SOMEONE PLEASE HELP ME PLEASE HELP ME OUT WITH THIS!!!!!!!

SOMEONE PLEASE HELP ME PLEASE HELP ME OUT WITH THIS!!!!!!!

Answers

Answer 1

Answer: Brainstorm

Explanation:


Related Questions

The internet and intranet have many different uses.
Explain what is meant by the intranet.

Answers

Answer:

Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.

Answer:

internet-The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Intranet- A system of computers inside an organization that makes it possible for people who work there to look at the same information and to send information to each other.

what is low level language​

Answers

Answer:

The language which is spoken by low aged people is called as low level language

Answer:

A low level language is a language with few layers between itself and actual machine code.

Assembly is an example of a very low level language, where you're giving direct instructions to the processor.  C is often called a fairly low level language as it gets compiled very directly into machine code.

By contrast, high level languages have many more layers between themselves and the processor.  Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system.  Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.

Select the correct text in the passage.
Which phrases or sentences in the passage denote operations that the hospital carries out with the help of computers?
David’s family took him to a hospital as he was suffering from a serious ailment. As soon as he was admitted, the hospital authorities recorded David’s medical history. Later, the doctors had a talk with David’s parents about their son’s condition. David was then placed in an intensive care unit (ICU) where his vital signs were constantly monitored. He was also given a lot of medication throughout the entire day.

Answers

Answer: When was admitted, hospital authorities recorded his medical history. Then, placed in an ICU where his vital signs were constantly monitored.

Explanation: With the help of computers, medical histories are often kept in the computer for future reference. Machines are connected to computers to record vital signs.

Answer:

Explanation:

          nnnnnnnnnnnnnnnnnnnnnnn

Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this

Answers

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

An alias is helpful because having two copies of the same table can be confusing.

Answers

Answer:

Correct aliasing is very useful when you provide or insert a new value Say you have the c= (2,3,4,5) You do c= lst.pop(2)Now the new c doesn't have 4 such that (2,3,5)

plz help Complete the sentence.
Evaluating the user's experience happens as part of the__________ phase of software development.

Answers

Answer:

Release

Explanation:

Evaluating the user's experience happens as part of the Release phase of software development.

What is a software developer do?

The foundation systems that run the machines or control subnetworks by software developers, as are the computer apps that let users perform particular activities.

To find issues and understand how the software functions, software quality assurance analysts and testers create and carry out software tests.

Thus, it is Release.

For more details about software development, click here:

https://brainly.com/question/1410106

#SPJ5

Write a function that prompts the user to enter the speed of a vehicle. If speed is less than 20, display too slow; if speed is greater than 80, display too fast; otherwise, display just right

Answers

The code of the given problem is given below :

#include<iostream>

using namespace std;

void print( float speed ){

      if(speed < 20 )

      {

             cout<<"too slow\n";

      }

      else if(speed > 80 )

      {

             cout<<"too fast\n";

      }

      else{

             cout<<"right\n";

      }

}

int main()

{

      print( 18.6 );

      print( 45 );

      print( 100 );

      return 0;

}

If there is a need to write code in order to help the player move through the game which team member would create this code?

Answers

Answer:

Run code, and then check the code

Explanation:

Write a simple algorithm in pseudocode that asks the user their favourite colour and then agrees with their choice, quoting the colour in the response.

Answers

Answer:

i am still a beginner in this but i hope it helps.

add scanner object;declare string FavColour;print msg to ask user for inputscan input FavColour;print msg (" your favourite colour is " + FavColour)


differences between analog computer and hybrid computer​

Answers

Answer:

Analog computers only work with continuous numerical data in analog quantities, digital computers can process both non-numerical and numerical data and a hybrid computer is a combination of both analog and digital. A hybrid computer has the accuracy of a digital computer paired with speed of an analog one.

Answer:

sorry for bad picture

hope it helps you have a good day keep smiling be happy stay safe ☺️

Primary functions of lighting are sufficient light to...

make things sound good
power the cameras
feed the crew
create 3 dimensional on 2 dimensional tv screens

Answers

Answer:

I would say, a guide to use for studying.

What statement best describes entrepreneurship?

Answers

Answer: D

Explanation:

Answer

Option: It requires creativity and ambition.

Hope this helps, have a wonderful day/night, stay safe, happy holidays, and merry Christmas!

Which of these expressions is used to check whether num is equal to value?
num ? value
num = value
num – value
num == value

Answers

Answer:

num-value

Explanation:

is should equal to zero if it is correct.

