Answer:
flight stimulators are used to train astronaut and design simple air craft
Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop?
The option that is an event is known to be clicking a mouse button.
What is a computer event?An event, in a computing context, is known to be any kind of action that aim to know or is identified by a program and has a good importance for system hardware or software.
Events examples keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
What is the ability for anyone in a society to own private property _____.
Answer:
The ability for anyone in a society to own private property incentivizes people to conserve resources and encourages entrepreneurship.
An example of a processing device would be
Answer:
Central processing unit (CPU) Graphics processing unit (GPU) Motherboard. Network card.
Explanation:
as my study I know this answer I hope it will be help full
Network card, Graphics processing unit, Motherboard, Central Processing unit, Digital Signal Processor, the list goes on.
Which of these inventions where the most iconic and important of the 1970s? Why?
The First Floppy Disk (1971).
The First Digital Camera (1975).
Altair 8000 (1974).
Pong (1972).
Rubik’s Cube (1974).
Answer:
Explanation:
Discussion
I don't think I would choose Rubik's Cube, although I think many people would. It does have a depth of something that moves in all three dimensions, but lot's of things do that. It was more of a craze than something of every lasting value.
Pong is a game. Game software has advanced so dramatically that I don't think you know anyone who has played Pong. You could argue it was a beginning -- but there are others that shared that distinction like Pacman.
Do you know anyone who ever owned an Altair 8000? I don't. by then the Apple 2 was well on its way. And so was Apple which is a huge corporation.
Computer storage has always been forefront in Computer Engineer's minds. I think the First Floppy Disk is likely your answer, although if you choose the digital camera, I don't think you be wrong.
Answer: First Floppy Disk
Which page does a site map usually begin with?
A.shop Page B.Home page C.Index page D.About Page
Answer:
home page
Explanation:
a sitemap is a file where you provide information about the pages, videos, and other files on your site, and the relationships between them
What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP?
TCP/IP parts include the following:
Network accessInternetTransportApplicationWhat is TCP/IP?TCP and IP stands for Transmission Control Protocol and Internet Protocol respectively and are communication protocol that links the application layer to the network layer.
Its primary user include:
BNsMANsWANsRead more about TCP/IP here https://brainly.com/question/11864481
#SPJ1
c. What are the four basic operations in a computer? Define each of them wit help of block diagram.
Answer:Answer: At a fundamental level, computers operate through these four functions: input, output, processing, and storage.
Explanation: Input is something entered into a machine or other system, the act of entering data or other information, or input can also describe giving one's help, advice or thoughts.
Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered.
An example of process is the steps taken by someone to clean a kitchen. An example of process is a collection of action items to be decided on by government committees. noun.
A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.
Explanation:
ANSWER QUICKLY!!
Betty loves surfing online. She clicks on links that lead her to more information on a particular topic. Every time she clicks a new link she sees a
new page of another website. What is this called in terms of usage statistics?
Answer: I did some research I narrowed it down to page link and page break so I think it might be page link but look up page break and you will see what I think it might be that ok hope this helps.
Answer:
Page load
Explanation:
In terms of usage statistics, when Betty clicks on a link and is directed to a new page of another website, it is referred to as a "page load." A page load represents the action of a user accessing a web page and the browser fetching and rendering the content of that page.
How many characters can be store on a disk with a capacity of 1.4mb
Answer: If you want an exact number of characters, this one is really peculiar. A 1.44MB diskette can hold 1.44 x 1000 x 1024 characters, which is 1,474,560 characters.
Explanation:
Explain the working operation of Wi-Fi and hotspots in provision of broadband services
╭── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╮
Hello, This is My explanation!
-----------------------------------------------------
A WiFi hotspot is a location that has been provided to give users the opportunity to use their devices away from their homes. These hotspots became popular over a decades ago at eating establishments such as cafes and are now found anywhere people wish to use them. (malls, airports,hotels,stores,restaurants,etc).
-----------------------------------------------------
Hope this Helped!
╰── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╯
Walter and Layla own neighboring cornfields. Walter harvested 5/8 of an acre of corn on Monday and Layla harvested 3/8 of an acre. How many more acres did Walter harvest than Layla?
Answer:
2/8 or if you have to reduce it, you could do 1/4
Explanation:
Walter = 5/8 on Monday
And
Layla harvested = 3/8
So you just do
5/8 - 3/8 = 2/8
You can check it by doing 2/8 + 3/8 = 5/8
In the event of a fire, the most appropriate failure policy is a policy.
In the event of a fire, the most appropriate failure policy is Fail open policy.
What is fail open policy?A system set to fail open does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important than authentication.
Fail Open systems allow access as opposed to Fail Closed systems that block access. When handling errors, developers need to carefully choose what actions to take.
Learn more about fire policies here,
https://brainly.com/question/15020213\
#SPJ1
You wrote a program to allow the user to guess a number. Complete the code. (Coding program: Python) (20 points!)
