The online underground is used _____. Select 3 options.

Answers

Answer 1
You forgot to put the options

Related Questions

help pls (╥﹏╥) Activity 1

Create a flowchart that will display the Area of a circle. The circle has a Radius of 5cm. It has a constant

value of PI of 3.14. Follow the examples from the Flowchart Example No. 1-4 to be able to create your own

flowchart. Also follow the given rubrics below.

Activity 2

Create a flowchart that will display the Area of a rectangle. The formula of Area of rectangle is A = l x

w. Where A stands for area, l for length and w for width. Follow the examples from the Flowchart Example

No. 1-4 to be able to create your own flowchart. Also follow the given rubrics below.

Activity 3

Create a flowchart that will ask the user to enter a Gender. If the user enters a value of “M” the flowchart

will display a message notification saying “You’re a Male”. On the other hand, If the user enters “F” a message

notification will display “You’re a Female”. Follow the examples from the Flowchart Example No. 1-4 to be

able to create your own flowchart. Also follow the given rubrics below.​

Answers

There are several ways, the prototype of an actual program can be represented; one of them, is by making use of flowcharts

Flowcharts show the steps taken to execute a task, graphically.

(a) Area of a circle

The flow of the flowchart, goes as thus:

StartLet Radius = 5Let PI = 3.14Calculate Area = PI * Radius * RadiusPrint AreaStop

(b) Area of a rectangle

The flow of the flowchart, goes as thus:

StartInput lInput wCalculate Area = l * wPrint AreaStop

(c) Area of a circle

The flow of the flowchart, goes as thus:

StartInput GenderIf Gender == 'M"Print "You're a Male"elsePrint "You're a Female"Stop

See attachment for the required flowcharts

Read more about flowcharts at:

https://brainly.com/question/17373574

Choose the term that best completes each sentence.
______ is (are) the insights customers share about their experience with a product or service. It can be
compiled, and trends identified through the use of ______



Answer is customer feedback, analytics

Answers

Answer:

First is customer feedback, second is analytics

Explanation:

1. feedback 2. analytics

I HATE THESE :/ PLS HELP

Answers

Answer:

0????????????????????

Explanation:

UHM,,, Isn't it 0 in both of them? I'm not sure, but... yeah

Answer:

10- binary

0.1 -decimal

what kind of tag will give additional info about your webpage​

Answers

Answer:

The LINK tag

Explanation:

Answer:

The LINK tag

Instead of producing a clickable link, the <link> tag tells the browser that there is some additional information about this page located in a different file.

Consider the following method, which is intended to return true if at least one of the three strings s1, s2, or s3 contains the substring "art".; Otherwise, the method should return false.

public static boolean containsArt(String s1, String s2, String s3)
{

String all = s1 + s2 + s3;
return (all.indexOf("art") != -1);

}

Which of the following method calls demonstrates that the method does not work as intended?
Select one:
a. containsArt ("rattrap", "similar", "today")
b. containsArt ("start", "article", "Bart")
c. containsArt ("harm", "chortle", "crowbar")
d. containsArt ("matriculate", "carat", "arbitrary")
e. containsArt ("darkroom", "cartoon", "articulate")
a. containsArt ("rattrap", "similar", "today")

This is because the "art" is found as a combination of "similar" and "today". That is not as intended based upo

Answers

There are several ways to manipulate strings; this includes concatenating and iterating through strings.

The method call that does not work as intended is: (a) containsArt ("rattrap", "similar", "today")

From the question, we understand that the method would return true if any of s1, s2 and s3 contain the string "art"

From the list of given options, none of the strings in the method call (a) contains "art". i.e. "rattrap", "similar" and "today" do not contain "art"

But the method call would still return true.

When "rattrap", "similar" and "today" are concatenated on the first line of the method, the new string  "rattrapsimilartoday" contains "art".

Hence, the method call that does not work as intended is: (a) containsArt ("rattrap", "similar", "today")

Read more about strings at:

https://brainly.com/question/16024994

                              Answer:

There are several ways to manipulate strings; this includes concatenating and iterating through strings.

The method call that does not work as intended is: (a) containsArt ("rattrap", "similar", "today")

From the question, we understand that the method would return true if any of s1, s2 and s3 contain the string "art"

From the list of given options, none of the strings in the method call (a) contains "art". i.e. "rattrap", "similar" and "today" do not contain "art"

But the method call would still return true.

