Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: Hope this helps!
How can the adoption of a data platform simplify data governance for an organization?
Answer:
by implementing models that predict compliance with data protection and data privacy policies.
Explanation:
A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .
A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.
An A record contains what
Answer:
IP address
Explanation:
An A record is actually an address record, which means it maps a fully qualified domain name (FQDN) to an IP address.
Answer:
IP adress. the person above me is correct
combination of star topology and star topology can consider as hybrid?
Answer:
no
Explanation:
A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.
why do we need to settle technology in business?
Answer:
Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.
discuss five domains of Instructional technology
Answer:
Design, Development, Utilization, Management, and Evaluation.
The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (organized like the INSP instruction). This part of the microcode will be reached after the instruction opcode has been parsed and identified by earlier parts of the microcode and while the IR contains the complete instruction from memory (as usual for the IR).
100:a := band(smask, ir);
101:a := a + (-1); if n goto 0;
102:ac := lshift(ac); if n goto 104;
103:goto 101;
104:ac := ac + 1; goto 101;
If this possible instruction had a masm assembly pneumonic of XXXX , and was used in an assembly program as shown below:
.
.
LODD abc:
XXXX 7
HALT
.
.
abc: "lost"
What would the 16 bit content of the AC look like when we hit the HALT instruction?
a. 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1
b. 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0
c. 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1 1
d. 0 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0
Answer:
The answer is "Option A".
Explanation:
In the first 2 signatures in a string, the "ol" with both the "l" throughout the low byte environment is included, and so the initial bit layout becomes: Number of [tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0[/tex] Its high 7 bits are moved to the lower 7 having come until the correct circular change of 7 is done:
[tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0 \ \ \ to \ \ 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1[/tex]
8. It is used to get qualitative data.
Answer:
please give me brainlist and follow
Explanation:
Qualitative data describes qualities or characteristics. It is collected using questionnaires, interviews, or observation, and frequently appears in narrative form. For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.
This is a glitch ?
Answer:
I think no...Brainly might not allow unique text's.
Answer:
dunno???
Explanation:
Write a Python code that takes two sequences CATCGTCCT and CACCGACCG and prints the point mutations found when aligning the two sequences. Tip: you simply need to write a for loop to go over the length of the sequences, pick a letter from each position,and, compare the two sequences position by position for matches and report the mismatches.
Answer:
Following are the code to the given question:
def match_sequence(s1,s2):#Defining a method match_sequence that accepts two parameters
for l in range(len(s1)):#defining a loop that checks range of s1 value
if(s1[l] != s2[l]): # use if block to match each sequences
print('The sequence does not match at index: ',l+1)#print value with message
s1 = 'CATCGTCCT'#defining a string varible s1
s2 = 'CACCGACCG'#defining a string varible s1
match_sequence(s1,s2)#calling a method that prints its values
Output:
The sequence does not match at index: 3
The sequence does not match at index: 6
The sequence does not match at index: 9
Explanation:
In this code, a method "match_sequence" is declared that takes two string variable "s1 and s2" in its parameters, and inside the method, a loop is declared that checks the range of s1 value and use if block to match each sequence and use a print method that prints it values.
Outside the method, two string variables are declared that holds a string value that passes into the "match_sequence" method and calls it.
what is descriptive research
Answer:
Descriptive research is used to describe characteristics of a population or phenomenon being studied. It does not answer questions about how/when/why the characteristics occurred. Rather it addresses the "what" question
To understand, read, and give meaning to data in
tables and charts is to perform which of the
following?
A interpretation
B analysis
C assessment
D data collection
Answer:
teh answer is b
Explanation:
which of the
following?
A interpretation
B analysis
C assessment
D data collection
Answer:
interpretation
Explanation:
1
list out and discuss the characteristics of big data
Answer:
Volume: Volume refers to the sheer size of the ever-exploding data of the computing world. It raises the question about the quantity of data.
Velocity: Velocity refers to the processing speed. It raises the question of at what speed the data is processed.
Variety: Variety refers to the types of data.
Explanation:
PLS HELP SO I CAN PASS WILL GIVE BRAINLINESS AND 30 POINTS
Charlie Chaplin is know for developing
a
The Dramedy
b
Early Special Effects
c
Slap-Stick
d
The Prat-Fall
Question 2 (1 point)
Chaplin felt it was important for the audience to
a
turn off their cellphones during the movie.
b
believe the stunts were real by doing them himself.
c
escape from their problems by avoiding difficult topics.
d
have an emotional connection with the characters.
Question 3 (3 points)
Match the silent film with its modern influence
Column A
1.
Metropolis:
Metropolis
2.
The Kid:
The Kid
3.
Nosferatu:
Nosferatu
Column B
a.Freddy Kruger
b.The Simpsons
c.Sharknado
d.Star Wars
Question 4 (1 point)
How did Nosferatu change the Vampire cannon (story)?
a
Vampires are friendly
b
Vampires can be killed by sunlight
c
Vampires can become invisible
d
Vampires can be repelled by garlic
Question 5 (1 point)
Metropolis was the first film to
a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.
movies being the kid , nosferatu , and metropolis
Answer:
a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.
Explanation:
help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..
