Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control. Group of answer choices AVI ActiveX Class Quicktime

Answers

Answer 1

Answer:

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control.

ActiveX

Explanation:

ActiveX controls are small apps, also called “add-ons,” that allow websites to provide content such as videos and games. They also enable web interaction, make browsing more enjoyable, and allow animation. However, these ActiveX controls can sometimes malfunction, produce unwanted contents, or install spyware in your system because they exercise the same level of control as the computer user.


Related Questions

When multiple architects work on a construction plan, which section of a construction plan will help them keep track of when the changes are made and by whom?
A.
framing plan
B.
schedule
C.
title block
D.
bill of materials

Answers

Answer:

I believe that it is . A. framing plan

Explanation:

But I am not certain But I do know that it IS NOT B..

Answer:

the answer is schedule!!!

Explanation:

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

hello hello . please help me​

Answers

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

 int num, m=0, check=0;  

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

PLS I WILL GIVE BRAINLIEST IF CORRECT

Select the correct answer.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?


A. hierarchical
B. linear
C. webbed
D. wheel

Answers

Answer:webbed

Explanation:

k

Answer:

Webbed

Explanation:

write c++ program from 1to 100 to find prime numbers using statement.​​

Answers

#include <iostream> using namespace std; int isPrimeNumber(int); int main() { bool isPrime; for(int n = 2; n < 100; n++) { // isPrime will be true for prime numbers isPrime = isPrimeNumber(n); if(isPrime == true) cout<<n<<" "; } return 0; } // Function that checks whether n is prime or not int isPrimeNumber(int n) { bool isPrime = true; for(int i = 2; i <= n/2; i++) { if (n%i == 0) { isPrime = false; break; } } return isPrime; }

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so?

Ctrl+G
Ctrl+K
Ctrl+C
Ctrl+Shift+G

Answers

Answer:

Ctrl+K

Explanation:

Edg 2020

B on edg 2021, hope i could help

Asymmetric encryption uses only 1 key.

A)
False

B)
True

Answers

A.) false

Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
A) false is the answer

Prompt
Using complete sentences post a detailed response to the following.
Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the
steps you would take to learn a new language, and what are some challenges that might arise? What are some things that
can help make the process easier?

Answers

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

how do i use a computer (i'm 99999 years old)

Answers

Answer:

grandma?

Explanation:

is it you?

Answer:

you  use the mouse pad and move it already and go to google and search whatever your trying to find

Explanation

i know how to work a computer

Assume a file containing a series of integers is named numbers.txt and exists on the computer’s disk. Write a program that reads all of the numbers stored in the file, calculates their total and displays it.


Very Important: The file could have any number of numbers, so you need to use a loop to process the data in the file

Answers

#include <iostream>

#include <fstream>

using namespace std;

int main(){

   int x, sum=0;

ifstream f("numbers.txt");

while(!f.eof()){

       f >> x;

       sum +=x;

}

cout << "Sum : " << sum;

}

This is a C++ program.

Next time be more precise on the programming language you want

12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use

Answers

Answer:

Updated OS software patches

Explanation:

Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.

Write a program that removes all the occurrences of a specified string from a text file. Your program should prompt the user to enter a filename and a string to be removed.

Answers

Answer:

filename = input("Enter file name: ")

rm_word = input("Enter word to remove from file: ")

with open(filename, "r") as file:

   mytext = file.read().strip()

   replace_word = mytext.replace(rm_word, "")

   print(replace_word)

Explanation:

The python program prompt user for the file name and the string word to remove from the text. The file is opened with the 'with' keyword and the file content is read as a string and stripped of white space at the beginning and end of the string. The string's 'replace' method is used to remove the target word.

write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise

Answers

In python 3.8:

if input("Enter password: ") == "swordfish":

   print("access granted")

else:

   print("access denied!")

active cell is indentifed by its thick border true or false​

Answers

Answer:  It's identifed by its thick border so its true

Answer: true is correct

In preemptive priority scheduling, when a process arrives at the ready queue, its priority is compared with the priority of:____________.

Answers

Answer:

Currently running process

Explanation:

In preemptive priority scheduling there is usually a form of comparison of the schedule with the other function or processes which are present in the queue also.

In preemptive priority scheduling, when a process arrives at the ready queue, its priority is compared with the priority of currently running process.

