Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer 1

Answer:

Static

Explanation:

I just took the test man!


Related Questions

Can someone help me with this please

Answers

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

Consider the following method, which is intended to return the product of 3 and the nonnegative difference between two int parameters.

public int threeTimesDiff(int num1, int num2) {

return 3 * (num1 - num2);

}
Which precondition is required so that the method works as intended for all values of the parameters that satisfy the precondition?
A. num1 > 0, num2 > 0
B. num1 >= 0, num2 >= 0
C. num1 >= num2
D. num2 >= num1

Answers

Methods are code segments that are executed when called or evoked.

The required precondition for the method to work as intended is (c) num1 >= num2

The return value of the method is given as:

3 * (num1 - num2).

The return value is said to be non-negative.

So, the following condition must be true

[tex]3 \times (num1 - num2) \ge 0[/tex]

Divide both sides of the equation by 3

[tex](num1 - num2) \ge 0[/tex]

Remove the bracket

[tex]num1 - num2 \ge 0[/tex]

Add num2 to both sides of the equation

[tex]num1 \ge num2[/tex]

Hence, the required precondition for the method to work as intended is (c) num1 >= num2

Read more about preconditions at:

https://brainly.com/question/13795586

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?​

Answers

Answer:

I think answers is it never ends

This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:

Answers

RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.

Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.

Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card

Read more about hardware implementation

brainly.com/question/25803633

is a virtue by which you need to secure information by limiting computer access to authorized personnel only.

Answers

Answer:

ummmmmmmmm

Explanation:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.

Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

Which of the following statements best explains how multitasking works in the human mind?

Answers

Multitasking is a myth—everyone can only process information one piece at a time.

Answer: He's right

Explanation: I got the answer too

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

how many pages is 1500 words double spaced 12pt font?

Answers

Answer:

6 pages

Explanation:

how to check amazon gift card balance without redeeming

Answers

Answer:

Follow these steps to check your Amazon gift card balance without redeeming.

1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.

2. Sign in to your Amazon account. You can sign in through the website or the mobile app.

3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.

4. Click 'Help and customer service'. This option is located at the top of the screen.

5. Talk to a customer support agent.

Mobile app:

Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.

Computer:

Click 'Something else'.Click 'I need more help'.

6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.

7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.

When the logging and managing information flow between management hosts and the managed devices travels on a dedicated management network, this is considered what?

Answers

What must be considered is the number of IPs that are allowed to access the management network.

We can arrive at this answer because:

During the management of information flow, it is necessary to guarantee the security of the system, preventing intruders from attacking.This can be done by restricting authorized IPs to access the management interface.This type of security measure is often neglected in systems that use a dedicated management network, as this type of network can only be accessed by a single device in the same VLAN.

However, the IPs restriction must be considered even in this system, as there are software that can provoke invasions that cause the leak of shared information.

You can find more information about software here:

https://brainly.com/question/24032221

What is my mistake in this case?

Answers

Answer:

I think it suppose to be #print out house

Answer:

i guess take the hint, bro.

Explanation:

What is an electrical conductor? Name five electrical conductors

Answers

Answer:

Explanation:

silver.

copper.

gold.

Steel

Seawater.

Explanation:

Electrical conductors are those which allows the electrons to flow easily. Examples of five conductors are :-

Gold Silver CopperAluminium Iron.

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

what is syllabus of diploma in computer after class 10​

Answers

Answer:

[tex] \: [/tex]

List Of Best Computer Courses After 10th :

Certificate Program In MS OfficeBasic Computer CourseWeb Designing CourseDigital Marketing CourseData Entry CourseGraphic Designing CourseWeb Development CourseAnimation And VFX CourseComputer Science Diploma/EngineeringDiploma In Financial Accounting

The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.

Answers

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:


What is the missing line of code?
22
>>> books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
>>>
dict_keys([294, 931, 731])
O books allo
O books.values()
O books
O books.keys()

Answers

Answer:

books.keys()

Explanation:

I ran the code and the awncers though python and books.keys() is the one that came up with the awncer

books.keys() is the missing line of code with respect to the books with the help of Python language.  Thus, option D is correct.

What is a code?

In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.

Code is a developing company that focuses on producing aesthetically pleasing, code-correct internet, application forms, and phone application.

