Answer:
Creative Commons license is different from regular copy right because it's more loose and allows the owner to give out their art for others to use.
Explanation:
Creative Commons license isn't as strict as a normal copy right license allowing the owner to give out their art/movie/music for others to use.
[I'm doing this for code.org too :)]
who was the co-developer of first microprocessor ?
Answer: Busicom
Explanation: The Birth, Evolution and Future of the Microprocessor Abstract: Summary form only given. The world's first microprocessor, the 4004, was co-developed by Busicom, a Japanese manufacturer of calculators, and Intel, a U.S. manufacturer of semiconductors.
A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above
it depends on the brand of laptop,If it is standard use function key if not None of the above
To prevent computer errors, which of the following characters should not be used in a filename?
– (hyphen)
_ (underscore)
% (percent
* (asterisk)
Answer:
asterisk
Explanation:
it cannot be used because it is a
Answer:
* asterisk and % percent
Explanation:
Edge Nuity
write a function called orbit that takes three inputs and returns three outputs. our function is related to a planet that is in orbit around a star. remember that planets have elliptical orbits, like this:
Answer:
function [circT, ram1T, ram2T] = orbit(major, minor, velo)
a = major;
b = minor;
v = velo;
days = 86400;
% Circular approximation
circT = ((2 * pi *sqrt((a^2) + (b^2))/(2))/ v )/ days;
% Ramanujan's first approximation
ram1T = (pi * (3 * (a + b) - sqrt((3 * a + b) * (a + 3 * b)))/v)/days;
% Ramanujan's second approximation
h = ((a - b)^2) / ((a + b)^2)
ram2T = (pi * (a + b) * (1 + (3 * h )/ (10 + sqrt(4 - 3 * h)))/v)/days;
end
Explanation:
A planet is a celestial body that (a) orbits the sun and (b) has enough mass for its own gravity to outweigh the forces of rigid bodies and establish hydrostatic equilibrium.
The Sun (star) drags planets down into an orbit around it with its gravitational attraction. The elliptical course of their orbit is maintained by this gravity, which is a crucial force. As this force of gravity is directly proportional to mass and inversely proportional to the distance between them, if it changes, it will have an impact on the celestial bodies that revolve around it, such as planets. According to the query, when the star's gravity grows, planets will be more drawn towards the sun, reducing the distance between the star and the planet. As a result, the orbital path will get smaller, and the orbital period will increase.
Learn more about A planet here:
https://brainly.com/question/30040861
#SPJ4
Sebastian is working on a web page that includes both essential and non-essential information about an event that is happening at his shop. How
Sebastian can organize the essential and non-essential information about the event on his webpage in the following steps:
1. Identify the essential information: Determine the key details that visitors to the webpage need to know about the event. This may include the date, time, location, and purpose of the event.
2. Highlight the essential information: Make sure that the essential information stands out on the webpage. Use headings, bullet points, or bold text to draw attention to these important details.
3. Provide additional details: Include non-essential information about the event that may be of interest to visitors but is not crucial for understanding the event. This could include background information, special features, or testimonials.
4. Use clear formatting: Arrange the essential and non-essential information in a logical and easy-to-read manner. Consider using sections or tabs to separate the different types of information, making it clear what is essential and what is non-essential.
5. Prioritize the essential information: Place the essential information prominently on the webpage so that it is easily noticeable. This ensures that visitors can quickly find the most important details without having to search through the entire page.
In summary, Sebastian can organize the essential and non-essential information about the event on his webpage by identifying the key details, highlighting them, providing additional non-essential details, using clear formatting, and prioritizing the essential information.
#SPJ11
Learn more about Information
https://brainly.com/question/26260220
Sebastian can organize the web page by distinguishing between essential and non-essential information about the event happening at his shop. Here's how he can do it:
1. Identify essential information: Sebastian should determine the key details that visitors must know about the event, such as the date, time, location, and any important announcements or updates.
2. Prioritize essential information: Once he has identified the essential information, Sebastian should place it prominently on the web page, ensuring that it is easily visible and accessible to visitors. This could include using headings, subheadings, bullet points, or highlighting key details.