When "rattrap", "similar" and "today" are concatenated on the first line of the method, the new string  "rattrapsimilartoday" contains "art".

Hence, the method call that does not work as intended is: (a) containsArt ("rattrap", "similar", "today")

Read more about strings at:

brainly.com/question/16024994

write an assignment that stores the remainder obtained from dividing 87 and 8 in the variable leftover (computer science python)

Answers

Answer:

answered below

Explanation:

class JavaCode :

   def main(self, args) :

       # write an assignment that stores the remainder obtained from dividing 87 and 8 in the variable leftover (computer science python)

       leftover = int(87 / 8)

       # This displays the leftover variable

       print(leftover)

if __name__=="__main__":

   JavaCode().main([])

Which formula is a simple formula?
O =E10/5+1
0 -5+A1*B1
O =C3+10-E3
0 =10-(A3-D13)

Answers

Answer:

O =C3+10-E3

Explanation:

Only addition and subtraction :D

Which is better Mac os, Windows or Linux?​

Answers

Answer:

[tex]Windows \: or \: Linux.......[/tex]

Depends on what are you gonna do with it. Though all three are widely used, there are significant differences between Linux vs MAC vs Windows. Windows is dominant over the other two as 90% of users prefer Windows. ... Linux is free, and anyone can download and use it. MAC is costlier than Windows, and the user is forced to buy a MAC system built by Apple.

If you were to design a real robot that would be responsible for cleaning up trash, what 5 (or more) commands would you give it and what would each one do?

Answers

Los 5 comandos de mi robot limpiador serían: Classify, recycle, sweep, washing, and alarm.

A robot is a machine that is characterized by being controlled by a computer and programmed to move, manipulate objects and carry out work while interacting with its environment.

The 5 commands with which I would configure my robot to clean the garbage would be:

Classify: To classify the garbage, deposit the recyclable wastes and those that are not in different bags.Recycle: Take recyclable objects and process them inside to turn them into new objects such as recycled sheets of paper.Sweep: For the robot to sweep a surface and remove all kinds of dirt.Washing: This function would be to clean the dirt from a car, motorcycle, or bicycle with a jet of water under pressure.Alarm: This functions as a reminder of the days and hours in which the garbage truck passes to take the garbage to the right place.

Learn more in: https://brainly.com/question/1935813

Ways on how to conserve energy.

Answers

Here are some ways to start conserving energy yourself:

Adjust your day-to-day behaviors.

Replace your light bulbs.

Use smart power strips.

Install a programmable thermostat.

Use energy efficient appliances.

Reduce water heating expenses.

Install energy efficient windows.

Upgrade your HVAC system.

Brainliest if right please answer

Answers

Answer:

b

Explanation:

hope it's helps you greatly :>

what is the review of Rihanna feature of MS PowerPoint ​

Answers

rivebkovfscuindtbkbgn

Company A acquired Company B and they realize that their standard security policy documents do not match. They escalate this issue to the company’s central Security team, who implements a plan to formalize security strategy, high-level responsibilities, policies and procedures around security of both companies.Which security principle is illustrated in this example?

Answers

There are various security principles employed by firm to ensure the smooth running of business and guard against risk.

The security principle illustrated in this example is Governance

Governance is commonly described as an oversight role. It is simply known as a way through which firms manage and contain business risks

In firm governance, there is high activism among shareholders and also high scrutiny from the regulatory bodies. The corporate boards and executive teams looks onto governance issues a lot

Conclusively, Firm governance process uses these elements such as definition and communication of corporate control, key policies, enterprise risk management, etc to boast cooperate governance.

Learn more from

https://brainly.com/question/25101437

write a short note on Programmable register​

Answers

Answer:

A processor register (CPU register) is one of a small set of data holding places that are part of the computer processor.

A register may hold an instruction, a storage address, or any kind of data (such as a bit sequence or individual characters). Some instructions specify registers as part of the instruction. For example, an instruction may specify that the contents of two defined registers be added together and then placed in a specified register.

A register must be large enough to hold an instruction - for example, in a 64-bit computer, a register must be 64 bits in length. In some computer designs, there are smaller registers - for example, half-registers - for shorter instructions. Depending on the processor design and language rules, registers may be numbered or have arbitrary names. Here you go ;)

which type of memory is permanently installed on your computer and attached to the motherboard?

