With "no" experience? With help, yes! Although with nothing, it would be almost impossible.
The ideal hash function:
A. Should be unfeasible to find two inputs that map to the same output
B. Should be unfeasible to learn anything about the input from the output
C. Basically we don’t want people to figure out what was said
D. All the above
Why can the internet keep growing as more devices are added without decrease in performance?
Answer:
Explanation:
There may be many reasons why your internet speed is slow. Internet use requires a reliable connection between your device and the destination, which may be a server that is physically located on the other side of the world.Your connection to that server could pass through hundreds of devices on its journey. Each one of these is a potential failure, or weak point. If one point along this path isn’t functioning optimally, this can significantly affect your internet experience.
What is the difference between soft copy output devices and hard copy output devices
the output printed on the paper is called hardcopy output. some examples are printer and plotter.
the output produced on display screen and audio sound is called soft copy output. some examples are moniter and speaker.
Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I really need a quick and correct response. Pls support.
Answer:
i think its 3337
Explanation:
How did New York Governor Hugh Carey handle Sostre’s situation?
Answer:
The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.
Explanation:
Answer:
The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.
Explanation:
correct on e2020 Dawg
What are possible challenges of cyberbullying
Answer:
so,e challenges of cyber bullying is that,it could be a random person bullying u and u won't know who it is,another challenge of cyber bullying is that they can blackmail u or pretend to be u or threaten u
Answer:
Possible challenges of cyberbullying have to do with nonbelievers, or people who do not think cyberbullying is a real problem. Technology makes it hard to stop bullies, and some people do not want to take responsibility.
Which function will find the difference of 15 and 3 and return 12 when the main part of your program has the following line of code?
answer = subtract(15,3)
def Subtract(numA, numB):
return numA - numB
def Subtract(numA, numB):
return numB - numA
def subtract(numA, numB):
return numA - numB
def subtract(numA, numB):
return numB - numA
Answer:def subtract(numA, numB):
return numA - numB
Explanation:
i got the right answer but i was willing to get it wrong for the right anwser for you
The function that will find an accurate difference of 15 and 3 and return 12 when the main part of your program has the following line of code is as follows:
def subtract(numA, numB):return numA - numB
Thus, the correct option for this question is C.
What is the significance of the output of the program?The significance of the output of the program is understood by the fact that it delivers some values or concepts to the user with respect to the instruction he/she is given to the computer for processing. The output of the program is very specific in nature.
According to the question, you have to assume the value of number A as 15 and number B as 3. So, when you find the difference between these numbers, you get an output of 12.
You must follow the process as follows while framing a program:
def subtract(numA, numB):return numA - numB
Therefore, the correct option for this question is C.
To learn more about Output of a program, refer to the link:
https://brainly.com/question/18079696
#SPJ2
Which of the following You tubers uses the word "flip" as a curse word
A. Unspeakable
B.09Sharkboy
C. Moosecraft
D. All of the above
First correct answer get brainiest!
What action demonstrates unethical behavior?
A.
working overtime
B.
completing your work ahead of time
C.
taking credit for another person’s work
D.
keeping a tab on your organization’s carbon footprint
E.
leaving office on time
Answer:
taking credit for another person’s work
Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
What is Unethical behavior?When a person, a professional, or an industry acts in a way that is deemed unethical because it goes against social norms, that behavior is referred to as unethical behavior.
Politicians, businesses, professions, and individuals all have the potential to act unethically.
There are other instances of deliberate deception, but they serve as illustrations of how damaging deception can be when it is used to violate someone's rights or security.
Therefore, Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
To learn more about Unethical, refer to the link:
https://brainly.com/question/10174825
#SPJ2
What are some options available in the Spelling and Grammar Checker? Check all that apply.
Redo
Undo
Ignore All
Ignore Once
AutoFormat
Add to Dictionary
Readability statistics
Answer:
ignore all
ignore once
add to dictionary
Explanation:
took the assignment on edge2020
agree and tell why becoming a priest/nun is an honorable job PLEASE ASAP
what is a cloud in the world of computing
Answer:
In the simplest terms, cloud computing means storing and accessing data and programs over the internet instead of your computer's hard drive
Explanation:
girls question
who wants to go out ;p
Answer: I do
Explanation: *P.S.* I'm a Boy
Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
A.
popular pizza chains in the world
B.
most popular AND pizza chains AND worldwide AND 2019
C.
the most popular pizzas “in the world today” AND 2019 AND chains
D.
2019 worldwide pizza chains “most popular in the world”
Answer:
D
Explanation:
A peripheral can be used to tell a computer to complete a specific task.
A) True
B)False
Answer:
A. true
Explanation:
because you can complete it without it mistakes if your using an computer but if you use an paper you will make mistakes over and over
how do you give brianliest
Answer:
When you ask a question in brainly, two helpers will answer it, then on each answerer you'll find "mark as brainliest" button which looks like a crown.
Hope this helps :)
any song recommendations, pls dont say 6ix9ine or lil pump
I actually do have one tho. Try Megan Tha Stallion.
Answer:
smash mouth "all star" is my fave or Imagine Dragons "Whatever it Takes"
Explanation:
Part B
How would you classify a network formed by connecting two MANs together?
