If I want to control the aperture and I want the camera to control the shutter speed which setting on the mode dial is most appropriate?
a)AV
b) TV
c) M
d) P
since this is my last question im giving 100 points and brainliest
Answer:
answer is a
hopes this helps
write algorithm and flowchart to calculate sum,difference, product and quotient of two integer number given by the user.
Answer:
Step1: Start
Step2: Initialize the count variable to zero
Step3: Initialize the sum variable to zero
Step4: Read a number say x
Step 5: Add 1 to the number in the count variable
Step6: Add the number x to the sum variable.
Step7: Is the count variable in the memory greater than 50?
If yes, display the sum: go to step 8.
If No, Repeat from step 4
Step8: Stop
Explanation:
Predict the output
int ma3, n = 5, p=4
if(m==n&&n!=p)
{
System.out.println (m*n) ;
system.out.println(n%p);
}
if (m!=n) " (n==p)
System, out println (m+n)
System.out printen (m-n))
}
Answer:
the output will be "hello word"
Which tab should you use to change the text font color in your presentation?
Answer:
The Home Tab
Explanation:
Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL
Answer:
hi
Explanation:
I am having trouble with doing this code on Python:Develop the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.Ex: If the input is:2011 18000 2018where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770Note: print_info() should use three spaces for indentation.
Answer:
class Car:
def __init__(self, model_year, purchase_price):
self.model_year = model_year
self.purchase_price = purchase_price
self.current_year = 0
self.current_value = 0
def set_current_year(self, year):
self.current_year = year
def calc_current_value(self, current_year):
if self.current_year == 0:
return "Must first input the current year"
depreciation_rate = 0.15
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price - (car_age * (self.purchase_price * 0.15)))
def print_info(self):
print("Car's information:")
print(f"Model year: {self.model_year}")
print(f"Purchase price: {self.purchase_price}")
if self.current_value > 0:
print(f"Current value: {self.current_value}")
else:
print("Current value: Unknown")
Explanation:
The python program above defines the class "Car" that accepts the model year and purchase price of an instance. The class has a set method for the current year variable that is used to calculate and update the current value variable of the object. The print_info method prints the car model year, purchase price and its current value after nth years.
Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements
Answer:
option b and c are correct answers.
Explanation:
Let see each option in detail.
a) Sending email is not a risk.
b) Granting access is a problem because the other person can undermine the network
c) Unknow senders can send virus or other malicious code to corrupts you data.
d) Unwanted advertisement is not a big deal.
Answer:
Granting administrator access to a non-administrator
Opening files from unknown senders
Explanation:
Psst those are the answers
Exodia
Principle of Computer Operation
Answer:
????
Explanation:
The attenuation of a signal is -10 dB. What is the final signal power if it was originally
5 W?
Answer:
P₂ = 0.5 W
Explanation:
It is given that,
The attenuation of a signal is -10 dB.
We need to find the final signal power if it was originally 5 W.
Using attenuation for signal :
[tex]dB=10\text{log}_{10}(\dfrac{P_2}{P_1})[/tex]
Put dB = -10, P₁ = 5 W
Put all the values,
[tex]-10=10\text{log}_{10}(\dfrac{P_2}{5})\\\\-1=\text{log}_{10}(\dfrac{P_2}{5})\\\\0.1=\dfrac{P_2}{5}\\\\P_2=5\times 0.1\\\\P_2=0.5\ W[/tex]
So, the final signal power is 0.5 W.
The final signal power if it was originally 5W is; 0.5 W
Signal PowerWe are given;
Attenuation signal; dB = -10 dBOriginal signal power; P1 = 5 WFormula for attenuation signal is;
dB = 10log_10_ (P2/P1)
Where P2 is final signal power
Thus;
-10 = 10log_10_(P2/5)
-10/-10 = log_10_(P2/5)
-1 = log_10_(P2/5)
0.1 = P2/5
P2 = 0.1 × 5
P2 = 0.5 W
Read more about signal power at; https://brainly.com/question/13315405
Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
Select "Text" from the Insert menu.
Click in the Task pane and enter text.
Draw a text box, click in it, and enter text.
Click in a placeholder and enter text.
PLEASE help
Answer:
Draw a text box
Explanation:
Because if she draw it she can edit and write what she want
This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs
Answer:
Following are the code to this question:
def getSum(ID):#defining a method getSum that accept an ID
t= 0#defining a variable t
while ID!= 0:#defining while loop to check ID not equal to 0
t+= ID % 10# holding remainder value
ID = ID // 10#holding quotient value
return t#return total value
def readRecord(S):#defining a method readRecord that hold list
f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file
for C_ID in f_Read:#defining for loop to hold file value
C_ID = C_ID.replace('\n', '')#use replace method
S[C_ID] = getSum(int(C_ID))#use list to method value
f_Read.close()#close file
def sortRecord(ID_List, t_List):#defining a sortRecord
for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list
for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list
if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater
ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value
t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value
def showReport(ID, t):#defining a method showReport that accept id and t
for i in range(len(ID)):#defining for loop to hold index value
print(ID[i]," ",t[i])#print index value
def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list
f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file
for i in range(len(ID_List)):#defining a for loop to store value with index
f_Write.write(ID_List[i])#hold list value
f_Write.write(" ") #for space
f_Write.write(str(t_List[i]) + "\n")# add index value
f_Write.close()#close file
def run():#defining method run
S = {}#defining an empty list
readRecord(S)#passing list into readRecord method
ID_List = list(S.keys())#defining a variable that holds key value in list
t_List = list(S.values())#defining a variable that holds values value in list
sortRecord(ID_List, t_List)#calling a method sortRecord by passing value
showReport(ID_List, t_List)#calling a method showReport by passing value
writeRecord(ID_List, t_List)#calling a method writeRecord by passing value
if "run":
run()
Output:
Please find the attached file.
