Is this right? I’m not sure

Is This Right? Im Not Sure

Answers

Answer 1
Yeah indeed it is. Good job!!

Related Questions

Which describes the third step in visual character development?

Answers

3d model of a character is the third step

Deonte, an engineer, has designed a specialized bicycle tire for a manufacturer. What industry does Dante work in?
1. Chemicals
2. Electronics
3. Machinery
4. Rubber and plastics

Answers

Answer:

i think its number 4, because its only the tire itself

Explanation:

Answer:

rubber and plastics

Explanation:because the wheel is rubber and the rubber support is plastic

What is the purpose of saving code snippets?
A stores code for later re-use
B provides the application users more flexibility
C allows you to make the application available in different languages
D makes the application more accessible

Answers

Answer:

A stores code for later re-use

Explanation:

To find - What is the purpose of saving code snippets?

Solution -

Code Snippet" is used to describe a small portion of re-usable source code, machine code, or text.

They allow a programmer to avoid typing repetitive code during the course of routine programming.

So,

The correct option is - A stores code for later re-use

it is very easy to change data into charts
what is a Microsoft Excel Microsoft Outlook or both​

Answers

It’s microsoft Excel

Examine about the Internal & External Fragmentation methods give an example for each. essay​

Answers

Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.

Internal Fragmentation

A bigger chunk of RAM is set aside for the process. Some memory is left unused because it cannot be utilised by another function. By properly allocating the smallest division that is yet large enough for the process, internal fragmentation can be reduced.

When there is a mismatch between the quantity of memory needed and the amount of memory that is actually available, internal fragmentation becomes a problem.

When paging is used, internal fragmentation occurs.

When memory allocations are made but chunk sizes are fixed, internal fragmentation follows.

Internal process fragmentation occurs when a process consumes less memory or uses more than the allocated memory block can hold.

External Fragmentation

Although the total RAM is large enough to accommodate a process or handle a request, we are unable to use it since it is not contiguous. To lessen external fragmentation, we can condense or shuffle memory to free up a substantial amount of space. For compaction to be useful, relocation must be dynamic.

Internal fragmentation is largely controlled via Best Fit Block Search.

External fragmentation is fixed through compaction.

When the size of the allotted memory blocks fluctuates, external fragmentation occurs.

When segmentation is used, external fragmentation happens.

When small, non-contiguous memory blocks cannot be assigned to any process, external fragmentation results.

An affected process is deleted from the main memory as a result of external fragmentation.

Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shuts down his computer and leaves for the day at 4:30 p.m. What will happen at 5 p.m.?

Answers

Answer:

The Email will send.

Explanation:

The email will send as long as there is internet connection.

Answer: this isnt an answer but i really need ur help.. did u pass the microsoft unit test? I cant pass it if my life depended on it

Explanation:

Its on edge

Select the correct answer.
Ergonomic principles suggest minimizing pressure points while working on a computer. What will help to minimize pressure points while doing
sedentary work?
O A. use handles on boxes
O B.
take regular breaks
O C.
use cushioning while sitting
arrange your work area
O
D.
Reset
Next

Answers

I think the third option C

The answer here is hh b

Of the following field which would be the most appropriate for the primary key in a customer information table?

A: Customer Name B: Customer Number C: Phone Number D: Customer Address

Answers

Answer:

Customer Number

Explanation:

What additional hindrances do criminal investigators face when dealing with computer crimes aside from the obvious struggle with the ever-changing technological world?​

Answers

Answer:hackers

Explanation:

What is the purpose of the Microsoft® PowerPoint® application? to design publications such as newsletters and brochures to create documents such as business letters and resumés to develop presentations for business meetings to design a company employee database

Answers

Answer:

The first one

Explanation:

The main purpose of MS PowerPoint is to enable the user to create dynamic, informational slides through the use of text, graphics, and animation.

The purpose of PowerPoint is to act as a visual aid as a presenter goes along presenting their option, ideas, sales pitch, etc. Make sure to not make your slides too wordy and concentrate on adding only basic bullet points.

Answer:

to develop presentations for business meetings

Explanation:

Any of the other options will be used in Word, Excel and Publisher.

But Power Point is mainly for presentations and not newsletters and other.