Answer:

It is num - value

Explanation:

I got it right on the test

Ok can someone tell me why I can’t do this? I’m trying to put a video as my background but it won’t show up when I go to add video there is no video

Answers

Answer: money

Explanation:

As you calculate the design cost for a site, you conclude it will be $50 per hour. However, your final estimate to the client will be for $55 per hour to include which cost (without including the cost as a line item)?

Answers

Incomplete question. I answered from a general budget perspective.

Answer:

miscellaneous cost

Explanation:

Remember, we are told this is just an estimated cost of designing the site. Basically in designing a site, these costs are taken into account:

site hosting costsite design cost (such as UX, UI, etc)site development costsite maintenance cost (such as domain maintenance cost)

However, it seems the web developer may have discovered other miscellaneous costs attached to the site design.

CAN SOMEONE PLEASE HELP ME WITH THIS PLEASE ?!!!!!!!!

Answers

Get feedback about your product from the restaurant

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician

Answers

Answer:

Network diagrams.

Explanation:

In this scenario, Jason is the network manager and is leading a project to deploy a storage area network (SAN). He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN input and output (I/O) optimization, Jason need to provide the network diagram to the vendor support technician.

A network diagram can be defined as a graphical representation of the topology of a network connection.

Basically, it gives an illustration of all the equipments such as routers, switches, hubs etc.

There are different ways too navigate in a network. To begin SAN I/O optimization, Jason need to provide Network diagrams.

A network diagram is known to be a visual depiction of network architecture.

It is often used to maps out the structure of a network with a lot of different symbols and line connections. This information is known to be important when knowing the right Storage Area Network (SAN) to use and so will be the right choice for Jason.

See full question below

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician?

Options are :

Asset management document

Baseline documents

Network diagrams

Access to the data center

Learn more about network diagram from  

ainly.com/question/8147877

CHOOSE THE CORRECT CONTINUOUS TENSES( PRESENT CONTINUOUS,PAST CONTINUOUS AND FUTURE CONTINUOUS) : 1. I saw a snake while I ____________________ in the forest. am walking was walking will be walking will walk

Answers

Answer:

Explanation:

joe biden>

PLS HELP HEEEELLLLLLLLPPP WILL GIVE BRAINLIEST
What is the importance of using the proper markup language?
A. HTML allows the search engine to "talk" to the web browser
B. HTML tells the web browser where the page should be filed
C. Without the right tags the content won't be accurately indexed
D. Without HTML, the keywords cannot be read by the search engine.

Answers

Answer:

First of all, we need to define the term markup language. A markup language is a human-readable language that is used by a computer to annotate an electronic document so that the computer can better understand the style and structure of the document.

In computer text processing, a markup language is a system for annotating a document in a way that is syntactically distinguishable from the text, meaning when the document is processed for display, the markup language is not shown, and is only used to format the text

Explanation:

Which is used to configure Hyper-V on a Windows 10 device?
A. Start
B. Settings
C. Control panel
D. Hyper-V Manager​

Answers

Answer:

A.start

This is how you do it,in case you don't know how to.

Right click on the Windows button and select 'Apps and Features'. Select Programs and Features on the right under related settings. Select Turn Windows Features on or off. Select Hyper-V and click OK.

You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure

Answers

Answer:

Port authentication

Explanation:

A port authentication enables the configuration of a parameters of the ports to connect to the network. When the ports are in the Force Authorized state, only some configuration changes are possible.

In the context, I want to configure the port authentication so as to make sure that the people who visited the building and wants to plug in the switch should connect to the network and not the free networks. An d also the employees who plug in the same jack should also connect to the same network.

2. Convert Octal number (6213), to Binary number?​

Answers

Answer:

This online calculator is able to convert numbers from one number system to any other, showing a detailed course of solutions. And calculator designed for:

Decimal to binary conversion,

Binary to decimal conversion,

Decimal to hexadecimal conversion,

Decimal to binary conversion method,

Floating point decimal to binary conversion method,

Decimal to binary converter with steps,

Decimal fraction to binary converter.

Explanation:

Hope this helps!

You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not reset the archive bit after a backup. Which method have you chosen?