Explanation:
In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.
In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.
Please help this computer science question(Pseudocode and Trace table)
Answer:
can u explain more specific plz
Explanation:
Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smallest and largest integers in the list.
Ex: If the input is:
10
5
3
21
2
-6
the output is:
2 and 21
n = 1
lst = []
while n > 0:
lst.append(n := int(input()))
lst.pop(-1)
print(str(min(lst)) +" and "+str(max(lst)))
I wrote this code in python 3.8. I hope this helps
When save a newly created template, you use which extension for the file type? .doc, .docx, .doct, .dotx?
Answer:
The main difference between the two file formats is that in DOC, your document is saved in a binary file that includes all the related formatting and other relevant data while a DOCX file is actually a zip file with all the XML files associated with the document.
The U.S. military's standard for computer security is known as
DCS-3000.
TEMPEST.
Daubert standard.
Carnivore.
Answer:
TEMPEST.
Explanation:
TEMPEST is an acronym for Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions and it is a secret (classified) project of the government of the United States of America that originated with its military in the 1960s based on the study of security with respect to telecommunication devices emitting Electromagnetic Radiation (EMR).
Hence, the U.S. military standard for computer security is known as TEMPEST.
The main purpose of the Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions (TEMPEST) is to prevent the theft, compromise or interception of informations that are being transmitted on various telecommunications devices through the use of Electromagnetic Radiation (EMR).
Ryan is a manager who maintains an official record of the events that happen in his company. At the end of the day, he writes about the events that took place. The words that he frequently mentions in his record are today, client, and meeting. The moment he types the first two letter of these words, they appear as a suggestion. Which feature of the word processing program makes these suggestions
Answer: word completion
Explanation:
Answer:
Word Completion
Explanation: because i took the test.
Question 24 Multiple Choice Worth 5 points)
(01.04 MC)
Zavier needs to compress several files. Which file type will allow him to do this?
ODOC
GIF
OJPG
O ZIP
Answer:
ZIP
Explanation:
ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections
TBH:
it may be O ZIP but i've never heard of it.
Answer:
Zip (D)
Explanation:
Took The Test
For this exercise, you are going to write a recursive function that counts down to a Blastoff!
Your recursive function will not actually print. It will return a String that can be printed from the main function. Each recursive call will add on to that string.
In your main function, prompt the user for a starting value, then print the results.
Sample Output
Please enter a number to start:
5
5 4 3 2 1 Blastoff!
import java.util.Scanner;
public class Countdown
{
public static void main(String[] args)
{
// Start here
}
public static String countdown(int number)
{
// Base case - return Blastoff!
// Recursive call
}
}
Answer:
import java.util.Scanner;
public class Countdown {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int n;
System.out.print("Please enter a number to start: ");
n = input.nextInt();
System.out.print(countdown(n));
}
public static String countdown(int number) {
if(number>0) { return " "+number+countdown(number-1); }
else { return " Blastoff!"; }
}
}
Explanation:
The main method begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This declares an integer variable n
int n;
This prompts user for a number
System.out.print("Please enter a number to start: ");
This gets user input n
n = input.nextInt();
This calls the countdown function
System.out.print(countdown(n));
}
The countdown function begins here
public static String countdown(int number) {
This is the base case where input number is greater than 0
if(number>0) { return " "+number+countdown(number-1); }
This ends the recursion
else { return " Blastoff!"; }
}
Learning Task 3: Below are different electronic diagrams. Write the name of
the diagram on your answer sheet.
BELL
Input
Video
Transform
Quantization
Entropy
Coding
Output
Bitstream
Inverte
Quantization
1 2 3
Inverse
Transform
Number to be
dropped when
energized by
electric current
Annunciato
DOOD
Intor intra
Prediction
Frame
Buffer
Ordinary
Push Button
Answer:
WAOW
Explanation:
You did better than I can
Is it important to study information systems
Answer:
There is massive importance if you want to study information study.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
Explanation:
It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.
Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.
So, yes!
There is a massive importance if you want to study information study.
Which of these parts serves as the rear cross structure of a vehicle?
Rear body panel
Rear bumper cover
Rear rails
Rear core support
ontents
Answer:
Rear bumper cover
Explanation:
Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?
Compatibility Checker
Accessibility Checker
Insights
AutoCorrect
Answer:
Accessibility Checker
Answer:
answer is accessibility checker or B on edge
If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest
Answer: The answer is C Hope this helps :) Please mark Brainliest
Explanation:
Answer:
c) 18mm f5.6
Explanation:
For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.
Hence choice c) has the maximum aperture and does not zoom.
Hope this helps :)
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
explain the major innavotions made from the establishment of abacus
Answer:
The abacus is one of many counting devices invented to help count large numbers.
Explanation:
For an interview, the most used microphone types are
A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed
For all programs, you should write a small amount of code and _______
it before moving on to add more code?
Answer:
test
Explanation:
One newly popular development paradigm is "test-driven development"; which borrows agile engineering principles in architecting project components.
write a an algorithm to find out volume?
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.
dad always arrives home from work thoroughly exhausted