How are the functions different and how do i determine the answer

How Are The Functions Different And How Do I Determine The Answer

Answers

Answer 1

Answer:

this isn't a fair question...

you'll either get 2,3 or 4

not a nice question


Related Questions

how do I open this thing? it is stuck​

Answers

Answer:

the little button

Explanation:

what kind of tag will give additional info about your webpage

choices:

a. <meta>
b. <title>
c. <head>​

Answers

Answer:

A.The <meta> tag

Explanation:

HTML lets you specify metadata - additional important information about a document in a variety of ways.

Please mark brainliest!

Someone please help me

Answers

Answer:

first answer is correct 8

second answer is 12

Can someone please help me? (,:

Answers

14) Answer: Feathered images

15) Answer: Scale

Hope this helps have a nice day :)

the first person to get this right I will give brainlliest Suppose that you find the annual interest rate for a car loan is 12.6%. Since you want to know how much your monthly payments will be, you need to divide 12.6% by 12. You place 12.6% in cell B3. What would this formula look like?

here is examples

Answers

Answer:

=B2*B3/1200

Explanation:

Assuming the loan amount is in cell B2,

The annual interest would be B2*B3/100.

Dividing that by 12 to get the month amount, you get =B2*B3/1200

i.e., the 1200 takes care of the percent (divide by 100) and the 12 months (divide by 12) all in one go.

when the binary code is retrieved from ram and moved to the cpu, this stage is known as

Answers

This stage is known as fetching.

Any operation you do in a computer, it runs a lot of codes inside it, and these codes are in binary.For the operation, the computer accesses the RAM memory to gather information about this process, and moves it to the CPU, in a process named as fetching.Thus, the stage asked in this problem is known as fetching.

A similar problem is given at https://brainly.com/question/21536104

When an item in a menu is gray, it means that _____.


the item has been selected
the item has been selected

the item is unavailable
the item is unavailable

the item only works with another application
the item only works with another application

the item has been deleted

Answers

Answer:

the item is unavailable

Explanation:

this is an extrapolation as you would need more context to be sure but usually grey menus mean it is unavailable

KSJEDHGYGVWJHMJ,RHGFYDOYWUGWHBJK

Answers

Answer:

hmmm this seems sophisticated.

Explanation:

which is an ipsec protocol that authenticates that packets received were sent from the source?

Answers

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the transistor density of the hardware which will be used to run this software?Group of answer choices

Answers

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

The other 3 options are incorrect

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

I just got that feeling.

when is the new season of legacies coming out on netflix

Answers

Answer:

Not sure (I couldn't find info) but It is coming out on CW

Explanation:

It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.

Object-Oriented Analysis can be characterized by which of the following Selected Answer, Do the right thing Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer, An investigation of the problem (rather than how a solution is defined) Selected Answer, Defining software objects and how they collaborate to fulfill the requirements Answer, Designs are implemented in a programming language Selected Answer, Emphasizes a conceptual solution that fulfills the requirements Answer, Do the thing right

Answers

Answer:

Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer,

Explanation:

HELP THIS IS SO DIFFICULT

Answers

It would be 11111, and decimal 31
Answer:

Binary: 11111

Decimal: 31

Explanation: Hope I was able to help!

Why is data the most important asset an organization possesses?

Answers

Answer:

It helps organizations/businesses to stay relevant in the area/internet/etc.

Explanation:

Data is an asset and is one of the most important assets an association has because it is unique in its detail and context and can be used strategically to ensure we remain relevant and viable.

How often should quality control testing be implemented in the course of a project? It should be implemented only when there are clear problems. It should be implemented at regular intervals throughout the project. It does not matter how often it is implemented, as long as the standards are high. It should only be implemented at the beginning and the end of the project.

Answers

Answer:

I would personally wait until the project is roughly finished. Unless there is a project-breaking bug. Then I would try to fix it. If not, wait until the end of development.

how will you decide which browser security settings to allow and which ones to block?

Answers

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

brainly.com/question/13354554

how to book a flight online

Answers

Answer:

https://www.wikihow.com/Book-a-Flight

Explanation:

Here is a simple article I found online on how to do it.

Answer:

First find what airplane you want to attend. Check pricing, seats, legit website, etc.

Next you pick where you want to go and they will show you what is required like id, name, last name, number, etc.

After you apply i think they send you the ticket or you go pick it up.

Hope it helps you

Explanation:

WILL MARK BRAIN LIST!

Answers

Answer:

First one is A

Second one is B

Explanation:

the full meaning of UNIVAC and ENIAC​

Answers

Explanation:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

hope it's help you cutty

UNIVAC

UNIVAC, which stood for Universal Automatic Computer, was developed by J. Presper Eckert and John Mauchly, makers of ENIAC, the first general-purpose electronic digital computer.

ENIAC

ENIAC filled an entire room.ENIAC stands for Electronic Numerical Integrator and Computer. John Mauchly and J. Presper Eckert built the machine at the University of Pennsylvania at the behest of the U.S. military.

Hope it helps

Thank You !!!

Elements of design that distracts the player from the theme and objective of the are called

catfish
red herrings
haystacks
MacGuffins

Answers

Answer:

Red herrings...?

I think Red herrings?

The online underground is used _____. Select 3 options.

Answers

You forgot to put the options

Jim is working on a network design for a small office running a Windows file and printer server with Internet
capability for five desktop computers and a wireless router for the chief executive. He is suggesting they create a
Virtual Private Network (VPN), which will provide an encrypted "tunnel" through the public Internet for secure
access,
Why does this scenario provide an inappropriate firewall solution?

