Answer:
insert tab
Explanation:
hope it helps
Answer:
we can create tables in ms word from Insert table
Discuss the advantages and disadvantages of artificial intelligence ?
50word
Answer:
it'll be in points okay.
Explanation:
1. It's a blessing as well as a curse.
2. It changed lives.
3. Helped understand things better.
4. Development.
5. Free knowledge e.g. Brainly
;)
Explanation:
Kxkxkdkeeksldowowowkscoviforkeooododosowkwmdndmdmrnrnrmrmfododoo ododosososxkxkdldldldllwlwwlel ododoeldl ldldldlxl odododo oodoxxoo
how do you keep word from trying to capitalize every isolated letter "i"
explain mechanical computer ,electromechanical and electronic computer with example
Answer:
A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.
Explanation:
An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.
Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?
Answer:
Hence f(z)=11
*This is what i think*
so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones
No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution
Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4
Answer:
C = 3
Explanation:
The maximum number of physical memory accesses that may be caused by this single instruction is ; 3
This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total
The coding system that has just two characters is called:
a
binary
b
dual.
c
basic.
d
double.
Answer:
A. Binary
Definition:
Pertaining to a number system that has just two unique digits 0 and 1. - binary code
Answer:
a binary
Explanation:
ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.
Write a application that can determine if a 5 digit number you input is a palindrome. If the number is a palindrome then print "The number is a palindrome." If it is not then print "The number is NOT a palindrome"
Answer:
Written in Python:
num = int(input("Number: "))
strnum = str(num)
if len(strnum) !=5:
print("Length must be 5")
else:
if(strnum[::-1] == strnum):
print("The number is a palindrome.")
else:
print("The number is NOT palindrome.")
Explanation:
This prompts user for input
num = int(input("Number: "))
This converts user input to string
strnum = str(num)
This checks the length of the string
if len(strnum) !=5:
print("Length must be 5") If length is not 5, this prompt is printed
else:If otherwise
if(strnum[::-1] == strnum): The compares the string reversed with the original
print("The number is a palindrome.") If both are the same, this line is executed
else:
print("The number is NOT palindrome.") If otherwise, this line is executed
describe PROM, EPROM and EEPROM memories
Answer:
Explanation:
PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.
Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o
Answer:
A. Blade
Explanation:
Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.
If this is multiple choice, a dedicated server can be too.
A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.
Answer:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local namingExplanation:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local namingWrite a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.
Answer:
The program written in Python is as follows
def GCD(num1, num2):
small = num1
if num1 > num2:
small = num2
for i in range(1, small+1):
if((num1 % i == 0) and (num2 % i == 0)):
gcd = i
print("The GCD is "+ str(gcd))
def LCM(num1,num2):
big = num2
if num1 > num2:
big = num1
while(True):
if((big % num1 == 0) and (big % num2 == 0)):
lcm = big
break
big = big+1
print("The LCM is "+ str(lcm))
print("Enter two numbers: ")
num1 = int(input(": "))
num2 = int(input(": "))
GCD(num1, num2)
LCM(num1, num2)
Explanation:
This line defines the GCD function
def GCD(num1, num2):
This line initializes variable small to num1
small = num1
This line checks if num2 is less than num1, if yes: num2 is assigned to variable small
if num1 > num2:
small = num2
The following iteration determines the GCD of num1 and num2
for i in range(1, small+1):
if((num1 % i == 0) and (num2 % i == 0)):
gcd = i
This line prints the GCD
print("The GCD is "+ str(gcd))
This line defines the LCM function
def LCM(num1,num2):
This line initializes variable big to num2
big = num2
This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big
if num1 > num2:
big = num1
The following iteration continues while the LCM has not been gotten.
while(True):
This if statement determines the LCM using modulo operator
if((big % num1 == 0) and (big % num2 == 0)):
lcm = big
break
big = big+1
This line prints the LCM of the two numbers
print("The LCM is "+ str(lcm))
The main starts here
This line prompts user for two numbers
print("Enter two numbers: ")
The next two lines get user inputs
num1 = int(input(": "))
num2 = int(input(": "))
This calls the GCD function
GCD(num1, num2)
This calls the LCM function
LCM(num1, num2)
See attachment for more structured program
16. A
is an object you can insert in your document, type text in, but can then format in the
same ways you would other objects?