Discuss why traits such as teamwork and self representation are necessary for a successful career in the media industry

Answers

Because it helps you to be a better you it helps you to believe in yourself and to think about all the things you have in life and to help you to work together with other people through thick and thin.

Because it aids to be a better and also it helps you to believe in yourself and to think about all the things you have in life and to help you to work together with other people.

What is teamwork?

Teamwork is a group's collaborative effort to achieve a common goal or complete a task in the most effective and efficient manner.

This concept is seen in the context of a team, which is a group of interdependent individuals who work together to achieve a common goal.

Good teamwork entails a synergistic approach to work, with each individual committed to and working toward a common goal. Teamwork maximizes team members' individual strengths to bring out their best.

Good teamwork entails a synergistic approach to work, with each individual committed to and working toward a common goal. Teamwork maximizes team members' individual strengths to bring out their best.

Thus, traits such as teamwork and self representation are necessary for a successful career in the media industry.

For more details regarding teamwork, visit:

https://brainly.com/question/18869410

#SPJ2

Suppose that the LC-3 instruction LD R1, DATA is located at x3100 in memory and the label DATA is located at x 310F. The machine code (in hex) for the above instruction is

Answers

Answer:

The machine code is located at x210F.

Explanation:

The DATA is located at x3100 while the DATA label is located at the x310F (in hex) in the memory which is F address away (8 bits) from the DATA itself. The machine code location is relative to the address of the DATA label.

Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum speed (mph), average fuel consumption (mpg), etc. Create few objects to illustrate your desired cars.

Answers

Answer:

Answered below

Explanation:

This is written in Kotlin programming language.

//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.

class Car(

val type: String,

val gear: String,

val maxSpeed: Double,

val avgFuelConsumption: Double)

//Creating several objects of car.

val sedan: Car = Car("sedan", "auto", 23.4, 500)

val jeep: Car = Car("jeep", "manual", 40, 350)

val mini: Car = Car("mini", auto, 26.7, 86, 234)

WILL MARK BRAINILY!!

Muriel's program is supposed to show flashing lights to test the user's vision, but the lights don't flash for the right
amount of time. What should Muriel do?
O assess the program
O edit the program
O debug the program
O renew the program

Answers

Answer: He/she should debug the program

Explanation: If it's not right, it's edit or renew the program.

Answer:

he should edit the program

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?

Answers

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

Write an if statement assigns 20 to the variable y, and assigns 40 to the variable z if the statemnet x is greater than 100​

Answers

Answer:

y=20 z=40 x>100

Explanation:

not sure if this is correct but yes

Choose the correct term to complete the sentence

The ____ function removes the element with an index of zero.

1)popleft
2)leftremove
3)leftpop

Answers

Answer:

popleft

Explanation:

Answer: pop left

Explanation: got it right on edgen

i need help to answer this question

Answers

Answer:

The answer is D.

Explanation:

Adding a flex property denotes to that component to use a flex layout for its children.

B it needs a flex value of 1 because that means all of the other compounds will be children of this view

Match the following internet related terms to their definition

Answers

Answer:

1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email

Explanation:

Which will you see on the next line 9, 2, 3.5, 7]

Answers

Answer:

plenipotentiaries. It was by far the most splendid and

important assembly ever convoked to discuss and

determine the affairs of Europe. The Emperor of

Russia, the King of Prussia, the Kings of Bavaria,

Denmark, and Wurttemberg, all were present in

person at the court of the Emperor Francis I in the

Austrian capital. When Lymie put down his fork and

began to count them off, one by one, on the fingers

of his left hand, the waitress, whose name was Irma,

thought he was through eating and tried to take his

plate away. He stopped her. Prince Metternich (his

right thumb) presided over the Congress, and

Prince Talleyrand (the index finger) represented

France? please let me know if this is the answer you were looking for!!

Answer:

I guess 6.......maybe or 1 kinda.....

I am dumb for this question

What is the next line?
>>> tupleOne = [2, 5, 10, 23, 5, 1]
>>> tupleOne.index(5,3)
A)2
B)4
C)1
D)3

Answers

Answer:

4

Explanation:got it right on edg.

Answer: 4

Explanation: got it right on edgen

A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order to help predict the likely job placement outcomes for job seekers based on historical trends and patterns. Which of the following is most likely to be a benefit of the simulation?

A. The computer simulation will be able to include more details and complexity than the real-world job placement process.
B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time consuming to observe in reality.
C. The computer simulation will be able to precisely predict the real-world outcomes for each job seeker.
D. The computer simulation will remove the bias that may arise in the real-world job placement process.

