Answer:
bc butt face
Explanation:
youur face
In what real-life situations might you want to use the modulus operation in a program?
Answer:
Since any even number divided by 2 has a remainder of 0, we can use modulo to determine the even-ess of a number. This can be used to make every other row in a table a certain color, for example.
2 + 2 equals 5. why is this true?
Answer:
The phrase “two plus two equals five” was made famous by George Orwell’s dystopian classic Nineteen Eighty-Four (1949). In that story, the totalitarian government that ruled Oceania brainwashed its citizens to say and believe absurd things.
Guidewords for the word “serpent” may be
Answer:
snake
Explanation:
Answer:
snake or a family that belongs to snake
what would you enter at the command prompt on Linux system to display the IP addresses and the subnet
Answer:
The ifconfig command.
Type of software which is used to create slide show is
Type of software which is used to create slide show is
presentation software
Hope it helps you.
Rachel made a mistake when typing. She typed the wrong label in cell A2. To fix this, she should _____. press Tab until cell A2 is highlighted and press Enter click on cell A2 and press Tab double-click on cell A2 and retype the label click on cell A2, press Backspace, and type the new label
Answer:
double-click on cell A2 and retype the label click on cell A2Explanation:
How to start Microsoft acess
Answer:
As with most Windows programs, Access can be executed by navigating the Start menu in the lower left-hand corner of the Windows Desktop. To start Access, click on the Start button, then the Programs menu, then move to the Microsoft Office menu and finally click on the Microsoft Access menu item.
Upload your completed project including the following:
An outline with the following items:
information about plants and animals that have become extinct or endangered because of a loss of habitat
information about habitats that have changed radically over the last few decades
ways students can lead a "greener" lifestyle
Recycle. There are many things you use each day that can be recycled. Some of these include paper, plastics, glass, and aluminum cans.
Conserve water. Take shorter showers. Turn off the water when brushing your teeth. This will reduce the amount of water that you use.
Don't pollute. Hold on to that helium balloon. Balloons that are released into the air can kill wildlife. Animals swallow the balloons, causing them to suffocate or starve.
Use energy wisely. Replace your incandescent light bulbs with fluorescent bulbs. They are more efficient than regular light bulbs. Turn off the lights, computers, and music when you're not using them.
Reduce consumption. Use both sides of the paper when taking notes in class. If your printer has a feature that lets you print on both sides of a sheet of paper, use it.
Presentation slides with text, graphics, and special effects such as animation and transitions
Support materials
Presentation delivery
Answer:Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.
Explanation: YWW FRIEND!!
Answer:Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.
Explanation:
She copied that from another person Ima refund this
Which of these situations in which an employee uses e-mail will most likely create a problem or misunderstanding?
sending your boss files with information he or she requested
including a quote from a vendor in a reply e-mail to the vendor
telling your boss you have a serious problem with a coworker
informing other employees of a specific meeting time and place
Hey there :)
As per question:-
☆ informing other employees of a specific meeting time and place, without the owner's permission is likely to cause a problem or misunderstanding.
This is because the owner or biss wont be able to know the timing and informations which were given only to other workers. This would eventually make the boss feel that the hist worker isnt giving any respect or priority to the boss.
So, it will cause a chaos, maybe leading to his dismissal.
~ Benjemin360
The output of a computer can be seen on ( monitor, keyboard or mouse )
Answer:
monitor
Explanation:
keyboard and mouse are inputs
Answer:
I'm pretty sure it's monitor
Explanation:
disadvantages of using social network site GOAL SETTTING?
Answer:
addiction, mental illness, misleading information, scams, cyberbullying
Explanation:
What online game do you play on the internet and can I play with you on it? I play downtown mafia 1960
Answer:
None
Explanation:
I find them scary and they give me nightmares
What is the difference between formatting and conditional formatting?
Answer:
Conditional formatting only applies formatting to your cells, based on the values (text, numbers, dates, etc.) in those cells. Format~ arrange or put into a format.
Explanation:
which computers accuracy is much higher(i.e.analog & digital )
Answer:
digital
Explanation:
digital because it is a lot you are and you can find out more from it
Smart cranes are beneficial because they ________________.
Answer:
because they... "increase productivity and make your working day safer."
They also boost work time, making it faster and easier.
Explanation:
Ask.
How to connect two monitors for one desktop
Answer:
two HDMI cords, this will help you your monitors
If I connect my Phone to my laptop screen and the screen on my phone is mirroring to my laptop if I try clicking on something with my laptop will the change happen on my phone
Pls answer will mark Brainlyest
Which tool in Access will give you a detailed report showing the most accurate and complete picture of
employee attendance grouped by days of the week over the past year?
c
71
Filter
Query
.
Type here to search
O
RI
c
::
B
E
24°F
9:05 PM
2/4/2022
The Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day
What is the Query tool?The Query tool helps to give answer to a simple question, perform calculations, combine data from a database
In conclusion, the Query tool is the tool in MS access that will give user detailed report showing the most accurate and complete picture of employee attendance grouped by day
Read more about Query tool
brainly.com/question/5305223
What Windows utility can enable you to shut down an unresponsive application?
windows manager
task manager
task explorer
windows explorer
Answer:
Task manager
Explanation:
Allows you to force quit applications.
