Answer:
W
Explanation:
W
Answer:
a + b - a|c = 7
Explanation:
"The output of bitwise OR is 1 if at least one corresponding bit of two operands is 1. In C Programming, bitwise OR operator is denoted by |."
-Ayush Rikhra
Good Luck!
1 Type the correct answer in the box. Spell all words correctly. Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to interact and communicate effectively with people. Reset Next
Answer:
interpersonal skills
Explanation:
please rate
please help
match the features with the software
Word Processor, Spreadsheet, Database
- addiction of images, drawings, tables and graphics to text
- centralized data management
- data security
- digital version accounting sheets
- supports multiple users for adding data simultaneously
- visual representation of data
- digital version of a typewriter
Answer:
word processor- addition of images, drawing tables, and graphics to texts and digital version of a typewriter. spreadsheet- digital version of accounting sheets and visual representation of data. database- centralized data management, data security, and supports multiple users for adding data simultaneously
Just switch the two I got wrong and you'll get the correct answers. :)
HELP PLEASE!
I dowloaded this app and it gave me a virus. DOES ANYONE HAVE ANY IDEA HOW TO DELETE IT? I have an apple laptop and I don't know how. My laptop send me a message telling me a have a virus and this laptop has MANY IMPORTANT FILES. PLEASE HELP ASAP. I'LL GIVE BRAINLIEST. DONT GIVE LINKS OR LEAVE IT BLANK.
Answer:
It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.
Explanation:
Define computer memory and write its type
Answer:
Computer memory is a generic term for all of the different types of data storage technology that a computer may use, including RAM, ROM, and flash memory. ... Another way that computer memory can vary is that some types are non-volatile, which means they can store data on a long term basis even when there is no power
Answer:
Computer memory is a generic term for all of the different types of data storage technology that a computer may use, including RAM, ROM, and flash memory. Some types of computer memory are designed to be very fast, meaning that the central processing unit (CPU) can access data stored there very quickly.
Explanation:
Give five examples of physical networking.
Answer:
Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN), Personal area network (PAN), Others
Explanation:
Others can be classified as peer to peer, bluetooth
What are the 3 P's of Storytelling? (select 3 answers)
Pantomime
Place
Predicament (Problem)
Percentage
People
What are some of the functions in the Consolidate dialog box? Check all that apply.
Average
Count
Frequency
Maximum
Minimum
Mode
Sum
Answer:
sum average and count is the answer
What is the primary language used to write web content and is the default format for Outlook messages?
Rich Text Format
Plain Text
HTML
PHP
Answer:
I think its plain text but I might be wrong
60 points for this!!!!!!!!!!!!!!!!
Answer:
you can convert that to word document and aswer and edit every thing
Explanation:
Explanation:
it is clearly not visible
please send me again
You are a developer for a news, entertainment, lifestyle, and fashion website. User traffic has steadily increased month-over-month, and you are now tasked with cost optimizing the website. The website is currently served from an EC2 instance that is part of an auto-scaling group behind an elastic load balancer. Your manager and CTO have approved a complete re-structuring of the websites architecture in order to accommodate future growth. How would you optimize your application in the MOST cost-effective way
Answer: • Move website to a serverless application.
• Using of S3 to host the website.
• Using Lambda and API Gateway in order to support the dynamic API requests.
Explanation:
Based on the information given in the question, in order to optimize the application in the most cost-effective way, one will have to:
Move website to a serverless application.
• Using of S3 to host the website.
• Using Lambda and API Gateway in order to support the dynamic API requests.
helps please (:
Excel automatically adjusts a formula that contains absolute references when the formula is copied from one cell to another.
Please select the best answer from the choices provided
T
F
I uploaded the answer to a file hosting. Here's link:
bit.[tex]^{}[/tex]ly/3a8Nt8n
Use parallel and highway in a sentence
Answer:
The road ran parallel to the highway, with the Uncompahgre River separating the unpaved road from the main thoroughfare to the east.