Answers

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

The option that is most likely to be a benefit of the simulation is B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

Computer simulation simply refers to the process through which the behavior or outcome of a physical system can be predicted through modeling.

Since the agency would like to design a simulation so that it can forecast the likely job placement outcomes, then it should be noted that computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/19703126

Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. For instance, if the string argument is 'Four score and seven years ago,' the function should return the number 6. Demonstrate the function in a program that asks the user to input a string and then passes it to the function. The number of words in the string should be displayed on the screen.

Answers

Answer:

To preserve the original format of the answer, I've added it as an attachment

Explanation:

This line defines the function

int countWords(const char ptr){

   

This line initializes number of words to 0

   int words = 0;

The following iteration is repeated until the last character in the argument is reached

   while(*(ptr) != \0){

This checks if current character is blank

       if(*ptr==  ){

If yes, then it increments number of words by 1

        words++;

 }

This moves the pointer to the next character

       ptr++;

   }

This returns the number of words in the argument

   return words+1;

}

The main begins here

int main() {

This declares user input as a character of 200 length

   char userinput[200];

This prompts user for input

   cout << Enter a string: (200 max): ;

This gets user input

cin.getline(userinput, 200);

This passes the c-string to the function and also prints the number of words

cout << There are  << countWords(userinput)<< words;

What problem can enabling compression present when you are using ssh to run remote X applications on a local display?

Answers

Answer:

Compression over ssh connection would increase network latency, using most of its bandwidth to crippling network efficiency.

Explanation:

SSH is a protocol in computer networking used by administrators to manage a remote network. Various commands are run remotely with this connection. The compression command is enabled in the remote network with the -C option in the ssh configuration. Compression over ssh is only favorable over low bandwidth networks.

From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many parameters (weights and biases) needs to be estimated by this model?

Answers

Answer:

40

Explanation:

Given that:

A neural network with 11 input variables possess;

one hidden layer with three hidden units; &

one output variable

For every input, a variable must go to every node.

Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:

= ( inputs + bias) × numbers of nodes

= (11 + 1 ) × 3

= 12 × 3

= 36 weights

Also, For one hidden layer (with 3 nodes) and one output

The entry result for every hidden node will go directly to the output

These results will have weights associated with them before computed in the output node.

Thus; using the formula

= (numbers of nodes + bais) output, we get;

= ( 3+ 1 ) × 1

= 4 weights

weights with respect to input and hidden layer total = 36

weights with respect to hidden and output layer total = 4

Finally, the sum of both weights is = 36 + 4

= 40

Other Questions
What is the atomic mass of an atom that contains 21 protons, 21 electrons, and 25 neutrons How many chimichangas would it take to cross the world twice? help in like 2 mins pls!! 9+-6/-3 How does Du Bois try to convince African Americans to support the war effort? vikings came from a region of four present day countries north of europe called scandinavia which one identified on the map was not a point of origin for vikings Ida B. Wells was a Black female journalist who wrote about the oppression facing African-Americans during this time. Read about her perspective below. Does this document support the ideas of Washington or Du Bois? What evidence from the text supports your opinion? Explain your thinking! What page in Fahrenheit 451 is the word ravenouson? How to calculate net radiation Ill give Brainliest!!! PLease THIS IS MY LAST QUESTION, I HAVE 5 MINUTES LEFT!!! which one is the correct answer and explain why you think that? What do Nelson Mandela and F.W. de Klerk have in common? A They both started apartheid.B They both spent time in prison.C They both won the Nobel Peace Prize.D They both supported racial segregation. What plateau in China separates the Himalaya Mountains from the Kunlun Mountains? Every month Tanesha pays a fixed fee of $10 to use the parking lot at her workplace. She must also pays $2 each day that she parks her car in the lot. If she parks there x days in one month, which of the following represents the amount in dollars that she must pay for using the parking lot that month? What Supreme Court case in 1967 made it possible for people of different races to be legally married for the first time in the United States? 1. To learn information from reading, you should accessO study guides.O alpha state.O audio tapes.O test copies. from the elegant universe what is the lowest possible tempature What is f(x) = x; g(x) = 1/4 x - 4 (Algebra 7th Grade) Please help find the missing measures A substance will take on the shape of an open container if it is aliquid.plasma.gas.solid.