When a computer is infected by a virus, _______.
Answer:
Explanation:
A virus can damage programs, delete files and reformat or erase your hard drive, which results in reduced performance or even crashing your system entirely. Hackers can also use viruses to access your personal information to steal or destroy your data.
Which is NOT a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service
The option that is not a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service is;
A: Container Instance
Cloud Computing
Cloud computing is simply a system that makes use of the Internet to store, manage and access data from a remote server on the internet.
Now, this cloud system infrastructure makes use of middleware software to ensure that there is proper connectivity between devices and computers connected via the cloud.
Finally there are different types of cloud computing shape but among the given options the only one that is not a type is Option A.
The missing options are;
A) Container Instance.
B) Bare Metal.
C) Dedicated Virtual Machine Host.
D) Virtual Machine.
Read more about cloud computing at; https://brainly.com/question/19057393
You are designing a simple calculator program for young children to use. Right now, if they do something that the program didn’t expect, a message appears that reads, “User input deemed invalid.” What changes could you make so that the message would be more suitable for this audience?
In Python, you can use a try-except statement and raise an exception with a custom message.
For example:
try:
x = int(input())
except:
raise Exception("User input deemed invalid")
In JavaScript, you can try using a try-catch statement. You can use the 'throw' keyword to handle the error.
While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe?
a. Weak passwords
b. Backdoor
c. Privilege escalation
d. Buffer overflow
Which of the following factors is least likely to result in delivery delays?
There are different factors that leads to delay in deliver. The most common factors that leads to delayed delivery are known as Misspelt, incomplete or outdated address.
What causes delay in delivery?There are Mistakes that leads to delay in delivery process. Example is a misspelled address, incorrectly details in forms that has been filled, and also incomplete information.
The above are known to be key factors or reasons for inaccurate or late deliveries.
Learn more about delay in delivery from
https://brainly.com/question/12938965
Write a python program to find the volume of the pepsi present in the can which is in the shape of cylinder accepting the radius and height of the can from user.(Note :Apply float input and display Radius ,Height, Volume of Pepsi in can)
(V = pi r^2 h )
Answer:
r=float(input("Enter radius: "))
h=float(input("Enter height: "))
v=3.14*r**2*h
print(r)
print(h)
print(v)
This is the answer, hope it helped!
what is the programming language JavaScript commonly used to create? A. Internet databases B. Smartphone applications C. Operating systems D. Web-based animations
Answer:
D: Web Based Animations
Explanation:
five real world objects with similar characteristics
Our current scientific knowledge in areas such as human visual perception, attention, and memory, is founded almost exclusively on experiments that rely upon 2D image presentations. However, the human visuomotor system has largely evolved to perceive and interact with real objects and environments, not images (Gibson, 1979; Norman, 2002).
What is output by the following line of code?
print(mystery("hello"))
Group of answer choices
Answer:int x = 5;
if(x < 5)
cout << "line 1 ";
cout << "line 2";
A. line 1 line 2 B. line 1 C. line 2
D. line 1 E. line 1line 2
line 2
2. What would be output by the following code? _______
int x = 0;
while(x < 5)
{
cout << x << " ";
x++;
}
A. 0 1 2 3 4 5 B. 1 2 3 4 5 C. 0 1 2 3 4
D. 0 E. 0 0 0 0 0
3. After execution of the following code, what will be the value of input_value if the value 3 is entered at the keyboard at run time? ________
cin >> input_value;
if (input_value > 5)
input_value = input_value + 5;
else if (input_value > 2)
input_value = input_value + 10;
else
input_value = input_value + 15;
a. A. 8
b. B. 13
c. C. 18
d. D. 0
e. E. 5
4. What would the user see displayed on the screen after the following lines of code are executed?¬¬________
int i = 6;
if (i == 10)
cout << “value: “ << i;
else
cout << "hmmm";
A. value: i B. value: 10
C. hmmm D. value: ihmmm
E. value: 10
Hmmm
5. What is the output of the following lines of code? ______
for(int i=0; i<4; i++)
cout << (i * 3) << " ";
A. 0 1 2 3 4 B. 0 3 6 9
C. 0 3 6 9 12 D. 0 1 2 3 E. 0 0 0 0
Explanation:
Another name of computer program is
Answer:
Operating Systems or Applications
Explanation:
There is so many names that computer programs can be named. The most common name is "Applications" or "Apps"
What does the effect of having more computers running mining software have on the security of the Bitcoin network?
Answer:
GPU mining itself isn't a danger to your PC—it's the mileage. Since most GPUs rely on attached or auxiliary fans, these parts can degrade faster during periods of sustained use. ... When managed properly, prolonged computational activity like cryptomining and gaming shouldn't degrade your GPU's physical integrity.