В І у хх Font Sizes А • А
____ a British mathematician devolved the concept of a programmable digital computer and worked with Ada Lovelace to design the first mechanical computer the Analytical Engine
A William Shockley
B Grace Hopper
C Charles Babbage
D Bill Gates
someone pls answer asap
Answer:
C: Charles Babbage
Explanation:
Charles Babbage
Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines.
The analytical engine is a comprehensive robotic computer system that's been fully programmed as well as automatically controlled, and the further discussion can be defined as follows:
The computer pioneer Charles Babbage (1791-1871), designed two engine classes, different engines as well as analytical engines.He was indeed the brain behind ideas and therefore is considered one of the best on two different computers.A British mathematician Charles Babbage has invented the notion of the digital programmable computer and has been working with Ada Lovelace to design an analysis engine's first machine.Therefore, the final answer is "Option C".
Learn more:
brainly.com/question/23422991
Which item cannot be inserted into a header or footer of a document?
Answer:
All the above items can be inserted into either a header or a footer.
Please mark brainliest!
The items that cannot be inserted into a header or footer of a document is all the above items can be inserted into either a header or a footer. The correct option is d.
A document is a type of information that can be stored electronically. Page numbers are generated automatically. Tables with columns and rows, pictures, shapes, and clipart can all be inserted into a document's header or footer. As a result, all of the items listed above can be inserted into the header or footer.
A header is text at the top of a page, whereas a footer is text at the bottom, or foot, of a page. Typically, these spaces are used to input document information such as the document's name, chapter heading, page numbers, creation date, and so on.
Therefore, the correct option is d, All the above items can be inserted into either a header or a footer.
To learn more about the header or footer, refer to the link:
https://brainly.com/question/4637255
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Automatic page numbers
Tables with columns and rows
Pictures, shapes, and clipart.
All the above items can be inserted into either a header or a footer.
Before he buys a new smartphone, Tim can best use data to
evaluate which phone he should get.
convince himself he wants a phone.
discredit others’ opinions on his phone choice.
recognize problems that all phones have.
Answer:
A.) Evaluate which phone he should get
Explanation:
Edge2020
Please Help!
Choose all items that are characteristics of placing nested elements on a new line, using indentation.
A) makes HTML errors difficult to find
B) not required by a web browser
C) can cause web page display errors
D) makes HTML analysis and repair easier
E) done automatically by HTML authoring software
Answer:
Its B,D,E
Explanation:
Got it right on e2020
Answer:
B). not required by a web browser
D). makes HTML analysis and repair easier
E). done automatically by HTML authoring software
Btw cause this class can be a pain here are the answers to the rest of the assignment.
Slide 7/12:
The missing element is
C). <p></p>
Slide 9/12:
The missing tag is:
B). an end (closing) a tag
Slide 12/12:
The missing character is
D). an angle bracket
Explanation:
I just did the Part 3 on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
Anyone have an answer for 4.9 lesson code practice
Answer:
loop
Explanation:
Answer:count
Explanation:
Which statement is true? Select 3 options.
A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.
Answer:
A,C, AND E
Explanation:
i got it wrong for the anwser
The statements that are true are as follows:
A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.Thus, the correct options for this question are A, C, and E.
What is Function?A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.
Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.
Therefore, the correct options for this question are A, C, and E.
To learn more about Functions, refer to the link:
https://brainly.com/question/22340031
#SPJ2
Collisions occur when one output is mapped to two inputs.
A. True
B. False
Answer:
true very true very true
Answer:
False
Explanation:
I honestly just guess ngl
but i believe it's right ;0
Select the protocol data units.
1. Bit
2. Segment
3. Frame
4. Data
5. Spoof
6. Pin
7. Packet
Answer: 4. Data 2. segment 7.packet 3.frame 1.bit
Explanation:
Answer:
segmet bit packet frame data
Explanation:
BRAINLIEST
When using design templates, these elements will be determined for you.
bullets
background
color scheme
content
title
font
Answer:
background
color scheme
font
I think thats all
Explanation:
Please give me Brainly
When using design templates, the elements that will be determined for you are color scheme and background. The correct options are b and c.
What is designing a template?The template is creating a document that has a copy of itself. Design templates are ready-made layouts and written materials that can be altered. For example, if you have a template of office content, then you can use it for another word document. You don't have to start from scratch.
In order to maintain consistency among users and media, templates are frequently created to adhere to certain rules or specifications. You can make new templates for later use, or utilize pre-designed templates from template libraries and websites.
Therefore, the correct options are b, background, and c, color scheme.
To learn more about template, refer to the link:
https://brainly.com/question/28193778
#SPJ2
look at the picture lol
Answer:
Zoom in more please and than i can help
Explanation:
Answer:
I would go with the first blue highlighted one... but i could be wrong
i hope i helped
if i didn't... i am sorry, i tried.
Select the correct answer.
What is a hyperlink?
A.
A bold link that goes back to a newspaper
B.
A link that clicks on itself
C.
A way to cite sources in an online article
D.
A special link on a smartphone
Answer:
c.
Explanation:
a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
Answer:
c
Explanation:
came out my study guide and i made a 96 % on my 50 question test
Which of this isn't one of the three types of cryptograph?
A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing
Answer:
A. Vegenere
Explanation:
I think it's spelled Vigenère, I might be wrong.
The three types of cryptograph are:
Symmetric Key Cryptography (Private/Secret Key Cryptography)
Asymmetric Key Cryptography (Public Key Cryptography)
Hash Function