Answers

The type of memory which is permanently installed on your computer and attached to the motherboard is: read-only memory (ROM).

A computer can be defined as an electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an information (output) that could be used by an end user.

Basically, the main parts or components that make up a computer include the following;

Central processing unit (CPU).Input devices (peripherals).Output devices (peripherals).Motherboard.Memory and storage device: these are random access memory (RAM) and read-only memory (ROM).

A memory refers to the available space or an electronic device that is typically used for the storage of data or any computer related information.

The two (2) main types of memory used on a computer;

I. Random access memory (RAM).

II. Read only memory (ROM).

A read-only memory (ROM) can be defined as a type of memory is designed and developed to be permanently installed on a computer and attached to the motherboard.

Read more: https://brainly.com/question/24247395

Which way do you swipe in the android os to access shortcuts?

Answers

Answer:

You can swipe from right to left to access shortcuts or the notification bar in Android OS.

Explanation:

So you can swipe in the android os and do it from the home screen of any smartphone.

The way through which you can swipe in the android OS to access shortcuts from right to left in the notification bar. You can swipe from right to left for more shortcuts.

How can one access shortcuts on Android?

One can access shortcuts on Android in the following ways:

On your device, open the Settings app.Tap Accessibility.Select the application that you want to use with a shortcut.Select the shortcut setting, like the TalkBack shortcut or Magnification shortcut.Choose a shortcut.

The option of gestures and navigation in the android would definitely assist you in this process of accessing shortcuts through swiping. Swipe from right to left for more shortcuts in the notification bar. You can swipe from right to left for accessing more shortcuts in androids OS.

Therefore, you can swipe from right to left for more shortcuts is the way through which you can swipe in the android OS to access shortcuts.

To learn more about Android OS, refer to the link:

https://brainly.com/question/4121093

#SPJ6

!!help please!!
In MakeCode Arcade, what does each character in a set of data for an image represent?​

Answers

Answer:

One pixel

Explanation:

Drag images onto the page to add them (only . png is currently supported). Use the toggle to switch between sprite sheets with several images and single sprites in an image. Equally, sized sprites should not have any gaps between them in spritesheets. Thus, option B is correct.

What Make Code Arcade set data for an image?

To create a new game, open the Make Code Arcade editor and choose New Project. You will notice a green on start block in the editor workspace as soon as the editor loads. In the beginning, we want to make the game's main character, in this case, a paddle.

A complicated type called a sprite enables an image to appear on the screen and move about. An image that a sprite carries can be moved and located using its functions.

Therefore, Sprites can bump into one another, flip, and overlap. To make animations, sprites can also include several image frames.

Learn more about data here:

https://brainly.com/question/29409933

#SPJ2

How will I go about conducting the investigation on fake news

Answers

A person can go about conducting the investigation on fake news by:

Making personal researchMaking news verificationsComparing news with reputable outlets, etc

Fake news are those news or pieces of reporting which contains false information which is misleading to the general public.

With this in mind, it is important to verify information which you see anywhere and compare them to more reliable news outlet and also to make personal research which would be done without bias.

Read more here:

https://brainly.com/question/24560932

Testout Network Pro 5.8.7 Troubleshoot IP Configuration 2 & 5.8.8 Troubleshoot IP Configuration 3

You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.

In this lab, your task is to complete the following:

-Use the following troubleshooting tools to diagnose the problem in the network:

-the ping, ipconfig, or tracert command utility

-the network and sharing center in the windows 10 or windows server 2016 operating system

-the DHCP server console in the windows server 2016 operating system

Fix the problem at the workstation, the DHCP server, or both as necessary.

Use the troubleshooting tools to confirm the resolution of the problem

Answers

Answer:

I didn't understand your question ⁉️

what happens to runt frames received by a cisco ethernet switch?

Answers

Answer:

thank you sa point labyu stay safe

write the code to call the function named send_signal. there are no parameters for this function.

Answers

*Assuming JavaScript

Answer:

function send_signal() {}

send_signal() // calls the function

Explanation:

the best program to use for keeping track of students enrolment details is ​

Answers

Answer:

Edmatix. Edmatix helps to record school related information for example student fees, student ID or attendance count. It is a cloud based software meaning you can backup the data much more easier.

1. Which tool is used for hardware to stand on to prevent static

Answers

Answer:

An anti-static mat tool.