The correct code will be according to the Python language will be in addition to books.keys():

books.keys()

books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}

books.keys()

dict_keys([294, 931, 731])

Therefore, option D (books.keys()) is the correct option.

Learn more about code, here:

https://brainly.com/question/17204194

#SPJ2

Help to draw in turtle. Python

Answers

Answer:

a basic piece of code:

from turtle import *

color('red', 'yellow')

begin_fill()

while True:

   forward(200)

   left(170)

   if abs(pos()) < 1:

       break

end_fill()

done()

Explanation:

What its doing is The TurtleScreen class defines graphics windows as a playground for the drawing turtles. Its constructor needs a tkinter.Canvas or a ScrolledCanvas as argument. It should be used when turtle is used as part of some application.

The function Screen() returns a singleton object of a TurtleScreen subclass. This function should be used when turtle is used as a standalone tool for doing graphics. As a singleton object, inheriting from its class is not possible.

All methods of TurtleScreen/Screen also exist as functions, i.e. as part of the procedure-oriented interface.

RawTurtle (alias: RawPen) defines Turtle objects which draw on a TurtleScreen. Its constructor needs a Canvas, ScrolledCanvas or TurtleScreen as argument, so the RawTurtle objects know where to draw.

Derived from RawTurtle is the subclass Turtle (alias: Pen), which draws on “the” Screen instance which is automatically created, if not already present.

All methods of RawTurtle/Turtle also exist as functions, i.e. part of the procedure-oriented interface.

A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware

Answers

It is a citation for the answer

A healthcare crisis where millions of patient medication records were tampered with is an example of what type of breach?

A.
integrity breachc.

B.
codependency breach

C.
authentication breach

D.
AIC Triad breach

Answers

A healthcare crisis where millions of patient medication records were tampered with is an example of; A: Integrity Breach.

To answer this question, let us access each of the options;

A) Integrity breach; This is a breach that occurs when where there is an unauthorised or accidental alteration of the personal data of individuals or a group.

B) Codependency breach; This is not really a breach in this context as it happens when there is an imbalanced relationship between two or more people.

C) Authentication breach; This is a type of breach that is more common with a breach of passwords and login details.

D) AIC Triad breach; AIC is Availability, Integrity and confidentiality. So it combines Availabilty breach, integrity breach and confidentiality breach.

In this question, the patient medication records were tampered with which means that they were altered and from our definitions above, this is an example of integrity breach.

Read more about security breach at; https://brainly.com/question/15957125

A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.

Which visual aid would best support her topic?

Answers

Answer: a map showing the different sizes of the moon's craters

Explanation:

the reason for this is because the student wants to show what the surface of the moon looks like.

What type of information is appropriate for headers and footers? Check all that apply.

Answers

Answer:

C,  E,F,G  are correct

Explanation:

Answer:

C,E,F,G  are correct.

Explanation:

Ethan is afraid that his poor grades will get him kicked out of his university at the end of the semester. He decided to remotely access the dean's computer and change his grades in the school system. If caught, Ethan will have to confess to committing what?

A.
virtual education

B.
grade hacking

C.
a computer crime

D.
educational fraud

Answers

Answer:

Computer Crime

Explanation:

You're evading someones privacy and gaining access to their computer or device without consent. Therefore, it is a computer crime.

Answer:

Educational fraud

Explanation:

Ethan changed his grades in the school system claiming to have better grades then he really does.

Open-ended games give players the most freedom to explore other worlds.

A.
True
B.
False

Answers

A - trueeeeeeeeeeeeee

please answer ASAP!!!!!!

Answers

Answer:

the first constructor invocation will work.

pet temp("mouse", 5.99);

Explanation:

This will create a pet object on the stack, using the constructor.

If you want to create an object on the heap, you would use the new operator:

pet* pTemp = new pet("mouse", 5.99);

Physical components of a computer system such as a keyboard, mouse, or modem.

Question 25 options:


Software


Network


Browser


Hardware

Answers

Answer:

D

Explanation:

D: Hardware. These are the things like mouse or Modem that you can touch physically.

Software is what the computer runs to make itself useful.

Network is the connection (either virtual or physical) that connects computers together.