True or False: Only CSS has online documentation because it is a more complex language than HTML. O True False​

Answers

Answer:

False

Explanation:

Both CSS (Cascading Style Sheets) and HTML (Hypertext Markup Language) have online documentation. CSS and HTML are separate languages with different purposes. HTML is used for structuring and presenting content on the web, while CSS is used for styling and formatting the appearance of that content.

Both languages have their own specifications and documentation available online. HTML documentation provides information about the various elements, attributes, and their usage, while CSS documentation covers properties, selectors, and how to apply styles to HTML elements.

Therefore, it is incorrect to say that only CSS has online documentation. Both CSS and HTML have extensive documentation available for reference.

8
What is a serial advanced technology attachment (SATA) cable used for?
O A.
to connect storage devices to the motherboard
to connect RAM to the CPU
to connect the heat sink to the motherboard
OB.

Reset
Next

Answers

SATA is used to know how data is transferred

What is SATA?

Hard disc drives (HDDs), optical drives, and solid-state drives are examples of mass storage devices. Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

features of SATA:

Serial SATA controller hardware, which also controls data flow, is used to link HDDs and SSDs to a computer's motherboard. The hard disc may be detected as a PATA device when SATA is in IDE mode. Performance is compromised, but the arrangement makes it easier to use with older technology.

Performance is improved when a SATA controller is set to Advanced Host Controller Interface (AHCI) rather than IDE mode. The hot switching of discs and external interfaces is supported by AHCI. Both AHCI capabilities and RAID data security features are supported by the RAID mode.

Hence to conclude using SATA we can increase the performance

To know more on SATA please follow this link

https://brainly.com/question/29035982

#SPJ9

Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802.11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.


What wireless network security protocol can Luke implement on the WAP so that the printer can connect to his wireless network?

Answers

Answer:

WPA2

Explanation:

The best wireless network security protocol for Luke would be WPA2. This is the latest security protocol version which brings with it extra encryption for a more secure connection. Aside from this WPA2 is backwards compatible with devices made for WPA. Therefore, it makes WPA2 the best solution for connecting the printer wirelessly to the network since it allows for 802.11g standard connection, the same as the printer.

What kind of waste does a computer generate?

Will give brainly :3

Answers

Answer:

waste???? a computer??

With this S/MIME function, anyone can view the message content, but only those with S/MIME capabilities can verify the message signature.

a. enveloped data
b. signed and enveloped data
c. clear-signed data

Answers

Answer:

The correct option is c. clear-signed data.

Explanation:

Clear-signed data enables a digital signature to be created by encrypting the message digest of the material to be signed using the signer's private key. But only the digital signature is encoded with base64 in this scenario. As a result, recipients who do not have access to S/MIME can see the content of the message but the message signature cannot be verified by them.

Based on the explanation above, the correct option is therefore c. clear-signed data.

Examine trends in emergence of computer from 1936-1985 and its relevance to education industry in Nigeria

Answers

Answer:

The emergence of computers from 1936-1985 witnessed several remarkable trends that had considerable relevance to the education industry in Nigeria. Below are some of the significant trends and their relevance to the education sector in Nigeria:

1) The First Generation Computers (1936-1950s): The first computers were large, bulky, and crude devices that used vacuum tubes, magnetic drums, and punched cards for data processing. The early computers were mainly used for government and military purposes, such as code-breaking, ballistic calculations, and scientific research. The relevance of first-generation computers to the education industry in Nigeria was limited, as they were too expensive and complex for widespread adoption in schools.

2) The Second Generation Computers (1950s-1960s): In the 1950s, computers became smaller, faster, and more reliable, thanks to the invention of transistors. Second-generation computers used magnetic core memory and high-level programming languages such as COBOL and FORTRAN. These advancements made computers more accessible to businesses and government agencies, enabling them to streamline their operations and increase efficiency. However, the education industry in Nigeria still had limited access to computers due to cost and technological barriers.

3) The Third Generation Computers (1960s-1970s): The Third Generation Computers witnessed several improvements in technology, such as the development of the integrated circuit, which led to the creation of miniaturized and affordable computers. These computers were faster, more reliable, and had increased data storage capacity. They were also equipped with graphical user interfaces and interactive software, making them more user-friendly. This generation of computers became more relevant to the education industry in Nigeria, as they were affordable enough to be used in schools for teaching and learning.