(5 Points)
formatting box
text holder
text box
typing box
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is the Text box.
You can insert a text box as an object in your document, type text in it and you can format it in the same way you would do for other objects.
You can insert the text box using the Insert tab then under Shapes that you can find under the Illustrations group. You can then find Text Box under basic shapes.
While the other options are not correct because:
Formatting box allows you to format the object, text holder and typing box does not mean in this context because text holder is something that can hold the text such as shapes or text box, etc. but these terms are not used in word or in a document.
The designer of an agent traveled to a beach for a holiday. He took the agent to the beach. He wanted the agent to capture the sunrise and the high tide. What kind of knowledge representation will the agent use in this new environment?
A.
picture
B.
number
C.
graph
D.
meta
Answer:
Picture
Explanation:
The Mac’s GUI set it apart from earlier operating systems.
True or False
Answer:
Its true
Explanation:
Just took the test.
Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote
Answer:
tyafana
Explan
ation:n umbers
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
In python:
if 8 < user_grade < 13:
print("in high school")
You would just need to supply the value of the user_grade variable.
What causes them to catch your attention in advertisements?
Answer:
advertisement should be nice and attractive to get attention of people
What is the benefit of encapsulation?
A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected
Answer:
B. To reuse code
The Operating System provides utility software designed to perform specific tasks. What task(s) does it perform? Select all that apply.
A. Establishing an Internet connection
B. Coordinating tasks between programs
C. Configuring peripheral devices
D. Monitoring security
Answer:
All of the above.
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
Hence, the operating system (OS) provides utility software designed to perform specific tasks. Some of the tasks it performs are;
A. Establishing an Internet connection.
B. Coordinating tasks between programs.
C. Configuring peripheral devices.
D. Monitoring security.
How did DDE devices have made our daily life easier?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
DDE (direct data entry) devices are the devices that read data from a source and transfer it directly into the computer. Unlike, other input devices which require physical interaction which requires you to move physically or to do something for an output or feeding data into a computer.
The DDE devices require no hard work while taking input into the computer as compared to other input devices. These DDE devices made our life very easy. Because these devices take input accurately and there are no chances of human error.
The example of DDE devices are magnetic stripe reader, chip reader, Pin pads, optical mark reader, and barcode reader, etc.
These devices have brought great advantages to human life. Because by using these data entry devices, information can be put into very quickly, more accurate than typing and information of the whole page transferred .very quickly and accurately into the system. These devices are also more secure and can hold lots of data, and the data is protected with the PIN (personal identification number). These are also used in ATM machines, handheld, and entry doors.
Answer:
wait is it a write in answer or a multiple choice?
Explanation:
A scared kangaroo clears a fence that is 2.44 meters tall. What is the vertical component of the kangaroos velocity at take off ? If the horizontal component of the kangaroos velocity is 4.80 m per s at what angle did the kangaroo take off the ground? (hint: at its maximum height the kangaroos vertical velocity is 0)
Answer:
a) The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.
b) The angle at which the kangaroo took off the ground is approximately 46.066º.
Explanation:
a) According to the statement, the kangaroo has an initial horizontal velocity and jumps to overcome the fence until velocity becomes zero. If effects from non-conservative forces can be neglected, then we represent the situation of the kangaroo by Principle of Energy Conservation:
[tex]K_{1}+U_{g,1} = K_{2}+U_{g,2}[/tex] (Eq. 1)
Where:
[tex]K_{1}[/tex], [tex]K_{2}[/tex] - Initial and final translational kinetic energies, measured in joules.
[tex]U_{g,1}[/tex], [tex]U_{g,2}[/tex] - Initial and final gravitational potential energies, measured in joules.
By definitions of translational kinetic and potential gravitational energies, we expand and simplify the equation above:
[tex]\frac{1}{2}\cdot m\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = m\cdot g \cdot (y_{2}-y_{1})[/tex]
[tex]\frac{1}{2}\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = g \cdot (y_{2}-y_{1})[/tex] (Eq. 2)
Where:
[tex]m[/tex] - Mass of the kangaroo, measured in kilograms.
