How to type the plus sign +
Answer:
you just did it. its on da keyboard
Explanation:
hold shift and click the equal sign
Shift + = = +
Answer:
For Windows and Mac OS
The easiest way would be to open your Character Map.
Explanation:
Windows: How do I view a Character Map?
To start Character Map and see all the available characters for a particular font, click Start, point to Programs, point to Accessories, point to System Tools, and then click Character Map.
Mac OS: The easiest is to display the Mac OS Characters palette – just press [Command] + [Option] + [T], or [⌘] + [⌥] + [T]. You can then browse through various symbols and special characters, and simply double-click anyone to insert it into your current document.
Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop?
The option that is an event is known to be clicking a mouse button.
What is a computer event?An event, in a computing context, is known to be any kind of action that aim to know or is identified by a program and has a good importance for system hardware or software.
Events examples keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
You wrote a program to allow the user to guess a number. Complete the code. (Coding program: Python) (20 points!)
Answer:
guess=int(guess)
Explanation:
This is to make the input number an integer so you can compare later on
Answer:
guess = int(guess)
Explanation:
This makes the guess input number an integer
30 POINTS!
Which of the following describes an iteration in a computer program?
a set of instructions that causes a number to be printed
a set of instructions that causes the program to stop running
a set of instructions that can be executed multiple times
a set of instructions that does not execute any code
The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times.
What tells about an iteration in a computer program?In computer programming, the term iterative is known to be the act where product design or its application is made better via consistent review and testing.
Therefore saying that The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times is correct.
Learn more about iteration from
https://brainly.com/question/25754804
#SPJ1
Answer:
C. a set of instructions that can be executed multiple times
Explanation:
What is the output?
>>> answer = "five times"
>>> answer[2:7]
The output is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1.
What is output?Other answer are:
Then count rightly, index 2 is v and index 7 is m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".
Output is said to be the act of making something out of another thing.
Note that the output is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1. Then count rightly, index 2 is v and index 7 is m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".
Learn more about output from
https://brainly.com/question/1786465
#SPJ1
AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
connecting to unauthorized devices through the network
going onto unauthorized sites or downloading certain content
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.
What is AUP?AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.
How does an AUP regulates users?Most AUPs imply:
Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.Learn more about AUP in: https://brainly.com/question/9509517
#SPJ1
Answer:
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
Explanation:
2.
Select the correct answer.
Consider the following statements:
Pls "It is hot."
Q is "It is dry."
Ris "I am thirsty."
What does the sentence (P^Q)->R mean?
Ο Α.
If it is hot and dry, then I am thirsty.
B.
If I am thirsty and dry, then it is hot.
C.
If it is dry or hot, then I am thirsty.
OD.
If it is hot then I am dry and thirsty.
The structure argument can be given as, with dry and hot weather, it felt thirsty. Thus, option A is correct.
What is the structure of the argument?The argument is held valid and correct with the use of proper relationships between the sentences. The correct correlation depicts the conclusion to the sentence.
P Q means P followed by Q~R means excluding RP^Q means P and QFrom the given argumentative sentences it can be delivered as If it is dry and hot then I’m thirsty. Thus, option A is correct.
Learn more about structure of argument, here:
https://brainly.com/question/14993040
#SPJ1
In the event of a fire, the most appropriate failure policy is a policy.
In the event of a fire, the most appropriate failure policy is Fail open policy.
What is fail open policy?A system set to fail open does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important than authentication.
Fail Open systems allow access as opposed to Fail Closed systems that block access. When handling errors, developers need to carefully choose what actions to take.
Learn more about fire policies here,
https://brainly.com/question/15020213\
#SPJ1
How many characters can be store on a disk with a capacity of 720bytes
Answer:
184320
Explanation:
256x720
Walter and Layla own neighboring cornfields. Walter harvested 5/8 of an acre of corn on Monday and Layla harvested 3/8 of an acre. How many more acres did Walter harvest than Layla?