4) The Fourth Generation Computers (1970s-1980s): Fourth-generation computers were faster, cheaper, and more efficient than their predecessors. The introduction of microprocessors made it possible to design computers that were small enough to fit on a desktop. This development led to the development of personal computers, which revolutionized the way people worked and communicated. Personal computers had enormous relevance to the education industry in Nigeria, as they enabled students and teachers to access information and learn new skills more easily.

In conclusion, the trends in the emergence of computers from 1936-1985 had considerable relevance to the education industry in Nigeria. Despite the technological and cost barriers that limited access to computers in the early years, the advancement of computer technology over time made it possible for computers to become an integral part of teaching and learning in Nigeria.

Write an if-else statement for the following:

If userTickets is not equal to 6, execute awardPoints = 10. Else, execute awardPoints = userTickets.

Ex: If userTickets is 14, then awardPoints = 10.

Write an if-else statement for the following:If userTickets is not equal to 6, execute awardPoints =

Answers

Answer:

       if (userTickets != 6) {

           awardPoints = 14;

       } else {

           awardPoints = userTickets;

       }

Explanation:

Can anyone give me the answers to CMU CS Academy Unit 2.4? Any of the practice problems such as Puffer Fish or Alien Eye will do. I’ve already done drum set, animal tracks, and the spiderman mask one. Thanks!

Answers

Unfortunately, it is not possible to provide the answers to the practice problems for CMU CS Academy Unit 2.4 as these are meant to be solved by the students themselves.

What is CMU CS Academy?

CMU CS Academy is an online, interactive, and self-paced computer science curriculum developed by Carnegie Mellon University (CMU). It is designed to give students the opportunity to learn computer science fundamentals in a fun and engaging way. With its interactive and self-paced structure, students can learn at their own pace and engage with the materials in an engaging, dynamic way. The curriculum covers topics such as problem solving, programming, algorithms, data structures, computer architecture, and more. With its intuitive and interactive design, students can learn and apply the concepts learned in a step-by-step manner. CMU CS Academy also provides tools and resources to help students on their learning journey, such as online quizzes, tutorials, and project-based learning.

To learn more about Carnegie Mellon University

https://brainly.com/question/15577152

#SPJ9

What will happen if you delete system32?

Answers

Search Results
Featured snippet from the web
System32 contains critical system files , software programs and they are essential to boot operating system . So deleting it will cause system failure and nothing will work properly . And if you restart your pc then it wont boot at all. You will have to do a clean reinstall to fix things up again .

1. For the following program to be executed over the single accumulator
organization, Can you elaborate the instructions that will be given for the
same?
#include <iostream>
using namespace std;ESIO
int main() {
int x = 5;
int y = 6;
int z = 34;
int total = (x+(x + y)*z+y);
cout << total;
return 0;
}​

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

#include <iostream> // it is preprocessor director that manipulate the input output in the program

using namespace std;// it is used to format input and output

int main() { // main function is started

int x = 5; // variable x is declared and initialized with value 5.

int y = 6; //variable y is declared and initialized with value 6.

int z = 34;  //variable z is declared and initialized with value 34.

int total = (x+(x + y)*z+y); // variable total is declared and initialized with value of x,y,and z. and calculation performed on these value such as (5+(5+6)*34+6) that is equal to 385.

cout << total; // print the value of total variable that is 385

return 0;

}​

Flavia is focused on making fewer mistakes when she types. what is she trying to improve most​

Answers

Flavia is primarily trying to improve her typing accuracy. By focusing on making fewer mistakes when typing, she aims to minimize errors in her written work, enhance productivity, and improve the overall quality of her typing.

This could include reducing typographical errors, misspellings, punctuation mistakes, or other inaccuracies that may occur while typing. By honing her typing skills and striving for precision, Flavia can become more efficient and produce more polished written content.

Flavia is trying to improve her typing accuracy and reduce the number of mistakes she makes while typing. She wants to minimize errors such as typos, misspellings, and incorrect keystrokes. By focusing on making fewer mistakes, Flavia aims to enhance her overall typing speed and efficiency.