Browser is a software program used to navigate the internet

is there actually a difference between left and right twix

Answers

one has more caramel and one has more cookie
Other Questions
PLEASE HELPP!!!! Which process does osmosis involve?A. movement of solute up a concentration gradientB.movement of solute across the cell membraneC. movement of water across a cell membraneD. movement of water up a concentration gradient Observe the cell as it moves from stage to stage through cell division. What trends can you describe about the cell and its internal contents? Question 8 of 10The molecules that make up food contain energy. How does the human bodyget energy from the food molecules?A. By adding energy to the moleculesB. By breaking and reforming chemical bonds in the moleculesC. By using them to form ionic bondsD. By combining the molecules together A garden hose shoots water horizontally from the top of a tall building toward the wall of a second building 20 meters away. If the speed with which the water leaves the hose is 5 m/sec, how long does it take the water to reach the second building, and what distance does the water fall in this time? Understand how to work with negative bases and negative exponents.5^2 = 5^-2 = (-5)^2 = - 5^2 = (Remember to find the base, then multiply.) Does anyone know the answer for this question? I really need it. ______ is an example of a TCS food.A whole watermelonChickenBreadUncooked (dry) rice A piecewise function is represented by the graph below.On a coordinate plane, a piecewise function has 2 lines. The first line is made up of 2 lines. One line goes from (negative 5, 3) to (negative 1, negative 1) and then goes up to a closed circle at (1, 1). The second line has an open circle at (1, 2) and then continues up through (3, 4).What is the domain for the piece of the function represented by f(x) = x + 1?x < 11 x 11 x < 2x > 1 Termina cada conversacin para indicar que la segunda persona est de acuerdo con la primera. 8. Carolina: A m no me gusta limpiar (to clean) la casa. Miguel: A m ____________________________. Immersive Reader(1 Point)tambientampoco Exam GuidelinesExam InstructionsQuestion 4 of 20:Select the best answer for the question.4. Which of the following statements about writing introductions and conclusions is true?O A. Always write the body paragraphs and the conclusion before going back to write the introduction.B. If you have trouble beginning with the introduction, write the body paragraphs first.C. If you're writing a research paper, you don't need an introduction or a conclusion.D. Always write the introduction first and the conclusion last.Mark for review (Will be highlighted on the review page)> Is this statement true or false?Impressionist paintings by John Twachtman depict a moment in time.truefalse What happend when matter condenses??Plzz Answer??? Is this table proportional?XY1 3 34 125 157 21 Your engineering department is asked to evaluate the performance of a new 370-hp sports car. You know that 27% of the engine's power can be converted to mechanical energy of the 1200-kg car, and that the power delivered is independent of the car's velocity. What do you report for the time it will take to accelerate from rest to 60 mi/h on a level road? A geriatric team wants to involve the patients family in his or her care. When is the best time to invite the family to become part of the team?not at allbefore the patients procedureafter the patients dischargeat the very beginning 3.Original DNA sequence: 3' TACCGCTTACGTCTGATCGCT 5' Mutated DNA sequence: 3' TACCGCTTATTATTACGTGCTGCTATCGCT 5' Type of mutation (3pts): Amino acid ( 3pts): Type of mutation ( 3pts): 4. Original DNA sequence: 3' TACCGCTTACGTCTGATCGCT 5' Mutated DNA sequence: 3' TACCGCTAATTATTACGTGCTGCTATCGCT 5' Type of mutation ( 3pts) : Amino acid ( 3pts): Type of mutation ( 3pts): Which one is correct Which of the following lines of a dialogue is most appropriate for a naturalist play A. Where are we going? What's happening? B. Does thou require a repast this morn?C. Hark, what light younder window breaks?D. Whither are we bond? At optimum light intensity, which atmospheric gas most directly influences the rate of photosynthesis? * Jamal has a plan to save money for a trip. Today, Jamal deposits $8.00 into the savings account. Each week, Jamal will add $5.00 to the amount that is deposited into the savings account. The table below shows the relationship between the number of weeks and how much money, in dollars, Jamal deposits into the savings account. Week 0 1 2 3 4 Deposit (Dollars) 8 13 18 23 28 Let f(x) represent the amount of money Jamal deposits into saving account at the end of x weeks. Based on the table, what is f(8)?