Answer:
QUESTION:
Use parallel and highway in a sentence
ANSWER:
We were on the highway parallel to the train tracks.
Explanation:
Hope that this helps you out! :)
If any questions, please leave them below and I will try my best and help you.
Have a great rest of your day/night!
Please thank me on my profile if this answer has helped you!
Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?
A. Direct access
B. Programmatic access
C. Query builder
D. User interface access
Answer: C. Query builder
Explanation:
Based on the information given in the question, since Gina does not know how to write SQL commands and no forms have been created, the best option to generate the report is a query builder.
With the Query Builder, Gina can be able to search and also select and filter the database objects, while also creating relationships between the objects, and save queries despite not having any SQL knowledge.
Which task can be completed using both the Shape Fill and Shape Outline panes of PowerPoint?
O adding color
O adding weight
O adding texture
O adding a picture
Answer:
A.) adding color
Explanation:
just did it on edg 2021
Answer:
A. Adding color
Explanation: Just did it and got it right on Edg 2021
What principle of animation helps facial features to be noticed?
A)Arc
B)Exaggeration
C)Solid Drawing
D)Squash and Stretch
the answer is Squash and Stretch we use this when animating faces
-scav
Using the simple alphabet code below, you will decode and encode the message. Write the Full
Message on the line given. Your spaces have been indicated.
1
3
5
6
7
8
9
10
12
13
2
b
4
d
11
k
a
с
e
h
i
m
f
19
j
23
1
25
14
15
16
17
18
20
21
22
24
26
Z
n
O
p
q
r
t
u
V
w
х
у
Answer:
acefghijlmb2d4k1113589136510waynopqrtuvx2261415161718202122232425
Explanation:
Match each role to the corresponding web development task.
Answer:
1. Art director: selecting color palettes.
2. Web project manager: creating budget spreadsheets.
3. Usability lead: researching target audiences.
4. Developer: coding.
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.
The various role performed during the web development process (task) includes;
1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.
2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.
3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.
4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.
Which of the following statements about version control are true? Select 3 options.
Early version control systems needed to use locks to keep files synchronized, but newer version control systems do not use locks at all.
With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.
Version control systems can only be used by teams of developers, rather than individuals.
Git and Mercurial are examples of distributed version control systems.
In a centralized version control system, the project files are stored in a repository or database on a server
Answer:
In a centralized version control system, the project files are stored in a repository or database on a server
Git and Mercurial are examples of distributed version control systems.
With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.
Explanation:
Your Welcome!
The statements about version control that are true include the following:
B. With distributed version control, multiple copies of the entire project are maintained on the developers’ computers.
D. Git and Mercurial are examples of distributed version control systems.
E. In a centralized version control system, the project files are stored in a repository or database on a server.
Version control is also referred to as source control and it can be defined as a process through which changes to a file, set of files and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future. A common example of a version control system that is used by software developers across the world is Git.
In Computer science, there are two main types of version control system and these include:
I. Distributed version control system.
II. Centralized version control system.
Basically, the statements about version control that are true include the following:
Multiple copies of an entire project can be maintained on a developer's computers through the use of distributed version control.Git and Mercurial are common examples of distributed version control systems.Project files are stored in a repository or database on a server in a centralized version control system.Read more on version control here: https://brainly.com/question/14213984
I just played slither.io and got a length of 50632! Can you beat that? http://slither.io
I WANNA SEE YOU BEAT ME ¯\_(ツ)_/¯ if my name is on the leader board it's kirishima
Answer:
Nice
Explanation:
Answer:
well yes
Explanation:
can you plz tap the thanks button and rate 5 stars thx
Need answer ASAP. I’ll mark brainliest if correct
Answer:
A boy IS-A person.
Explanation:
it sounds more convincing.
What is one feature of flexographic printing?