Answer:
guess=int(guess)
Explanation:
This is to make the input number an integer so you can compare later on
Answer:
guess = int(guess)
Explanation:
This makes the guess input number an integer
How to type the plus sign +
Answer:
you just did it. its on da keyboard
Explanation:
hold shift and click the equal sign
Shift + = = +
Answer:
For Windows and Mac OS
The easiest way would be to open your Character Map.
Explanation:
Windows: How do I view a Character Map?
To start Character Map and see all the available characters for a particular font, click Start, point to Programs, point to Accessories, point to System Tools, and then click Character Map.
Mac OS: The easiest is to display the Mac OS Characters palette – just press [Command] + [Option] + [T], or [⌘] + [⌥] + [T]. You can then browse through various symbols and special characters, and simply double-click anyone to insert it into your current document.
Create a future concept on how technology will affect communication and on how the way humans will interact with each other
Technology making communication increasingly direct and fast, which can impact the way work is carried out and career development.
How does technology affect the job market?The speed with which communication processes are developed from technological tools, such as the internet, may increasingly impact commercial relations between different nations, in addition to generating more and more automation of tasks and reduction of the physical structures of companies.
Therefore, future projections for technology are related to innovation and profitable and competitive advantages, as in remote work, which is a trend that reduces costs and increases motivation.
Find out more about remot work here:
https://brainly.com/question/26512743
#SPJ1
What is the name of the first screen displayed in a database application that introduces the application
Answer:
This first database was known as the Integrated Data Store, or IDS.
Explanation:
This first database was known as the Integrated Data Store, or IDS. This was shortly followed by the Information Management System, a database created by IBM.
С
List three examples of deadlocks
that
are not related to Computer
system.
Answer:
Hope it helps
Explanation:
The three examples of deadlocks that are not related to a computer-system environment are as given below: Two cars crossing a single lane bridge from opposite directions. A person going down a ladder while another person is climbing up the ladder. Two trains traveling toward each other on the same track.
How many characters can be store on a disk with a capacity of 720bytes
Answer:
184320
Explanation:
256x720
Maria notices that visitors are landing on her site's home page, but they are not
navigating to any of the other pages. It's possible that having her navigation bar in a
non-standard location could be the cause of this.
Choose the answer.
True
False
Answer:
True
Explanation:
If your navigation bar is inaccessible, then visitors won't be able to navigate any further into your website.
What was Ada Lovelace's contribution to computer science?
Answer:
She made the first computer.
Explanation:
Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.
Answer:
She made the first ever computer.
Explanation:
The computer was called the Analytical Engine.
30 POINTS!
Which of the following describes an iteration in a computer program?
a set of instructions that causes a number to be printed
a set of instructions that causes the program to stop running
a set of instructions that can be executed multiple times
a set of instructions that does not execute any code
The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times.
What tells about an iteration in a computer program?In computer programming, the term iterative is known to be the act where product design or its application is made better via consistent review and testing.
Therefore saying that The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times is correct.
Learn more about iteration from
https://brainly.com/question/25754804
#SPJ1
Answer:
C. a set of instructions that can be executed multiple times
Explanation:
Question 9
The district purchases a web resource for the elementary campuses, but you
want to use it with your 9th grade students who need remediation. This would be
allowed because the district has extra licenses.
O True
False?
2.
Select the correct answer.
Consider the following statements:
Pls "It is hot."
Q is "It is dry."
Ris "I am thirsty."
What does the sentence (P^Q)->R mean?
Ο Α.
If it is hot and dry, then I am thirsty.
B.
If I am thirsty and dry, then it is hot.
C.
If it is dry or hot, then I am thirsty.
OD.
If it is hot then I am dry and thirsty.
The structure argument can be given as, with dry and hot weather, it felt thirsty. Thus, option A is correct.
What is the structure of the argument?The argument is held valid and correct with the use of proper relationships between the sentences. The correct correlation depicts the conclusion to the sentence.
P Q means P followed by Q~R means excluding RP^Q means P and QFrom the given argumentative sentences it can be delivered as If it is dry and hot then I’m thirsty. Thus, option A is correct.
Learn more about structure of argument, here:
https://brainly.com/question/14993040
#SPJ1
When replacing a system board for an OEM system, what are the recommended steps to take? Select two options that apply.
When replacing a system board for an OEM system, the recommended steps are A. Run Easy Restore to install the OEM ID. If Easy Restore fails, manually reinstall the OEM ID module while the manufacturing mode is still enabled/detected on the replaced system board.
B. Replace the system board, verify the server boots fully before reinstalling the OEM identity (ID) module.
What is OEM system?OEM means original equipment manufactures. OEM makes computer system and products that are used by another company's end product.
Thus, the correct options are A and B.
Learn more about OEM system
https://brainly.com/question/23988969
#SPJ1
What will be printed to the screen when the following program is run?
