Answer:
what
Explanation:
Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products
Answer:
The correct answer is the electronic industry
Hope this helps
Answer:
Electronics
Explanation:
PYTHON- Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discover Card all
have 16 digits, and the first digit serves to indicate the card brand. All Visa cards start with a 4;
MasterCard cards always starts with a 5; and Discover cards start with a 6. Write out a program that
prompts for a credit card number and emits the name of the brand. If the card brand cannot be
determined, the program should output "Unknown Card"
Answer:
ccard = input("What is your credit card #: ")
if ccard[0] == 4:
print("Visa")
elif ccard[0] == 5:
print("MasterCard")
elif ccard[0] == 6:
print("Discover")
else:
print("Unknown Card")
cách soạn thảo văn bản trên word
Answer:
Did you mean How to edit text on word? There are 2 word, Microsoft Word Office and WordPad. The step I give you below is for both.
Explanation:
Steps to edit text on word
Step-1: Select the text you want to edit.
Step-2: Click on Home Tab.
Step-3: Select the style(s) you want to edit from the Font group
How can you legally use the search engine
give atleast 5 example of ENFRAMING in our daily lives
Answer:
1. steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.
Steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.
What is Automobile?The first steam-powered vehicle was created in 1672, marking the beginning of the development of the car. Nicolas-Joseph Cugnot produced the first steam-powered automotive that could transport people in 1769.
Around the beginning of the 19th century, inventors started to take risks and developed the de Rivas engine, one of the first internal combustion engines, and an early electric motor. The Volkswagen Beetle and the Ford Model T are two of the most widely produced car models in history, respectively.
A backlash against huge vehicles in the middle of the 19th century slowed development, but certain internal combustion engines nevertheless advanced.
Therefore, Steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.
To learn more about automobile, refer to the link:
https://brainly.com/question/1193772
#SPJ2
Which of the following correctly orders the steps involved in the outlining process?
brainstorm, order, organize, label
brainstorm, organize, order, label
organize, brainstorm, label, order
organize, brainstorm, order, label
Answer:
brainstorm, organize, order, label
Explanation:
The answer is:
brainstorm, organize, order, labelDescribe briefly three applications/systems that can be used to add digital signature to a document?
Answer:
Applications of Digital Signature
To send and receive encrypted emails, that are digitally signed and secured.
To carry out secure online transactions.
To identify participants of an online transaction.
Explanation:
A printer is considered to be in the category of
a. software
Selected:b. hardware
c. operational system
d. equipment
A printer is considered to be in the category of b. hardware.
What is hardware?Computer hardware contains the physical characteristics of a computer, such as a case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, pictures card, sound card, speakers, and motherboard.
Hardware directs to the physical components of a computer. Also directed to as the machinery or the equipment of the computer. Examples of hardware in a computer exist the keyboard, the monitor, the mouse, and the processing unit However, most of a computer's hardware cannot be caught; It's inside the computer case.
A printer exists as an external hardware output device that brings the electronic data stored on a computer or other device and develops a hard copy.
Hence, A printer is considered to be in the category of b. hardware.
To learn more about hardware refer to:
https://brainly.com/question/24370161
#SPJ2
a printer gives hard output whereas a screen gives_ output
Answer:
Explanation:
Easy,soft copy output as the output given by a screen only can be seen but can't be touched
What type of data causes concern for institutions or business when collected, stored, and not secured properly?
Advertising information
Personal identifying Information
User interface information
Marketing information
Answer:
user interface information
Explanation:
This is because it exposes the infrastructure of the business or institution which includes the layout of plans and future perspective
The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information.
What is Personal identifying Information?Personal Identifiable Information (PII) is known to be any depiction of information that allows the identity of a person to whom the information is given to be reasonably taken by direct or indirect method.
Therefore, The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information as it can lead to issues and lawsuit if tampered with.
Learn more about Personal Information from
https://brainly.com/question/25228524
#SPJ6
What is computer Write three features of computer
A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.
speed, accuracy, diligence, versatility and storage capacity
A computer is a machine that can be programmed to manipulate symbols. Its principal characteristics are: It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program). It can quickly store and retrieve large amounts of data.
The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity.
the are the uncontrollable faces outside the business industry .
Answer:
The uncontrollable risk factors are the details that affect the product that a company has no way of changing. These include political and economic climates, competitor choices and even the weather.
Explanation:
Krista is doing research for her school assignment. While she is completing her research, the computer unexpectedly restarts. The computer restarted because it
was installing software
was installing updates
was updating the hardware
was updating the virus
Answer:
I believe the answer should be was installing updates.
Explanation:
how to calculate 3 X (50 + 40) ÷ 5 on excel 2016
Answer:
I think this might help, don't know much of this
Explanation:
How do you calculate 3.5 increase in Excel?
How To Increase a Number By a Percentage. If want to calculate a percentage increase in Excel (i.e. increase a number by a specified percentage), this can be done by simply multiply the number by 1 + the percentage increase. - which gives the result 60.
Explanation:
I am not sure what your problem is.
you don't know how to enter a formula into an Excel cell ? or you don't know how to combine the content of cells into one result in another cell ? or ... ?
but just answering literally this one-line-problem-definition
you click into an empty cell and type
=3*(50+40)/5
and press return.
and the cell will show you the result. 54
When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
Select the best option.