Answers

Answer:

C. A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation.

Explanation:

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation

Answers

Answer:

The answer is "802.11n"

Explanation:

In this question, the Wireless LAN (WLAN) connections are indicated at 802.11n.802.11n, a companion piece to the guidelines relatives 802.11, would then enhance velocity, dependability, and variety of wireless local area network (Wi-Fi network) transmitters. 802.11n

Which is a correctly formatted Python tuple? [12, "circle", "square"] {"n":12, "shape1": "circle", "shape2": "square"} (12, "circle", "square") 12 circle square

Answers

Answer:

(12, "circle”, “square")  

Explanation:

Python is a computer programming language that is used to write programs. In the python programming language, the Tuple is a data type that can be defined inside a parentheses "()". It is of immutable kind which means the elements inside the parentheses cannot be changed once the elements are inserted inside the tuple. It is also defined by "()" or by predefined function, tuple().

In the context, the correct format of python tuple is : (12, "circle”, “square").

Answer:

(12, "circle”, “square")

Explanation:

       

Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a website interface D. testing the response time of a large file upload

Answers

Answer: D

Explanation:

Fill in the blank with the correct response.
_______surveys are measurement tools that use a series of questions to obtain data from respondents.

Answers

Answer:

"Questionnaire" would be the perfect approach.

Explanation:

A questionnaire would be a study tool consisting of a series of issues and perhaps other forms of commands which have been intended to gather data from the respondents.  This is indeed a valuable instrument used to collect responses from participants throughout a broad range of ways, consumer insight, and purchasing habits across marketing strategy.

Which best describes the Quick Access toolbar and the ribbon tabs?

Answers

Answer: D

Explanation: The Quick Access Toolbar is customizable, and the Ribbon tabs are collapsible.

Answer:

d

Explanation:

hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses

Answers

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

What are presenter notes?

Answers

Presenter notes are for showing to other people

Answer:

notes on like a presenting app that will help you present better so like your notes

Explanation:

Other Questions
Question 6. Solve -15 = x - 3 Evaluate k(4) for the function k(x)=182x can someone write me a mysterious event essay with 150 words pleaseeee In the early 1900s, Henry Ford introduced a a. high-wage policy, and this policy produced none of the effects predicted by efficiency-wage theory. b. low-wage policy, and this policy produced many of the effects predicted by efficiency-wage theory. c. high-wage policy, and this policy produced many of the effects predicted by efficiency-wage theory. d. low-wage policy, and this policy produced none of the effects predicted by efficiency-wage theory. Under Alexander Hamilton's financial plan, critics charged that this group would make a fortune.a.war veteransc.speculatorsb.the Britishd.the states The following map shows which site of ancient civilization? find each measurement indicated, round your answers to the nearest tenth Is the following compound an alcohol, aldehyde, or organic acid?C-C=0 Global Exporters wants to raise $29.6 million to expand its business. To accomplish this, it plans to sell 20-year, $1,000 face value, zero coupon bonds. The bonds will be priced to yield 7.75 percent. What is the minimum number of bonds it must sell to raise the money it needs Please help me ASAP!! How do i solve 2x+4=8 A 24.63 gram sample of cobalt is heated in the presence of excess oxygen. A metal oxide is formed with a mass of 31.32 g. Determine the empirical formula of the metal oxide. write a 3-5 sentence in which do you think came first. Farming , or Religion? Is this correct 16-2t=5t+9 The accountant for Crusoe Company is preparing the company's statement of cash flows for the fiscal year just ended. The following information is available: Retained earnings balance at the beginning of the year $ 132,000 Cash dividends declared for the year 52,000 Proceeds from the sale of equipment 87,000 Gain on the sale of equipment 8,200 Cash dividends payable at the beginning of the year 24,000 Cash dividends payable at the end of the year 27,200 Net income for the year 98,000 What is the ending balance for retained earnings The pressure on a 200-milliliter sample of CO2(g) at constant temperature is increased from 60 kPa to 120 kPa. What is the new volume of the gas? All Potter heads. What is your house and who's death was the most devastating? I'm a Gryffindor and I say Fred's death :( This word means to take inA) synthesizeB) releaseC) absorb D) produce When lady Macbeth says, " Gladis thou art, and Cawdor, and shalt be What thou art promised; yet do I fear thy nature. It is too full o'th milk of human kindness to catch the nearest way." We can assume that A) Macbeth drinks too much milk B) lady Macbeth is afraid of her husband C) Macbeth moved too slowly D) macBeth is really a kind man 1+1=???? PLEASE HELP ILL MARK BRAINLIEST