3. Separate non-essential information: Sebastian should then identify any additional details or supplementary information that is not essential for visitors to know. This could include things like event background, history, or optional activities.
4. Organize non-essential information: Sebastian can create separate sections or tabs on the web page to present the non-essential information. This way, visitors who are interested in learning more can easily access it, while those who are looking for essential details can find them without being overwhelmed.
5. Use clear and concise language: Regardless of whether it's essential or non-essential information, Sebastian should ensure that all text on the web page is written in a clear, concise, and easy-to-understand manner. This will help visitors quickly grasp the important details and navigate through the web page effectively.
By following these steps, Sebastian can create a well-organized web page that presents both essential and non-essential information about the event happening at his shop.
#SPJ11
Learn more about Web page here:
brainly.com/question/32613341
There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:
A[0] = 1
A[1] = 2
A[2] = 3
A[3] = 4
A[4] = 5
Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1
The Java code that solves this problem has been written in the space below
How to write the Java codepublic class Solution {
public int solution(int[] A) {
int totalLoad = 0;
for (int load : A) {
totalLoad += load;
}
int server1Load = 0;
int server2Load = totalLoad;
int minAbsoluteDifference = Integer.MAX_VALUE;
for (int i = 0; i < A.length - 1; i++) {
server1Load += A[i];
server2Load -= A[i];
int absoluteDifference = Math.abs(server1Load - server2Load);
minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);
}
return minAbsoluteDifference;
}
}
Read mroe on Java code here https://brainly.com/question/25458754
#SPJ1
A device which lets you interact with the computer
Answer:
Input, output, storage.
Explanation:
Input is used to interact with, or send data to the computer (mouse, keyboards, etc.). Output provides output to the user from the computer (monitors, printers, etc.). And storage which stores data processed by the computer (hard drives, flash drives, etc.).
Answer:
The answer are;
1 . mouse
2 . keyboard
what ribbon command on the home tab can you use to change a cell fill color
The ribbon command.
The ribbon command can be found in Microsoft word and the other files types seen on the home button, it can be sued to change the color. It organizes the features of the program and enables the viewer to work efficiently. The tab is dedicated to all the main functions.
Thus the answer is explained in steps.
The first step is for changing colors is the option of select those cells that color you want to change. Second, the command of ctrl+Shift+F. Excel displays the Format Cells dialog box. The third step is you use the Fill tab is selected. In the last step use the color palette and select your color, then click OK.Find out more information about the ribbons command.
brainly.com/question/26113348.
Your question was incomplete.
The IP address and the port are both numbers. Which statement is true?
A computer has many IP addresses and one port.
A computer has many IP addresses and many ports.
A computer has one IP address and one port.
A computer has one IP address and many ports.
Answer:
i believe it is the last one
Answer:
The answers are in different orders for everybody, the correct answer is A computer has one IP address and many ports.
Determining which computer platform (operating system) would be best for a particular student often depends on what the student wants to study and in which industry she or he wants to enter after graduation. Students who plan to study graphic design or want to focus on photo production or publishing should strongly consider the __ platform since it is generally considered the industry standard in those fields.
Answer: Window OS
Explanation:
Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.
Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.
How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas
The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.
How did Native Americans gain from the long cattle drives?When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.
Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.
There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.
Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.
Learn more about cattle drives from
https://brainly.com/question/16118067
#SPJ1
Which of the following is opened when the Find command is clicked? Question 9 options: Navigation Pane Insert Hyperlink dialog box Bookmark dialog box Search Pane.
The element, from the following options, which is opened when the find command is clicked is the search pane.
What is find command?Find command is the command which is used to find the list of files and their location.
Find command can be used in different manners-
To find the different files in a system.Find command can find the files by their name, size, date or other information related to the required document.This command can be modified with the requirement of the search.The options for the given problem are-
Navigation Pane Insert- It is used to show the navigation pane in word or similar space. Hyperlink dialog box-This open, when the insert hyperlink command is clicked.Bookmark dialog box-This opens, when the bookmark command is clicked.Search Pane- Search pane is opens, when the find commond is clicked.Thus, the element, from the following options, which is opened when the find command is clicked is the search pane.Learn more about the find command here:
https://brainly.com/question/25243683
who is father of computer?