At every worksite
Only when GFCIs are in place
Only when working around power lines
When an employer does not use GFCIs
Answer:
Only when working around power lines
Explanation:
Assured Equipment Grounding Conductor Program (AEGCP) is applicable mainly in sites dealing with power. Therefore, the most appropriate worksite to have Assured Equipment Grounding Conductor Program is when working around power lines.
Answer:
When an employer does not use GFCIs
Explanation:
Name the major types of computer systems from slowest to fastest.
Answer:
Cache is the fastest and most expensive, RAM is slower and less expensive, and virtual memory is the slowest and least expensive type.
Explanation:
To create a cell reference in another spreadsheet you must need to start with _______ sign.
a. = = b. & c. = d. $
Answer:
You need to start with c) =
Jacob is a network technician who works for a publishing company. He is setting up a new hire's access permissions. The new hire, Latisha, is an editor. She needs access to books that have been accepted for publication but are in the review stage. Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. What principle is Jacob applying
If Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is applying is: The principle of least privilege
Principle of least privilege is a principle that help to protect confidential or sensitive information from unauthorized use.
Which means that a user is only authorized or given the permission to access least information or information which the user only need to carryout their assignment or tasks.
Principle of least privilege is important as it help to minimize or limit the damages that can arise due to unauthorized usage.
Inconclusion if Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is applying is: The principle of lease privilege.
Learn more here:
https://brainly.com/question/14132911
How do you setup Synapse x? Please explain each step
1. You download the compressed file from the website
2. Create a new folder on your desktop, then copy the file location.
3. Right click on the compressed file that contains Synapse X
4. Select “Extract all,” then paste the file location of the folder you wish to keep it in, and click “Extract.”
5. Make sure Windows Real-time Protection is OFF before trying to run the .exe file, otherwise your OS will automatically delete the .exe file then you'll have to delete all the contents from your folder and restart from step 3.
You can find the Windows Real-time Protection option by going to the Windows search bar and typing "Virus and Threat Protection,"
then clicking on the "Manage Settings" button underneath the "Virus & threat protection" tab, then disabling Real-time Protection.
It will give you a prompt warning you that your PC could be open to threats, however as long as if you're not downloading shady things from shady sites, and you're not discoverable on your Wi-Fi network, you'll be fine without it.
Keep in mind, Real-time Protection automatically turns itself back on after a set amount of time of it being disabled. So you'll have to disable it every time you wish to use Synapse X.
6. Once you've done all of that, just follow the prompts that Synapse X gives you, give your whitelist code, log in, and you're set.
Identify the commands for the following list operations.
Check that there are no items in a list
Insert 10, 50, 30, 40, and 20 at the end of the list
Arrange the items in ascending order
a. IsEmpty(list)
Prepend(list, 10)
Prepend(list, 50)
Prepend(list, 30)
Prepend(list, 40)
Prepend(list, 20)
Sort(list)
b. Search(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)
c. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
GetLength(list)
d. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)
Answer:
D
Explanation:
the answer is D because it does exactly what the problem says.
2. What does the menu system on your DVD player illustrate?
(1 point)
O interface
O link
O menu system
O search engine
Answer:
Interface, (A)
Explanation:
Because it just does
interface
the correct answe
Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.
Refer to the attachment.
Language used=Python
Answer:
Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.
The roots of the quadratic equation ax² + bx + c = 0, a ≠ 0 are given by the following formula:
Quadratic Formula
In this formula, the term b² - 4ac is called the discriminant. If b² - 4ac = 0, then the equation has a single (repeated) root. If b² - 4ac > 0, the equation has two real roots. If b² - 4ac < 0, the equation has two complex roots.
Instructions
Write a program that prompts the user to input the value of:
a (the coefficient of x²)
b (the coefficient of x)
c (the constant term)
The program then outputs the type of roots of the equation.
Furthermore, if b² - 4ac ≥ 0, the program should output the roots of the quadratic equation.
(Hint: Use the function pow from the header file cmath to calculate the square root. Chapter 3 explains how the function pow is used.)
Format your output with a decimal precision of 2.
Where do you find the option to Restore a Davinci Resolve Archive project file?
I have problems in compiling this Java code:
class SumMatrix{
public static void main(String[] args){
matrixAdd({{1;2}; {5;6}}; {{8;7}; {3;4};});}
public static double[][] matrixAdd(double m1[][], double m2[][]){
int i,j;
double sum[][];
for (i=1;i<=2;i++){
for(j=1;j<=2;j++){
sum[i][j]=m1[i][j]+m2[i][j];
}}
for (i=1;i<=2;i++){
for(j=1;j<=2;j++)
return sum[i][j];
}
}
}
I get this errors:
PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the right cpt code and hcpcscode?
Answer:
no
Explanation:
yes becouce not arance the name of fegeur spech
List and Explain the programming Languages required to start working in Apple.
Answer:
JavaScript, Java, and C++ are obvious additions. Mastering these programming languages can help you land a secured job at Apple. If you pay attention to the popularity of programming language skills, Python is an immensely popular generalist programming language across all leading tech companies
measurement, analysis and iteration forms which stages of the strategy and planning process
Answer:
science is what it is that science
Explanation:
Several scholarship opportunities exist to assist students in pursuing STEM-related degrees.
True
False
Where is the ‘Chart’ button in Powerpoint?
Answer:
The picture attached