Answer:
2/8 or if you have to reduce it, you could do 1/4
Explanation:
Walter = 5/8 on Monday
And
Layla harvested = 3/8
So you just do
5/8 - 3/8 = 2/8
You can check it by doing 2/8 + 3/8 = 5/8
How many characters can be store on a disk with a capacity of 1.4mb
Answer: If you want an exact number of characters, this one is really peculiar. A 1.44MB diskette can hold 1.44 x 1000 x 1024 characters, which is 1,474,560 characters.
Explanation:
С
List three examples of deadlocks
that
are not related to Computer
system.
Answer:
Hope it helps
Explanation:
The three examples of deadlocks that are not related to a computer-system environment are as given below: Two cars crossing a single lane bridge from opposite directions. A person going down a ladder while another person is climbing up the ladder. Two trains traveling toward each other on the same track.
What was Ada Lovelace's contribution to computer science?
Answer:
She made the first computer.
Explanation:
Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.
Answer:
She made the first ever computer.
Explanation:
The computer was called the Analytical Engine.
What is the ability for anyone in a society to own private property _____.
Answer:
The ability for anyone in a society to own private property incentivizes people to conserve resources and encourages entrepreneurship.
Maria notices that visitors are landing on her site's home page, but they are not
navigating to any of the other pages. It's possible that having her navigation bar in a
non-standard location could be the cause of this.
Choose the answer.
True
False
Answer:
True
Explanation:
If your navigation bar is inaccessible, then visitors won't be able to navigate any further into your website.
ANSWER QUICKLY!!
Betty loves surfing online. She clicks on links that lead her to more information on a particular topic. Every time she clicks a new link she sees a
new page of another website. What is this called in terms of usage statistics?
Answer: I did some research I narrowed it down to page link and page break so I think it might be page link but look up page break and you will see what I think it might be that ok hope this helps.
Answer:
Page load
Explanation:
In terms of usage statistics, when Betty clicks on a link and is directed to a new page of another website, it is referred to as a "page load." A page load represents the action of a user accessing a web page and the browser fetching and rendering the content of that page.
An example of a processing device would be
Answer:
Central processing unit (CPU) Graphics processing unit (GPU) Motherboard. Network card.
Explanation:
as my study I know this answer I hope it will be help full
Network card, Graphics processing unit, Motherboard, Central Processing unit, Digital Signal Processor, the list goes on.
Question 9
The district purchases a web resource for the elementary campuses, but you
want to use it with your 9th grade students who need remediation. This would be
allowed because the district has extra licenses.
O True
False?
Which page does a site map usually begin with?
A.shop Page B.Home page C.Index page D.About Page
Answer:
home page
Explanation:
a sitemap is a file where you provide information about the pages, videos, and other files on your site, and the relationships between them
What will be printed to the screen when the following program is run?
Answer:
20
Explanation:
max(my_list) is 5 (finds the maximum value)
sum(my_list) is 1 + 2 + 3 + 4 + 5 = 15 (finds the sum of values)
=> max(my_list) + sum(my_list) = 5 + 15 = 20
Answer:
It will print 20, because you are adding all the values of your list together using the max function, and then adding the actual integers in your list together with the previous number.
....................
Answer:
What s this question about?
Explanation:
I will edit my answer but i need to understand what you want me to write about.
Question 3 of 25
What does the number of hertz measure in a CPU?
A. How quickly the data in RAM can be read, changed, and
overwritten
B. How fast a CPU can process data, indicating performance
O c. How many bits are fed into a CPU in a certain amount of time
D. How much data is stored magnetically and is used for long-term
How fast a CPU can process data, indicating performance does the number of hertz measure in a CPU. Hence, option B is correct.
What is process data?Process data is information about a business process that builds up in an XML document during the course of the process, in accordance with configured instructions in the BPML.
a stock trading program that creates a straightforward graph from millions of stock data points. Customers' search histories are used by an online retailer to suggest related products. A digital marketing company develops location-specific ads using demographic information about consumers.
Batch processing, real-time processing, and online processing are the models. Data processing that is done in batches is known as batch processing. This indicates that each item of data is processed separately.
Thus, option B is correct.