_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning
Answer: it’s A, social media
Explanation:
Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.
What is Social Media?Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.
Social media includes the technologies used to support virtual communities and the sharing of content.
Hence, the correct option is 1.
Learn more about Social Media:
https://brainly.com/question/18958181
#SPJ2
pivottable are based on?
A pivot table is known to be based on the summary of your data and it is one that report on different topics or explore trends.
What is pivot table?This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.
Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.
Learn more about from
https://brainly.com/question/2222360
#SPJ1
someone pls help me w this
Answer:
pay full attention, prepare intro, attend events
Explanation:
i don't really know but it feels like common sense so im pretty sure
don't take my work for it lol
How can malicious code caused damage?
Malware can be spread through various means, such as email attachments, infected websites, or software downloads. Once it infects a system, it can cause damage in a number of ways.
What are the type of malware?One common type of malware is a virus, which can replicate itself and spread to other computers. Viruses can corrupt or delete files, steal personal information, and even cause a system to crash.
Another type of malware is a Trojan horse, which disguises itself as legitimate software but actually contains harmful code.
Trojans can give attackers remote access to a system, allowing them to steal sensitive data or control the system for their own purposes.
Ransomware is another type of malware that encrypts files on a system and demands payment in exchange for the decryption key.
Learn more about malware at
https://brainly.com/question/14276107
#SPJ11
The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.
The session layer is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down, as needed.
In the field of computer studies, we can describe the session layer as the fifth layer or part of the Open Systems Interconnection (OSI) model and its function is to manage the users from different computers to interact and make communications with each other.
Each dialog that occurs between two systems is referred to as a session by the session layer. The system layer establishes and manages and then terminates each session between end-term users effectively.
As the main pattern or theory of the session layer is similar to that of a telephone conversation hence we can say that both processes have similarities between them.
To learn more about session layers, click here:
https://brainly.com/question/4910167
#SPJ4
can someone help me with this project im confused
u have to progrem a math algorithum
a nested if statement only executes if the if statement in which it is nested evaluates to true.
true/false
True. A conditional statement that is nested inside another if statement is referred to as a nested if statement. As the nested if statement will only be executed if the outer if statement evaluates to true, this enables more complex decision-making in the code.
In other words, the outer if statement's condition is what determines whether the nested if statement applies. No matter if the nested if statement's own condition is true or false, it will not be performed if the outer if statement's condition is false. Given that the nested if statement will only be run if it is genuinely essential, this can aid in code optimization and reduce the need for pointless computations. It's critical to check that the logic of the nested if statement is sound because any flaws could cause the programme to behave unexpectedly.
learn more about Nested here:
brainly.com/question/13971698
#SPJ4
what is the importance of keeping information private and secure online
The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
Answer:
archive
Explanation:
the archive process retains copies of data over extended periods of tike in order to meet legsl ane operational requirements
I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.
My code:
b = float(input("Enter Temperature: "))
Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line
Answer:
The error is because you wrapped the input in float. First record the input and then modify it.
Explanation:
b = input("enter temp:")
b = float(b)
Select the correct text in the passage.
Select the sentence that is not the correct use of technology in parenting.
Technology has helped parents to access a vast information resource due to the presence of the internet. They can show a range of education
material like nursery rhymes, stories, scientific concepts, and so on conveniently on their smartphones. Teachers can coordinate with the
parents about the child's progress due to smartphones and various applications on it. Some parents have replaced the customary practice of
reading a bedtime story to children with a television show of the child's choice.
Reset
Next
Answer:
some parents have replaced the customary practice of reading a bedtime story to childern with a television show of the child's choice
Explanation:
Aking sense of the death, the social consolidation after a death occurs, and caring for the dying are all functions of the: Multiple choice question. Sociology of death. Determinants of death. Death system. Psychology of death
The Death System is responsible for understanding the death, the social consolidation after a death occurs, and caring for the dying as it is the functions of the Death System.
