first answer get brainiest

First Answer Get Brainiest

Answers

Answer 1

Answer:

This is my best solution

First Answer Get Brainiest

Related Questions

Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?

O References
O Referential Integrity
O Autocorrect
O Data Source Binding

Answers

Answer:

B

Explanation:

edge :p

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

Which of the following best describes the purpose of an IP address?

Answers

To locate somebody. Mabey to send mail to.

Answer: C

Explanation:

Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.

Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.

SOMEONE PLEASE HELP ME PLEASE HELP ME WITH THIS!!!!!

Answers

Answer:

The last one

Explanation:

I hope this is correct and have a great day

Answer: C

Explanation: First step in the engineering design would be to identify a problem and try to come up with a solution for it.

What is Identity Theft?
A criminal accessing your personal info to pretend to be you.
Someone stealing your drivers license.
Leaking personal information online.
Stealing your username for log on.

Answers

A is correct! We did this in Law!

Have a merry Christmas!

What is the use of consonant in QBASIC ? Answer me in short and easy answer.​

Answers

Answer:

See Explanation

Explanation:

I'll assume the question is about the use of constants in QBasic because consonants do not have any special function or usage in QBasic.

In simple terms: In QBasic, constants are used to represent elements that do not change in value during program execution.

Take for instance, you intend to use [tex]\pi[/tex] in your program.

Its value is [tex]\pi = 3.142[/tex]

So, 3.142 will always be a constant in your program. One of the ways it can be used in a program is:

10 LET PI = 3.142

The above represents a numeric constant. QBasic also have string constants.

Select the correct answer.

Which aspect of visualizing rationalized space requires that objects must have relative space between two surfaces?

A.
color
B.
light
C.
elevation
D.
shadows

Answers

it’s B i think, not exactly sure though

Some students are studying the amount of pollution in a river They are using a computer to measure the pollution level using sensors to record and print the result.
Name two sensors they should use to measure the amount of pollution.

Answers

Answer:

optical sensors

Explanation:

optical sensors measure the amount of gases like carbon dioxide and carbon monoxide in the air

ull be my american girl american girlr

Answers

Answer:

Wuuut

Explanation:

you crazy

Write an algorithm and draw flowchart to print 30 terms in the following sequence
1,-2,3,-4,5,-6,7,-8,...........................upto 30 terms.

Answers

Answer:

9,-10,11,-12,13,-14,15,-16,17,-18,19,-20,21,-22,23,-24,25,-26,

27,-28,29,-30

Explanation:

It comes as positive and then as a negative number and continues in the same format.

Hope it helps....

Answer:

Explanation:

9,-10,11,-12,13,-14,15,-16,17,-18,19,-20,21,-22,23,-24,25,-26,

27,-28,29,-30

How can your web page design communicate your personal style

Answers

Answer:

Web design is very unique, you can express your feelings through creating a page.

Please help in Java!! Due tonight!!! Greatly appreciated!!

Answers

Answer:

d. Mystery2

Explanation:

static methods can be called without an object instance.

The getDouble() method uses ints, so pass in an int.

What does the National Institute of Standards and Technology do? Promotes innovation by advancing measurement standards promotes cooperation in metrology among several regions provides certifications to individuals working in the field of metrology provides mentors to individuals working in the field of metrology

Answers

Answer:

Promotes innovation by advancing measurement standards

Explanation:

The National Institute of Standards and Technology was Founded in the year 1901, this agency is a non-regulatory body that is found within the United States Department of Commerce.

The mission of this agency is the promotion of innovation and also industrial competitiveness through the advancing of measurement science, standards, and also technology in several ways that raises economic security and also brings about improvement in the quality of life.

Answer:

(D) promotes innovation by advancing measurement standards

Explanation:

which member of the Jackson family was the spokesperson for the Psychic Friends Network.​

Answers

Answer:

La Toya Jackson

Explanation:

10
Select all the correct answers.
Which statements are true regarding system and application software?
System software consists of only the OS and application software.
A program is a set of instructions that helps the user understand the functioning of the computer.
Ооооо
An OS acts as an interface between the hardware and the user.
Application software allows users to perform various tasks.
Disk cleaner, resource monitor, etc. are all examples of application software.
Reset
Next
Next

Answers

Answer:

Keyboard

Explanation:

l think it is the key board

What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual art

Answers

Answer:

A.) artes aplicadas

Explanation:

Write a program to input a number and check whether it is divisible by 5 or not​

Answers

Answer:#include<stdio.h>

void main()

{

        int a;

        clrscr();

        printf ("Enter the no.");

        scanf("%d",&a);

        if(a%5==0)

         {

            printf("No.is Divisible by 5");

         }

        else

        {

              printf("No is not Divisible by 5");

        }

              getch();

}

How do you send friend requests?

Answers

Answer:

i dont know how too i dont think you can

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

Geneiva is looking for a document. She hasn't used this document in years, and yet it is still in Recent Documents. Which of the following best explains the this?
A) She is experiencing a computer glitch that allows Recent Documents to retain all used documents.
B) She has used fewer than nineteen other documents since the last document was last used.
C) The document is pinned, and she is experiencing a computer glitch that allows Recent Documents to retain all used documents.
D) The document is pinned, or she has not used nineteen documents since the document last was last used.

Answers

Answer:

The document is pinned, and she is experiencing a computer glitch that allows Recent Documents to retain all used documents.

Explanation:

imm jus different

Explanation:

Answer is D i just did the review

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data

Answers

in ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.