[tex]g[/tex] - Gravitational acceleration, measured in meters per square second.
[tex]y_{1}[/tex], [tex]y_{2}[/tex] - Initial and final heights of the kangaroo above the ground, measured in meters.
[tex]v_{1,x}[/tex], [tex]v_{1,y}[/tex] - Vertical and horizontal initial velocities, measured in meters per second.
[tex]v_{2,x}[/tex], [tex]v_{2,y}[/tex] - Vertical and horizontal final velocities, measured in meters per second.
If we know that [tex]v_{1,x} = 4.80\,\frac{m}{s}[/tex], [tex]v_{2, x} = 0\,\frac{m}{s}[/tex], [tex]v_{2,y} = 0\,\frac{m}{s}[/tex], [tex]g = 9.807\,\frac{m}{s^{2}}[/tex] and [tex]y_{2}-y_{1} = 2.44\,m[/tex], then (Eq. 2) is reduced into this:
[tex]11.52+0.5\cdot v_{1,y}^{2}=23.929[/tex]
Lastly, we solve for [tex]v_{1,y}[/tex]:
[tex]0.5\cdot v_{1,y}^{2}=12.409[/tex]
[tex]v_{1,y}^{2} = 24.818[/tex]
[tex]v_{1,y} \approx 4.982\,\frac{m}{s}[/tex]
The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.
b) The angle at which the kangaroo took off the ground ([tex]\theta[/tex]), measured in sexagesimal degrees, is obtained by the following inverse trigonometric relation:
[tex]\theta =\tan^{-1}\left(\frac{v_{1,y}}{v_{1,x}} \right)[/tex] (Eq. 3)
[tex]\theta = \tan^{-1}\left(\frac{4.982\,\frac{m}{s} }{4.80\,\frac{m}{s} } \right)[/tex]
[tex]\theta \approx 46.066^{\circ}[/tex]
The angle at which the kangaroo took off the ground is approximately 46.066º.
need help asap
Which statement is true of emerging technologies?
Advancements in communication technologies played a minor part in the rise of globalization.
Developments in communication helped remote locations connect with the world.
Malicious entities can misuse emerging technologies.
There are few disadvantages to the widespread growth of the internet.
The complexity of wireless communication prohibits it from being provided in remote locations
Answer:
Advancements on communication technologies played a minor part in the rise of globalization.
Explanation:
Answer:
Developments in communication helped remote locations connect with the world.
Explanation:
I took the test, plato/edemetuimedemetuim
What game is this? helpppppp
Answer:
the sims lol
Explanation:
Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?
A. counter module
B. while loop
C. for loop
D. mean module
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is A: counter module.
Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.
Other options are not correct because:
While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.
Endnotes are indicated by
A. lowercase letters (a, b, c)
B. numbers (1, 2, 3)
C. Roman numerals (i, il, ill)
D. uppercase letters (A, B, C)
They
Answer:
The answer is D because u have the uppercase letter bold
Answer:
Endnotes are actually indicated by Roman Numerals so option C is correct.
A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?
Answer:
3 Volts.
Explanation:
Answer:
3 Volts
Explanation:
Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :
2.4 W = Voltage x 0.8 A
Then if you rearrange the equation, it would be :
2.4 W / 0.8 A = Voltage
Which is :
3 V = Voltage
Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores
Answer:
Explanation:
The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.
public static void newScore(int oldScore) {
ArrayList<Integer> newScore = new ArrayList<>();
String stringOldScore = String.valueOf(oldScore);
for (int x = 0; x < stringOldScore.length(); x++) {
newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));
}
newScore.add(newScore.get(0));
newScore.remove(0);
String newScoreString = "";
for (int x:newScore) {
newScoreString += String.valueOf(x);
}
int finalScore = Integer.parseInt(newScoreString);
System.out.println(finalScore);
}
Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B
Answer:
The answer is D. A and B
Explanation:
I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.
Answer: The answer is D. A and B
Explanation: I took this test 5 mins ago and it was right.
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.
What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?
Answer:
You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.
It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.