The Death System comprises funeral homes, hospitals, cemeteries, crematoria, and various other entities that work to address the needs of the dying, the deceased, and the bereaved.A good understanding of the Death System is critical since it will help in comprehending the ways in which death and dying can affect various sectors of society.
The sociology of death is the study of the social structure, processes, and culture that surrounds death and dying. The determinants of death are the factors that cause or contribute to an individual's death. The psychology of death is the study of the psychological and emotional responses to death and dying.
To know more about responsible visit:
https://brainly.com/question/28903029
#SPJ11
Data retrieved from web queries do not include __________ and contents of __________.
Data retrieved from web queries do not include pictures and contents of scripts.
Data retrieval is the process to obtain data from a database management system. And, web application or system is a software program that is stored on a remote server and provided over the Internet through a browser interface. In order to retrieve data from web-based systems, web queries are used to fetch data from web databases. When data is retrieved from web-based database systems through web queries, the resulting data do not include pictures and contents of scripts.
You can learn more about data retrieval at
brainly.com/question/14939418
#SPJ4
Microcomputer other device on the network that requests and utilizes network resources Hub Switch Client Server
Answer:
Client.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
A client can be defined as a microcomputer or other device on the network that requests and utilizes network resources.
These network resources that are being requested by the client (client computer) are typically made available by a dedicated computer on the network known as a server.
True or False: Encryption is an effective deterrent against breaches of PHI maintained electronically.
True. Encryption is an effective method of protecting PHI maintained electronically. It ensures that even if a breach occurs, the information cannot be read or accessed without the appropriate decryption key.
thereby reducing the risk of unauthorized disclosure or theft. It is also a requirement under HIPAA regulations to protect electronic PHI. Decryption is the process of converting encrypted data back into its original form using a decryption key. Encryption is the process of converting plain text data into a scrambled form, which can only be read by someone with the decryption key. Decryption is used to protect sensitive information from unauthorized access by hackers and other malicious actors.
The process of decryption involves using the decryption key to reverse the encryption process, transforming the encrypted data back into its original form. Decryption is used in various contexts, including online transactions, secure messaging, and data storage. Decryption can be done using software tools, such as decryption software, or by hand using mathematical algorithms.
However, decryption can also be a security risk if the decryption key falls into the wrong hands. It is therefore important to use strong encryption algorithms and to store decryption keys securely.
Learn more about Decryption here:
https://brainly.com/question/29765762
#SPJ11
hubspot - if explicit data is information that is intentionally shared between a contact and a company, what is implicit data?
Implicit data is data that is collected about a contact without their direct knowledge or permission. It can include information such as browsing or search history, IP address, geolocation, and other online activity.
What is IP address?
An IP address (Internet Protocol address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two primary functions: host or network interface identification and location addressing. An IP address consists of two parts: the network number and the host number. It is a unique identifier that is used to identify computers and other devices on a network. It also helps in providing routing information in the network. IP addresses are typically written in decimal numbers, separated by periods. They are also written in binary numbers, but this is not common.
To know more about IP address
https://brainly.com/question/14219853
#SPJ4
create a stored procedure called updateproductprice and test it. (4 points) the updateproductprice sproc should take 2 input parameters, productid and price create a stored procedure that can be used to update the salesprice of a product. make sure the stored procedure also adds a row to the productpricehistory table to maintain price history.
To create the "updateproductprice" stored procedure, which updates the sales price of a product and maintains price history, follow these steps:
How to create the "updateproductprice" stored procedure?1. Begin by creating the stored procedure using the CREATE PROCEDURE statement in your database management system. Define the input parameters "productid" and "price" to capture the product ID and the new sales price.
2. Inside the stored procedure, use an UPDATE statement to modify the sales price of the product in the product table. Set the price column to the value passed in the "price" parameter, for the product with the corresponding "productid".
3. After updating the sales price, use an INSERT statement to add a new row to the productpricehistory table. Include the "productid", "price", and the current timestamp to record the price change and maintain price history. This table should have columns such as productid, price, and timestamp.
4. Finally, end the stored procedure.
Learn more about: updateproductprice
brainly.com/question/30032641
#SPJ11