For more information about process data, click here:
https://brainly.com/question/30094947
#SPJ2
give an example of an algorithm in c++ that can be used to avoid car collision using four infra red sensors
Answer:
Since entering the 21st century, the number of vehicles has increased exponentially, and the number of vehicles and drivers has further increased [1]. How to reduce the number of traffic accident deaths and economic losses has become an important issue in the context of such a large number of vehicles [2].
In recent years, some research studies have been made on the collision warning algorithm. The existing collision warning algorithms are mainly divided into two categories, namely, the Safety Time Algorithm and the Safety Distance Algorithm [3]. The safety time logic algorithm compares the collision time between the two workshops with the safety time threshold to determine the safety status. The safety time algorithm mainly uses Time to Collision (TTC) as the research object [4]. The safety distance model refers to the minimum distance between the vehicle and the obstacle, which is also the distance the vehicle needs to maintain to avoid the collision with the obstacle under the current conditions of the vehicle [5].
Explanation:
Create a future concept on how technology will affect communication and on how the way humans will interact with each other
Technology making communication increasingly direct and fast, which can impact the way work is carried out and career development.
How does technology affect the job market?The speed with which communication processes are developed from technological tools, such as the internet, may increasingly impact commercial relations between different nations, in addition to generating more and more automation of tasks and reduction of the physical structures of companies.
Therefore, future projections for technology are related to innovation and profitable and competitive advantages, as in remote work, which is a trend that reduces costs and increases motivation.
Find out more about remot work here:
https://brainly.com/question/26512743
#SPJ1
Database queries is an example of
Answer:
A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.
SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.
Five types of SQL queries are:
1) Data Definition Language (DDL).
used to define and modify the structure of a database.
2) Data Manipulation Language (DML).
used to manipulate (change) the data in the database.
3) Data Control Language(DCL).
used for access control and permission management for users in the database.
4) Transaction Control Language(TCL).
used for maintaining consistency of the database and for the management of transactions made by the DML commands.
5) Data Query Language (DQL).
used for performing queries on the data within schema objects.
The first generation computers are likely to have been inverted in what period?
A. 1910s
B. 1920s
C. 1930s
D. 1940s
The first generation computers are likely to have been inverted in the period of the 1940s.
What is the era in 1st generation of computer?The era is known to be around 1940-1956. This is said to be the period where the first set of computers were made.
Note that the first generation is one that vacuum tubes as the basic parts for memory and thus The first generation computers are likely to have been inverted in the period of the 1940s.
Learn more about first generation computers from
https://brainly.com/question/14713070
#SPJ1
When replacing a system board for an OEM system, what are the recommended steps to take? Select two options that apply.
When replacing a system board for an OEM system, the recommended steps are A. Run Easy Restore to install the OEM ID. If Easy Restore fails, manually reinstall the OEM ID module while the manufacturing mode is still enabled/detected on the replaced system board.
B. Replace the system board, verify the server boots fully before reinstalling the OEM identity (ID) module.
What is OEM system?OEM means original equipment manufactures. OEM makes computer system and products that are used by another company's end product.
Thus, the correct options are A and B.
Learn more about OEM system
https://brainly.com/question/23988969
#SPJ1
c. What are the four basic operations in a computer? Define each of them wit help of block diagram.
Answer:Answer: At a fundamental level, computers operate through these four functions: input, output, processing, and storage.
Explanation: Input is something entered into a machine or other system, the act of entering data or other information, or input can also describe giving one's help, advice or thoughts.
Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered.
An example of process is the steps taken by someone to clean a kitchen. An example of process is a collection of action items to be decided on by government committees. noun.
A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.
Explanation:
What is the name of the first screen displayed in a database application that introduces the application
Answer:
This first database was known as the Integrated Data Store, or IDS.
Explanation:
This first database was known as the Integrated Data Store, or IDS. This was shortly followed by the Information Management System, a database created by IBM.
What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP?
TCP/IP parts include the following:
Network accessInternetTransportApplicationWhat is TCP/IP?TCP and IP stands for Transmission Control Protocol and Internet Protocol respectively and are communication protocol that links the application layer to the network layer.
Its primary user include:
BNsMANsWANsRead more about TCP/IP here https://brainly.com/question/11864481
#SPJ1