Answer:
20
Explanation:
max(my_list) is 5 (finds the maximum value)
sum(my_list) is 1 + 2 + 3 + 4 + 5 = 15 (finds the sum of values)
=> max(my_list) + sum(my_list) = 5 + 15 = 20
Answer:
It will print 20, because you are adding all the values of your list together using the max function, and then adding the actual integers in your list together with the previous number.
give an example of an algorithm in c++ that can be used to avoid car collision using four infra red sensors
Answer:
Since entering the 21st century, the number of vehicles has increased exponentially, and the number of vehicles and drivers has further increased [1]. How to reduce the number of traffic accident deaths and economic losses has become an important issue in the context of such a large number of vehicles [2].
In recent years, some research studies have been made on the collision warning algorithm. The existing collision warning algorithms are mainly divided into two categories, namely, the Safety Time Algorithm and the Safety Distance Algorithm [3]. The safety time logic algorithm compares the collision time between the two workshops with the safety time threshold to determine the safety status. The safety time algorithm mainly uses Time to Collision (TTC) as the research object [4]. The safety distance model refers to the minimum distance between the vehicle and the obstacle, which is also the distance the vehicle needs to maintain to avoid the collision with the obstacle under the current conditions of the vehicle [5].
Explanation:
Assignment Type : Ai using prolog language
• AI Search Techniques
o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems
I. Problem #1
1. Problem#1 Overview
Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).
?-threeSum([3,8,9,10,12,14],27,Output).
Output=[8,9,10];
Output=[3,10,14].
?-threeSum([2,4,8,10,12,14],25,Output).
false.
?-threeSum([2,4,8,12,14,16],20,Output).
Output=[2,4,14].
?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).
Output=[1,2,9];
Output=[1,3,8];
Output=[1,4,7];
Output=[1,5,6];
Output=[2,3,7];
Output=[2,4,6];
Output=[3,4,5].
2. Problem#1 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.
• You must solve this problem twice (depth first search and greedy algorithm)
II. Problem #2
1. Problem#2 Overview
Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.
Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".
Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.
% deletiveEditing(Initial,End).
Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).
True.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).
False.
?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).
True.
?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).
False.
?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).
True.
2. Problem#2 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.
This algorithm should be implemented in prolog.
Answer:
Explanation:
Assignment Type : Ai using prolog language
• AI Search Techniques
o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems
I. Problem #1
1. Problem#1 Overview
Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).
?-threeSum([3,8,9,10,12,14],27,Output).
Output=[8,9,10];
Output=[3,10,14].
?-threeSum([2,4,8,10,12,14],25,Output).
false.
?-threeSum([2,4,8,12,14,16],20,Output).
Output=[2,4,14].
?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).
Output=[1,2,9];
Output=[1,3,8];
Output=[1,4,7];
Output=[1,5,6];
Output=[2,3,7];
Output=[2,4,6];
Output=[3,4,5].
2. Problem#1 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.
• You must solve this problem twice (depth first search and greedy algorithm)
II. Problem #2
1. Problem#2 Overview
Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.
Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".
Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.
% deletiveEditing(Initial,End).
Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).
True.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).
False.
?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).
True.
?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).
False.
?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).
True.
2. Problem#2 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.
This algorithm should be implem
Database queries is an example of
Answer:
A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.
SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.
Five types of SQL queries are:
1) Data Definition Language (DDL).
used to define and modify the structure of a database.
2) Data Manipulation Language (DML).
used to manipulate (change) the data in the database.
3) Data Control Language(DCL).
used for access control and permission management for users in the database.
4) Transaction Control Language(TCL).
used for maintaining consistency of the database and for the management of transactions made by the DML commands.
5) Data Query Language (DQL).
used for performing queries on the data within schema objects.
Question 3 of 25
What does the number of hertz measure in a CPU?
A. How quickly the data in RAM can be read, changed, and
overwritten
B. How fast a CPU can process data, indicating performance
O c. How many bits are fed into a CPU in a certain amount of time
D. How much data is stored magnetically and is used for long-term
How fast a CPU can process data, indicating performance does the number of hertz measure in a CPU. Hence, option B is correct.
What is process data?Process data is information about a business process that builds up in an XML document during the course of the process, in accordance with configured instructions in the BPML.
a stock trading program that creates a straightforward graph from millions of stock data points. Customers' search histories are used by an online retailer to suggest related products. A digital marketing company develops location-specific ads using demographic information about consumers.
Batch processing, real-time processing, and online processing are the models. Data processing that is done in batches is known as batch processing. This indicates that each item of data is processed separately.
Thus, option B is correct.
For more information about process data, click here:
https://brainly.com/question/30094947
#SPJ2
Benny is writing a program to design t-shirts. Which of the following correctly adds a new instance of style?
newStyle = "Style"
newStyle = Style()
newStyle: Style()
newStyle + Style()