Answer:
if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus
Explanation:
what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term
which software manages the functioning of the entire computer system
Discusstheimportanceofbackingupdatainorganizations,pointingoutthebenefits
ofcloudbackupoption
Addition helps kids master the relationships between numbers and understand how quantities relate to one another. Even when kindergartners can't reliably answer addition problems or manipulate large numbers, basic addition skills give them a framework for mastering math in elementary schoo
In the recursive function findMatch(), the first call is findMatch(array, 0, 4, key) . What are the remaining function calls to find the character 'e'?
public class FindMatch {
public static int findMatch(char array[], int low, int high, char key) {
if (high >= low) {
int mid = low + (high - low) / 2;
if (array[mid] == key) {
return mid;
}
if (array[mid] > key) {
return findMatch(array, low, mid, key);
}
else {
return findMatch(array, mid + 1, high, key);
}
}
return -1;
}
public static void main(String args[]){
char array[] = {'a','b','c','d','e'};
char key = 'e';
int result = findMatch(array, 0, 4, key);
if (result == -1) {
System.out.println("Element not found!");
}
else {
System.out.println("Element found at index: " + result);
}
}
}
a. (array, 2, 4, key) and (array, 3, 4, key)
b. (array, 2, 4, key), (array, 3, 4, key) and (array, 4, 4, key)
c. (array, 3, 4, key)
d. (array, 3, 4, key) and (array, 4, 4, key)
Answer:
The answer is "Option D".
Explanation:
In the given question "(array, 3, 4, key) and (array, 4, 4, key)", the element 'e' to also be searched is concentrated mostly on the right-hand side of the array since it is in the last place. This same middle value is 2 but findMatch(array, mid + 1 high, key) is labeled twice to move the center pointer to its last position, that is, so move that search item's 'e.'
What is the effect when one part of a system changes? A. The entire system changes or could stop working. B. The closed-loop system becomes an open-loop system. C. The open-loop system becomes a closed-loop system. D. The larger system is not affected.
Answer:
c is the answer hope you get it right
The effect when one part of a system changes C. The open-loop system becomes a closed-loop system.
Systemic change is generally understood to require adjustments or transformations in the policies, practices, power dynamics, social norms or mindsets that underlie the societal issue at stake. It often involves the collaboration of a diverse set of players and can take place on a local, national or global level.
How does a systemic change happen?All systems organize individual pieces into some sort of interrelated whole. Put simply, systemic change occurs when change reaches all or most parts of a system, thus affecting the general behavior of the entire system.
Why is systems change important?A systems-change approach is more appropriate for problems that are complex, unpredictable, and context-dependent. For example, the challenge of inadequate access to educational opportunities for children from low-income neighborhoods cannot be addressed with a straightforward, logistical fix.
To learn more about A systems-change, refer
https://brainly.com/question/20798008
#SPJ2
What menu and grouping commands is the "SORT" tool? ( please answering meeeee)
A)Home - editing
B) Edit - format
C )Page layout - sheet options
D) File - edit
Four reasons why users attach speakers to their computer
Write a program that demonstrates how various exceptions are caught with catch(Exception exception). This time define classes ExceptionA (which inherits from class Exception) and ExceptionB (which inherits from class ExceptionA). In your program, create try blocks that throw exceptions of types ExceptionA, ExceptionB, NullPointerException and IOException. All exceptions should be caught with catch blocks specifying type Exception.
Answer:
Sorry mate I tried but I got it wrong!
Explanation:
Sorry again
The five types of personal computers are: desktops, laptops, tablets, smartphones, and
Answer:
microcomputers
Explanation:
Write a c++ to read seven days in an array and print it
Explanation:
Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.
unanswered questionl
¿ ? ¿ ? Whattttt ? ¿ ? ¿
Answer: What
Explanation:
Write a program that will filter a list of non-negative integers such that all duplicate values are removed. Integer values will come from standard input (the keyboard) and will range in value from 0 up to 2,000,000,000. Input will be terminated by the special value, -1. Once the input is read in you should output (to the screen) the list of numbers as a sorted list (smallest to largest) with one value listed per line where all duplicates have been removed. The primary difficulty with this program is that there are an enormous number of input values and an expected large number of duplicate numbers.
Answer:
The program in python is as follows:
original = []
inp = int(input(": "))
while inp>=0:
if inp<=2000000000:
original.append(inp)
inp = int(input(": "))
newlist = []
for i in original:
if i not in newlist:
newlist.append(i)
newlist.sort()
for i in newlist:
print(i)
Explanation:
This initializes the original list
original = []
This gets input for the list
inp = int(input(": "))
The following loop is repeated while input is not negative
while inp>=0:
This ensures that only inputs from 0 and 2000000000 enters the list
if inp<=2000000000:
original.append(inp)
Prompt the user for another input
inp = int(input(": "))
This initializes a newlist
newlist = []
Iterates through the original list
for i in original:
Check for duplicate
if i not in newlist:
Each number is entered to the new list, without duplicate
newlist.append(i)
This sorts the new list in ascending order
newlist.sort()
This prints the list item one per line
for i in newlist:
print(i)
Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and malware detection software
Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on. Use these programs and keep them up to date so they can defend you against the latest threats.
Explanation:
els
2.4
The SPCA receives an amount of R8 500 per annum from an undisclosed
donor. The amount has been growing at a rate of 7.5% per annum
IE
REQUIRED
Calculate how much the donor must have invested as a lump sum to be able
to continue with these payments indefinitely.
(2)
Answer:
ds2d2d2d2dd
Explanation:
places where computer are used
Answer:
Banks and financial.
Business.
Communication.
Defense and military.
Education.
Internet.
Medical.
Transportation.
etc..
Answer:
businesses, schools, colleges, medical offices, banks.
Why are microcomputers installed with TCP/IP protocols?
Answer:
microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet
Explanation:
The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.
Required:
Develop a program to count the incoming votes at election central.
Answer:
Explanation:
The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.
precinct = input("Enter Precinct Number: ")
option1 = 0
option2 = 0
while True:
choice = input("Enter your vote 1 or 2: ")
if int(choice) == 1:
option1 += 1
else:
option2 += 1
endVote = input("Vote again y/n")
if endVote.lower() != 'y':
break
f = open("results.txt", "w")
f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))