After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1​

Answers

Answer:

10

Explanation:

you start with 5       5

you add 3                8

the variable is not odd so skip         8

the variable is even so add 1            9

the variable is odd so add 1              10

10

hope this helps <3

Which one of these is not an area of AI? Computer vision/image, recognition Voice recognition, Robotics, Web design

Answers

Answer:

Computer vision/image

computer vision/images

SOMEONE PLEASE HELP ME FAST PLEASE!!!

Answers

Answer:

I think it the first one

Explanation:

Liam is at the park an would like to play soccer. He tell another kid at the park that he would hurt him if he couldn't play soccer. The kid at the park should...
1. control his emotions and ask liam to stop because this is intimidation.
2. get angry and ask Liam to stop because this is intimidation.
3. tell someone what happened because this is exclusion.
4. tell Liam he is going to hurt him and walk away because this is exclusion.​

Answers

Answer:

1

Explanation:

We know that he shouldn't get angry because that will only escalate things. It is not 3 or 4 because he isn't excluding him, but rather forcing him to join. Ergo it is option 1

SOMEONE PLEASE HELP ME OUT WITH!!!!!

Answers

i’m pretty sure it’s the second one. that’s what i’d choose
I’d chose the second one

PLEASE HURRY

Jorge is using Python 3 as a calculator. Jorge wants to find the product of 321 and 408. What should Jorge type? print 321 x 408 print (321 times 408) print 321(408) print (321 * 408)​

Answers

Answer:

1. 321 x 408 print (321 times 408)

Explanation:

It is multiplication, it will create a product. So that is why.

Answer:

print (321 * 408)​

Order the steps for using the Rules Wizard to create an email rule.
Select the Home tab, and
click Rules button.
Click New Rule, and select Make any exceptions, and
a template.
name the rule.
Edit a description of the
rule by adding values.
Select Manage Rules and
Alerts

Answers

To use the Rules Wizard to create an email rule, you can follow these steps:

Select the Home tab and click the Rules button.Click New Rule and select a template.Edit a description of the rule by adding values and making any exceptions.Name the rule.Select Manage Rules and Alerts to save the rule.

What is the email rule about?

Below is the process in a more detailed form:

Open your email client and go to the Home tab.Click the Rules button, which is usually located in the Move section of the ribbon.In the Rules dialog box, click the New Rule button.In the Rules Wizard, choose a template that best fits your needs. You can also choose to create a custom rule by selecting "Start from a blank rule."Follow the prompts in the wizard to specify the conditions and actions for the rule. You can specify values and exceptions, such as the sender or recipient of the email, or the subject of the email.Give the rule a name and click Finish to save the rule.

Therefore, To manage your rules, click the Manage Rules & Alerts button in the Rules dialog box. From here, you can edit or delete existing rules, or create new ones.

Learn more about email rule from

https://brainly.com/question/4783467
#SPJ1

differentiate between refraction of light and reflection of light

Answers

Refraction represents a change in the direction of propagation when beams of light encounter a medium with a different density.

Reflection is the return of light to the medium it came from when it encounters a mirror.

Reflection is the bouncing back of light when it strikes the smooth surface. Refraction is the bending of light when it travels from one medium to another .

What is a negative impact of digital communication?
A.
Access to information
B.
Ability to communicate across continents
C.
Information can be difficult to verify
D.
New marketplaces for more competition

Answers

Answer:

A

Explanation:

Information such as your card number and all can get to another person which will end on a negative impact to the public community online.

Other Questions
Match the component to its function. resistor inductor capacitor battery transistor This component stores a temporary charge. arrowRight This component stores electric energy in the form of a magnetic field. arrowRight This component prevents components from overheating. arrowRight This component produces electricity by converting chemical energy into electric energy. arrowRight The voltage applied to the base can control the current that flows across the emitter and collector. arrowRight for which of the following was executive privilege exercised? A. Neutrality ProclamationB. Franco-American AllianceC. Jay TreatyD. Spanish-American Alliance 116 is 35% of what number? Given vectors u = 3, 4, and y=(4,3), what is the measure of the angle between the vectors?016.39163.7Undefined whats a routine that helps with acne? Which theorem, term, or corollary is represented by the picture? The bold lines in the pictures represent the hypothesis of the theorem or corollary. A. Corollary to the isosceles triangle theorem B. Corollary to the converse of the isosceles triangle theorem C. CPCTCD. Isosceles triangle theorem E. Converse to the isosceles triangle theorem PLS HELP ME I WILL GIVE BRAINLIEST Important details about Perez Mouse?? Question 6. Solve -15 = x - 3 Evaluate k(4) for the function k(x)=182x can someone write me a mysterious event essay with 150 words pleaseeee In the early 1900s, Henry Ford introduced a a. high-wage policy, and this policy produced none of the effects predicted by efficiency-wage theory. b. low-wage policy, and this policy produced many of the effects predicted by efficiency-wage theory. c. high-wage policy, and this policy produced many of the effects predicted by efficiency-wage theory. d. low-wage policy, and this policy produced none of the effects predicted by efficiency-wage theory. Under Alexander Hamilton's financial plan, critics charged that this group would make a fortune.a.war veteransc.speculatorsb.the Britishd.the states The following map shows which site of ancient civilization? find each measurement indicated, round your answers to the nearest tenth Is the following compound an alcohol, aldehyde, or organic acid?C-C=0 Global Exporters wants to raise $29.6 million to expand its business. To accomplish this, it plans to sell 20-year, $1,000 face value, zero coupon bonds. The bonds will be priced to yield 7.75 percent. What is the minimum number of bonds it must sell to raise the money it needs Please help me ASAP!! How do i solve 2x+4=8 A 24.63 gram sample of cobalt is heated in the presence of excess oxygen. A metal oxide is formed with a mass of 31.32 g. Determine the empirical formula of the metal oxide.