicking a button.

You must assess the major facets of life, including the environment, job, enjoyment, romance, personal development, money, health, friends, and family, in order to develop a strong personal value system. Consider the significance of each area of your life, and then consider how fulfilled you currently feel in each area.

Thus, we can use HTML to express a personal value as a order list of some of our personal feelings.

To learn more about HTML, refer to the link below:

https://brainly.com/question/24065854

#SPJ2

5) Match the following.

Answers

1 .hub
2.server
3.Network Interface
4.Workstation


I’m sorry if I’m wrong :(

I hope it helps

In your opinion., which Zelda character is the hottest? Be honest.

Answers

Answer:

link<3

Explanation:

recent top-level domains include _____. select all that apply.

Answers

Answer:

.aaro, .mobi

Explanation: these domains are now available in the root zone. Similar to .com and .gov

what the answer is have been stuck for 4 hours on this questoin its sience

Answers

Answer:

what the question?

Explanation:

What is the value of x after running this code?

x = 0
for y in [1,2,3,4,5,6,7,8,9,10]:
x = x + y

Answers

counter = 1

sum = 0

while counter <= 6:

sum = sum + counter

counter = counter + 2

print(sum)

A. 12

B. 9

C. 7

D. 8

✔️ Correct! This loop executes 3 times. After the first loop sum = 1 and counter = 3, after the second loop sum = 4 and counter = 5, and after the third loop sum = 9 and counter = 7.

When the code runs it sums up the numbers, which results in 55. It says AFTER the code is finished so the answer will be 55. You can verify this by printing X again after the for loop

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

Answer:

device drivers

Explanation:

what threat do insiders with authorized access to information or information systems pose

Answers

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

Lists are indexed by an ________. a. float b. integer c. string d. All of the above​

Answers

All of above?

May be but not sure.

excel creates which type of cell references in formulas by default?

Answers

Answer: relative references

Explanation: By default, all cell references are relative references. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.13 may. 2020

which cyber protection condition establishes a protection priority focus on critical and essential functions only

Answers

INFOCON 1 is the cyber protection condition establishes a protection priority focus on critical and essential functions only.

INFOCON 1 describes the threat level system (defense system) that is used to defend against military attacks and is based fundamentally on the status of information systems i.e. on essential and critical functions of the system.

There are often five levels of INFOCON with INFOCON 1 being an acronym for "information operations condition 1" and is used in the United States of America and is carried out on attacks that were successful and could impact the missions of the Department of Defence and as such is only needed on occasions of extreme cyber risks.

In addition, INFOCON 1 describes the Computer Network Defense system at maximum alertness and any compromised systems in the network are completely isolated from the rest of the network to avoid further damage.

Learn more about cyber protection here: https://brainly.com/question/25157787?referrer=searchResults

 

How does the internet help you to improve your:
mental health
self esteem
Help you stay mentally active
Help you stay in contact with family

Like why is the internet useful and a good thing

Answers

Answer:

Help you mentally active

Explanation:

bcoz we can use internet in good ways

Helps you stay mentally active because it basically gives you something to do.

1. YOU CAN REVERSE AN UNDO ACTION BY CLICKING REDO. *

True
False

Answers

Answer:

if it's on the keyboard false

Help guys thank you =) ​

Answers

1.LR
2.LR
3.HR
4.LR
5.HR

tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?

Answers

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

‎DNS flood attack.DNS tunneling.DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: https://brainly.com/question/17273205

Other Questions
i will give brainliest to the best answer. Match the vocabulary word with the correct definition. 1. rectangular solid A:A segment whose endpoints are vertices not in the same face. 2. faces B:A solid figure whose faces are all rectangles. 3. diagonal of a rectangular solid C:The sides of a solid figure. How do I solve 0.0055 m a cm ? Where is the highest outdoor observation deck in the western hemisphere? What does amapscale measure? saan natin maaaring ipinta ang myural Shan works in an airport, up in the high tower. He is an air traffic controller who coordinates between the pilots in the air and the crew on the ground. The pathway in the Transportation and Logistics cluster that Shans job falls into is _____.Group of answer choicesA). Warehousing & Distribution Center OperationsB). Facility & Mobile Equipment MaintenanceC). Transportation Systems/Infrastructure Planning, Management & RegulationD). Logistics, Planning and Management Services Answer pls ASAPPP 50 pointsss!! The function g(x) is a transformation of the quadratic parent function, f(x) =x2. What function is g(x)?a. g(x) = 1/2x^2b. g(x) = -2x^2c. g(x) = 2x^2d. g(x) = -1/2x^2 Sally will help you with your housework direct object Indirect object A person jogging from the forest to the office covers the 6,800meters in 2 hours. Their speed is not constant and they slow downand speed up at various times. What is their average velocity?Round the answer to the hundredths place if necessary.a 1.9 m/s northb. Impossible to calculate since the speed wasn't constant.C. 0.9420/s northd. 56.67 m/s northe. 1.34 m/s northf. 0.56 m/s north Find the radius of a cube whose volume is 994 cubic centimeters.Using work to find the radius Where is the Catrina parade? Ang kasintahan ng dalaga sa alamat ng Palendag ay isang PLS HELP ILL GIVE BRANLIESTWhat is the value of b in the equation (y^b)^4= 1/y^24? The word matrix can be used to describe things shaped In a pattern of lines and spaces. How does this relate to a mitochondrion? which race/ethnic group has the highest maternal mortality rate in the us? What is the immediate effect of weathering?Sediment forms into sand dunes.O Rock is broken down into into smaller pieces.Sediment is moved from one place to another.Tree roots pry rocks apart. The radius of a smaller circle is half the length of the radius of a larger circle. The area of the larger circle is 20 square inches. What is the approximate area of the smaller circle? - Given: C is the midpoint of AEC is the midpoint of BDAE = BD=Prove: AC = CD