Learn more about typographical errors on:

https://brainly.com/question/14470831

#SPJ1

ASP PLZ Study the diagram of the geologic time scale.
Which method is most likely used to identify what happened before the start of the Paleozoic era?

1) Scientists study fossils from the Jurassic period.
2) Scientists observe index fossil records of the Mesozoic era.
3) Scientists examine fossil evidence during the Precambrian time.
4) Scientists explore the emergence of mammals and humans in the Cenozoic era.

ASP PLZ Study the diagram of the geologic time scale. Which method is most likely used to identify what

Answers

The answer is definitely number 2

Answer:

C. Scientists examine fossil evidence during the Precambrian time.

Explanation:

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

Answers

Question

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

A) passed by constant reference

B) passed by reference

C) passed by value

D) none of the above

Answer:

The correct answer is B)

Explanation:

The above question relates to computer programming.

Passing by reference is the same and can be used interchangeably with  passing by address.

A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.

When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.

This enables changes to be made to the function or argument directly from the parameter.

Cheers

The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you can afford monthly payments of $3000 per month, what is the most you can borrow?

Answers

Answer:

720k.

Explanation:

pls Which of the following statements is false? a. Having a first aid kit in an office is necessary b. Accidents happen, so it is not necessary to prepare for them c. Your company does need an emergency action plan d. OSHA inspects workplaces to look for unsafe conditions Please select the best answer from the choices provided A B C D

Answers

I thinks it’s B if not I’m sorry:)

The statement that is false is that Accidents happen, so it is not necessary to prepare for them.

What is accident?

The definition of an accident is that it is an unexpected event that occurs that is known to have not being planned.

Note that The statement that is false is that Accidents happen, so it is not necessary to prepare for them and it is false because it is not good to prepare for it as one will be in constant fear always.

Learn more about Accidents from

https://brainly.com/question/16798121

#SPJ2

The math club starts with 5 members. Five months later, their membership has grown to 50 members.
What was the average number of members who joined the math club per month?​

Answers

Explanation:

10 members per month i think

Answer:

10 members per month

Explanation:

brainliest pls its right i think

have a good day :D

Select the correct answer.
What happens when you try to save a file created using a plain text editor with the html extensic
O A.
O B.
O C.
O D.
You see an error because you're saving a text file as an HTML file.
Y
The file gets saved as an HTML file, but it can only be opened in a text editor.
The file gets saved as an HTML file, and it can be opened in a web browser.
The file gets saved as a text file, but it can be opened in a web browser.
Reset
Next

Answers

option D is the correct answer: The file gets saved as a text file, but it can be opened in a web browser, depending on its content.

How does this happen?

If you save a file created using a plain text editor with the ".html" extension, the file will be saved as an HTML file. However, whether it can be opened in a web browser or not depends on the content of the file and how it is written.

If the file contains valid HTML code, then it can be opened in a web browser and will display as a webpage.

However, if the file does not contain valid HTML code, the web browser may not be able to interpret it correctly and may display an error message.

Read more about html here:

https://brainly.com/question/4056554

#SPJ1

Mission statement base on shoes company ? Help me

Answers

Here are 2 examples:

- Bringing comfortable walking, running, biking, and adventuring to the world.

- Transforming the way you live your life, two soles at a time.

A mission statement should be focused on what a company is about at its core roots. What's the driver for why the company does what it does? Often it is related to why a company is relevant in its industry.

Our mission statement is to offer our customers with an athletic footwear product that has desirable performance attributes such as impeccable quality, enhanced features, comfort and its diverse assortment of vibrant colors, trending styles, and exclusive designs.

I have a global variable that I want to change and save in a function (in python). I have an if statement contained in a while loop where the code will pass the if and go to the elif part first, and runs the code with certain numbers, and changes some of them. Because of the changed numbers when the while loop runs again it should enter the if part, but it doesn't It uses the old values as if the function has not been run. FYI I am returning the values at the end of the function, it still doesn't work

Answers

From the above scenario, It appears that you could be facing a problem with the scope of your global variable. So It is essential to declare a global variable within a function before modifying it, to avoid creating a new local variable.

Why does the code  not work?

For instance, by using the global keyword within a function, such as my_function(), Python will know that the aim is to change the my_global_variable variable defined outside the function's boundary.