O printing on plastic
O changing images
O raised lettering
O beautiful photographs
Answer:
A is the answer thank me later
A multiuser operating system specifically allows _____.
multiple users concurrently
multiple processes concurrently
only one person at a time
only one process at a time
Answer:
multiple users concurrently
Explanation:
A multiuser operating system specifically allows multiple users concurrently.
Please help me!
The assignments option in my Microsoft Teams account is not visible. What should I do now?
some things you can try
sign out of teams and back in
refresh the page by pressing ctrl+r
try a different browser
contact Microsoft
-scava
When someone asks, Is this information specific enough?, he or she is interested in more _____.
accuracy
logic
breadth
precision
Answer:
precision
Explanation:
In simple English precise means exact or something specific
Help me please!!! (45 points)
i think it was focus that was used in this image
-scsav
The variable blocks allow you to create variables and use them in a program. Variables can store numbers or strings. Scratch supports both global and object-specific variables.
Question 4 options:
Answer:
i think is D
Explanation:
if i wrong correct me
and pa brainlies din po k
Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.
Answer:
When is this due?
Explanation:
I will write it
he superclass Student contains: a constructor that accepts a String corresponding to the name of the school the student attends a toString method that returns 'student at X' where X is the name of the school the student attends. Write a public subclass HighSchoolStudent, based on Student, which contains: a constructor accepting a String which is used as a parameter to the superclass constructor a toString method that returns 'high school student at X'. This method must use the toString method of its superclass.
Solution :
public [tex]$\text{class}$[/tex] Student {
[tex]$\text{protected String}$[/tex] school[tex]$;$[/tex]
public [tex]$\text{Student}$[/tex](String school) {
[tex]$\text{this.school}$[/tex] = school;
}
public String [tex]$\text{toString}()$[/tex] {
return [tex]$\text{"student at"}$[/tex] + school;
}
}
HighSchool[tex]$\text{Student.java}$[/tex] :
public class [tex]$\text{HighSchoolStudent}$[/tex] extends Student {
public [tex]$\text{HighSchoolStudent}$[/tex](String school) {
super[tex]$\text{(school)}$[/tex];
}
public String [tex]$\text{toString}()$[/tex] {
return [tex]$\text{"high school"}$[/tex] + super.[tex]$\text{toString}()$[/tex];
}
}
Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into the company, and she’s heard that you have some cybersecurity skills that could prove useful. Cindy suspects that there are some hackers who are using SQLi to launch attacks and steal information from one of the databases and also to hijack users’ sessions and take over certain accounts. Can you use your cybersecurity penetration testing skills with SQLi to track down the hackers?
Cindy will need for you to submit a report with recommendations on your findings, which is pretty typical for others in your industry with this type of role.
Write a security assessment report that will be sent to the technical team and senior management, and specifically Cindy, the CTO. Your report should be approximately 3 pages and address the following:
Summary of Findings (overview of vulnerabilities found)
Types of tests used (with details on outcomes)
Impact of Threats
How any parts of the CIA Triad could be compromised with the vulnerabilities
Does OWASP have any recommendations that you can apply?
Executive Summary (what recommendations would you give to the CTO)
Present potential solutions, mitigations, or other
suggestions for reducing or eliminating the vulnerability
Answer:
I'm a cyber security enthusiast
Explanation:
How do you want the report delivered to you?
Data Warehouse: Mastery Test
CMS
ouronzarana
Select the correct text in the passa
Which phrase suggests that Dan wants to ensure accurate data in the data warehouse?
Dan and his team are in the process of finanga data warehouse for their organization
they stress on the importance of clear communication. Dan and his team create a test
arrange training for the business users of the data warehouse
Reset
Ne
Answer:
The phrase "create a test plan for testing data" suggests that Dan wants to ensure accurate data in the data warehouse
Explanation:
The phrase "create a test plan for testing data" clearly indicates that Dan and his team are inclined towards creating an accurate data base in the data warehouse as they plan to check/test the data before storing in the data bank.