Explanation:

To prevent, static electricity from building up an anti-static mat tool is used. This is the tool that is used to prevent static electricity from building up. However, if you don't have the anti-static mat, an antistatic wrist strap can be used.

What is the very first step that should be taken when performing work with a computer?

Answers

Answer:

You should power down the system and unplug it.

Your network has two Distribution layer switches, Switch and Switch, connected through trunk ports on each of their respective Gi 0/1 interfaces. In addition, you recently connected an Access layer switch to the network, SwitchC. SwitchC has several workstations and a server belonging to VLAN 20. Because the resources on VLAN 20 are exclusive to the local workstations, you need to restrict VLAN 20's traffic from passing though the network on the trunk ports of SwitchC. In this lab, your task is to complete the following: Remove only VLAN 20 from the allowed VLANs on SwitchEs GigabitEthernet 0/1 and GigabitEthernet 0/2 interfaces. Save your changes to the startup-config file.

Answers

Answer:

thank you sa point labyu stay safe

Need Help Please

Steps are in the picture.
This is for a coding class that I am taking.

I did manage to get the first step done but all of the other ones are confusing to me. I really don’t know how to write them properly. I only knew how to write the first one.

Answers

Answer:

1. siblings + 1

2. numberOfPizzas * pizzaCost

3. alienGreeting + alienGreeting2

4. color1 === color2

5. value1 - value2

6. console.log(gradeAverage === gradeAverage2)

7. numberToString + numberToString2

8. numberOfStudents / numberOfClassrooms

9. console.log(carSpeed === truckSpeed)

what does it mean that the right mouse button is context-sensitive?

Answers

Answer:  

What does it mean that the right mouse button is "context-sensitive"? The menu items available will differ depending on the context of what you are right-clicking . You would like to add some frequently used buttons to the Quick Access Toolbar

Explanation:

the 5.25 floppy disk was a significant advancement because:

Answers

Answer:

Explanation:

The storage on a hard drive was very small in those days. The 5.25 floppy allowed data created by a program to be saved so that it could be used again later. In fact, it also allowed other uses to make copies of the data because networks were very much less sophisticated as well and so direct copying (station to station) wasn't always possible.

starting a computer loads system software to provide what?

Answers

Operating system
Booting
Cold Boot
Warm Boot
BIOS

!! Please help quick !! What is one benefit of writing a modular program over writing a similar program without using modules?​

Answers

The code will be more organized, D.
Other Questions
0.This/be/Hue?1.She/live/in Hue BRAINLIEST ASAP! Please someone help Which is a valid velocity reading for an object?45 m/s45 m/s north0 0 m/s south0 m/sSave and ExitNextSuntMark this and retum help me pls ASAP I need it in 5mins Roots:hold the plant in the groundmake food using water and mineralscarry water to leaveshelp plants stand up straight how do you pay taxes guys pls help me!!!!!! what happens to most policy solutions formulated in the texas legislature? Topic: Explain the advantages and disadvantages of using social networks. Do you think that interpersonal relationships have deteriorated due to the excessive use of these means? Velocity has both speed and direction, so it is a what Which of these is NOT true about Alaskan Natives during the Baranov Era?(a) Natives provided most of the labor force for the Russian colony(b) Schools were started for Native children(c) Stability allowed Aleut and Alutiig populations to grow (d) Russians relations with Native women was regulated to prevent abuse can someone solve this for me Help meeeeeeeeeeeeeeee Giving brainliest Write an original sonnet using the traditional Shakespearean sonnet form.Hey struggling with this prompt a little bit so I would appreciate it if anyone could help. Thanks in advance! Need help! How can I word it to where it sounds less repetitive? elementary math! please help! will mark brainlist What was the major problem with the Articles of Confederation that caused the delegates to form the Constitution instead?a.The government under the Articles of Confederation was weak and ineffective, unable to do anything without the agreement of nine out of thirteen sovereign states.b.The government under the Articles of Confederation was a direct democracy that provided too much power to the people.c.The government under the Articles of Confederation promoted slavery.d.The government under the Articles of Confederation placed too much power in the hands of the President. explain battle of Stalingrad Sam has saved 200 sand dollars and wants to give them away equally to n friends. Write an expression to show how many sand dollars each of Sam's friends will receive. assume you are the principal of your school.write a letter to the parents of your school children requesting them to pay their school fees before the examination commences.