TIMED TEST HURRY

Answers

heres a link! ;)

http://www.econsulat.ro/

All of the following are considered INPUT devices EXCEPT?
microphone
keyboard
cd
mouse

Answers

Answer: CD

Explanation:

Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones. Hope it helps!!

Answer:

A and B

Explanation:

where and how could you use a switch made out of aluminum foil or copper

Answers

Answer:

You can use the foil as a conductor for the power and you can use the copper as an insulator to break the electric current

Explanation:

what is a sensitive compartmented information program

Answers

Answer:

cpu

Explanation:

BRAINLIEST, PLS HELP ME!


List 3 things you could use for equipment to take a family portrait

Answers

Tripod.
Triangles.
Touchpoints/Connections.

To take a family portrait, you could use the following equipment -

CameraTripodRemote Shutter Release

How to  use the above equipment

1. Camera - A DSLR (Digital Single-Lens Reflex) camera or a mirrorless camera with manual controls will provide high-quality images and flexibility in adjusting settings.

2. Tripod  - A sturdy tripod will help keep the camera stable and ensure sharp images, especially in low light conditions or when using longer exposure times.

3. Remote Shutter Release -  A remote shutter release or a self-timer function on the camera can help avoid camera shake when capturing the family portrait, allowing everyone to be in the frame without rushing to press the shutter button.

Learn more about family portrait at:

https://brainly.com/question/411062

#SPJ6

Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's private number is 4, while Bob's is 6. The first step in creating the shared key is for each party to generate a PPN based on their private number, the base and the clock size. Alice has already sent her PPN to Bob. She receives Bob's PPN, which is 2. Alice uses Bob's PPN (2), her private number (4), and the clock size (17) to calculate the shared key. What is it

Answers

Answer:

fsfsf

Explanation:

What is the correct answer

Answers

Answer:

Multiuser/Multitasking

Explanation:

The question will be answered using the following two points:

- The fact that the operating system allows Ali and his friend to be logged on at the same time is known as a multiuser operating system

- The fact that the operating system allows Ali's friend to access documents while Ali is still logged in is refer to as multitasking.

Add me as brainlist

What are the stages in the production of clay​

Answers

Explanation:

There are 6 essential stages of clay:

1. ) Slip. Use: Slip is most commonly used to join pieces of wet or leather hard clay together.

2.) Wet clay. Use: Wet clay can be used to make an infinite array of pieces using many different techniques.

3.) Leather-hard clay. ...

4.) Dry clay. ...

5.) Bisque. ...

6.) Glaze ware.

which way do you swipe in the android os to access shortcuts

Answers

You can swipe from right to left to access shortcuts or the notification bar in Android OS.
Other Questions
X-3 = square root of 4x Describe surface tension in a group of bonded water molecules that form a ""bead of water"" Do you agree with the supreme court's decision of the korematsu case? Why or why not? Which promise encouraged Anti-Federalists to ratify the Constitution? Another slave state would be added to the union. A bill of rights would be added to the Constitution Another branch of government would be added to the Constitution Another house would be added to the legislative branch 1. What was the problem the Separatist leaders faced?2. What was unusual about their solution to the problem?3. How does a body of laws such as the U. S. Constitution work to hold a nation together? Will makr brainliest!Hey could someone translate this to spanish and then add some casual mistakes in it? Thanks for helping me out. Hello, Mr. Robinson, how are you? you will have to turn right on Williams's field and go straight. Turn left on Stone Street and right into the left lane, then go straight until you see a Starbucks. To be exact you will have to enter the Starbucks driveway and turn around back where you will see a dirt road. Take that dirt road all the way until you see the fishing lake. Can someone pls help me A large multiplex movie house has many theaters. The largest theater has 48 rows. There are 13 seats in the first row. Each row has two seats more than the previous row. How many total seats are there in the theater? Use distributive property:7(x-12)-(6x-15) Which rebellion was caused by British mistreatment of American Indians in the Ohio Country and Great Lakes region?A. Pontiacs RebellionPontiacs Rebellion B. Stono RebellionStono RebellionC. Bacons RebellionBacons RebellionD. Powhatans Rebellion the graph of y=3x+2 please help!! i do NOT understand chemsitry at all this is me. i look amazing what is 2 1/4 x 9/5 PLES and thank uuuuu Create the equation for the line in the graph. (Press edit background to see it better)giving brainiest The church youth group is selling snacks to raise money to attend their convention. Amy sold 2 pounds of candy, 3 boxes of cookies, and 1 can of popcorn for a total sales of $85. Brian sold 4 pounds of candy, 4 boxes of cookies, and 3 cans of popcorn for a total sales of $170. Paulina sold 8 pounds of candy, 8 boxes of cookies, and 5 cans of popcorn for a total sales of $330. What is the cost of each item? (Simplify your answers completely.) Which of these was NOT a cause of recent conflict in the Balkans?A economic alliancesB religious differencesC anger over past conflictsD nationalistic feelings dtr bro beIn science class, Antonio and Anna were measuring the approximate speed of a marble as itexits from an 8-foot-long ramp. They discovered that it took 2.1 seconds for the marble totravel 12.5 feet from the end of the ramp.If r =d, where d is distance in feet and t is time in seconds, approximately how fast was themarble traveling as it exited from the ramp to the nearest hundredth of a second?t What type of government was France during the reign of terror? rational equations: solve for x.