Therefore, When the my_function() is invoked in the while loop, it alters the global variable that is subsequently assessed in the if statement.

Learn more about  code  from

https://brainly.com/question/26134656

#SPJ1

I have a global variable that I want to change and save in a function (in python). I have an if statement
Other Questions
What are the measures of the angles in the triangle? A 60; 60; 60 B 78; 51; 51 (6x + 10) C 34; 112; 112 D 112; 34; 34 (x + 179) (4x - 349) OA which of the following statements about cash versus accrual accounting is most correct?group of answer choicesin cash accounting, an event is recognized when a cash transaction accrual accounting, an event is recognized when a cash transaction large healthcare organizations use cash small healthcare organizations use accrual accounting because it closely matches statements required for income tax cash accounting, an event is recognized when the obligation for a cash transaction is created. three of the following are accurate statements about typical group differences in students classroom behavior. which statement is not accurate? In his conclusion, what point does Parker make about the worldview Beowulfexpresses? Explain. (Beowulf is back!) temperamentif you are describing characteristics of your child such as irritability or adaptability, psychologist would say you are not describing their personality but rather their Write a brief narrative essay (of around 500 words) where you discuss the topic you have decided to research and write about. (Batteries impacting society) Tell your audience, your fellow classmates and your instructor all of the following: the working thesis you have settled on for your project how you arrived at the topic some of the other ideas you considered in your brainstorming activities at least two reasons for choosing this topic (universal value + personal interest) what initial library research you have conducted so far/what working knowledge you've gathered to date what you hope to learn from researching this topic over the course of the semester 10 points!! Please give me work with it and I will mark as brainlist. Answer the question below. Use the rubric in the materials for help if needed.A compound is 40.0 % C, 53.3 % 0, and 6.66 % H What is its molecular formula if its molecular mass is 60 g? Show all your work. the locations of a house, market, and library from a right triangle as shown in the diagramPlease help quick!! The Atony Ltd. company raised $1.5m through a 10-year bond issue on the 31st of December 2020. The bond pays 3.4% per annum in coupons, with coupons paid quarterly. Calculate the price of the bond on the 12th of August 2025, given a market yield of 4.5% per annum. In your answer, identify whether the bond is trading at a discount or a premium, and explain the logic as to why this is the case. Note: You can write down the calculations by hand and attach a photo of your answer in the answer sheet. a client with acute renal failure/acute kidney injury has a serum potassium level of 7.0 meq/l. what is the nurse's priority action to obtain for this client? Insurance company records indicate that 12% of all teenage drivers have been ticketed for speeding and 9% for going through a red light. If 4% have been ticketed for both, what is the probability that a teenage driver has been issued a ticket for running a red light if it is know that they were speeding? Pls helpThe struggle between Buck and Spitz in Chapters 2 and 3 of The Call of the Wild is an example of a complete -theme -narrative arc -character development -motif How much solar radiation is reflected back by clouds?OA. 5 percentB.10 percentO c.19 percentOD.30 percentRE Suppose a psychrometer reads 80F for the dry bulb and 76F for the wet bulb. What is the relative humidity? you can use chromatography, distillation, and filtration to separate mixtures. is it possible to use any of these methods to separate the atoms in a compound? explain why or why not. Determine the yield to maturity of a 6.5% coupon, 30-year maturity, $100 face value bond selling for $108. Assume semiannual compounding. The least common denominator of the fractions 1/3, 1/6 and 1/2 is 6. How are 12 and 24 related to this least common denominator? You're running a video campaign with an awareness goal. you want to understand the extent to which your campaign shifts user perception or behavior.- Youd use Viewability with Active View.- Youd use Brand Lift.- Youd use Reach Planner.- Youd use Unique Reach and Frequency. Hello, if you know the answer, please explain how you got the answer to this a) A thin-walled, hollow sphere of mass M rolls without slipping down a ramp that is inclined at an angle to the horizontal. Find the magnitude of the acceleration of the sphere along the ramp. Express your answer in terms of and acceleration due to gravity g.b) Find the magnitude of the friction force that the ramp exerts on the sphere. Express your answer in terms of the variables M, , and acceleration due to gravity g.c) Find the magnitude of the torque that this force exerts on the sphere. Express your answer in terms of the variables M, , R, and acceleration due to gravity g.