Answer:
yes
Explanation:
The fastest WPM was 216 wpm
Answer:
Yes it is
Explanation: Because the 96 is how fast you typed and the 100 is what words you typed correctly.
What strategies do businesses use to protect their networks from internal threats?
select all that apply
-having employees change their passwords regularly
-requiring a login to access the network
-using dial-up connections to access the Internet
-implementing peer-to-peer networking
-providing employees with access privileges
Answer:
I think the answers would most definitely be requiring a login to access the network because if businesses had a network with no login, anyone could get into it. Others would be providing employees with access privileges so that way ONLY employees may get into certain things, and possibly having employees change their passwords regularly so that way, anyone who has the employees previous password can't log in at any time to steal anything cause it's changed.
Hope this helped! Have a great day! - Olli :]
How does computer science play a role in art?
Answer:
Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.
Ashton assigned a string value to a variable. Which program statement should he use?
1myAge = "thirteen"
my age = "thirteen"
myAge = "thirteen"
myAge! = "thirteen"
Answer: c because there cant be numbers or simboles also nooooooo spaces
Explanation:
brainlyist plz
Answer:
myAge = "thirteen"
Explanation:
A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session.
Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions.
The following code segment is intended to create lunchList, which is initially empty.
It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise.
FOR EACH child IN morningList
{
}
Which of the following could replace so that the code segment works as intended?
(A)
IF (IsFound (afternoonList, child))
{
APPEND (lunchList, child)
}
(B)
IF (IsFound (lunchList, child))
{
APPEND (afternoonList, child)
}
(C)
IF (IsFound (morningList, child))
{
APPEND (lunchList, child)
}
(D)
IF ((IsFound (morningList, child)) OR
(IsFound (afternoonList, child)))
{
APPEND (lunchList, child)
}
Answer:
The answer is "Option A".
Explanation:
In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.
True or False A safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product.
Answer:
True.
Explanation:
The Occupational Safety and Health Administration (OSHA) is a federal agency saddled with the responsibility of assuring and ensuring safe and healthy working conditions for employees by setting and enforcing standards, providing education, trainings and assistance to various organizations.
According to the Occupational Safety and Health Administration (OSHA), trainings on the adoption and application of safety precautions (tools) such as wearing a personal protective equipment e.g masks (respirators), ear plugs, safety boots, gloves, helmet, etc. are very important and are essentially to be used by employees (workers) while working in a hazard prone environment or industries. Therefore, all employers of labor are required to provide work tools and ensure that their employees properly use those tools, as well as abide by other safety precautions and standards highlighted in the safety data sheet.
A Safety Data Sheet (SDS) can be defined as a text-based document or bulletin that provides information with respect to the chemical and physical properties such as flammability, temperature, radioactivity, etc., of a substance or equipment. Also, it contains information on the potential health hazards and safety precautions for proper use (handling), storage and transportation of such substance or equipment.
Hence, a safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product such as toxic chemicals, radioactive elements, weapons or ammunition, etc.
According to programming best practices, how should you handle code that needs to be repeated several times in a program?
Store the code on a website and reference the website when it is needed.
O Store the code only in a code library, not in the actual app's code.
Have the code appear only once in the program and reference it when it is needed.
O Copy the code as many times as needed so that each usage is separate.
Explanation:
Copy the code as many times as needed so that each usage is separate.
Does anyone know what episode Hinata threatens useless sakura?
Answer:
it was in 367 or in the 400 it was a dream that ten ten had
Explanation:
in what tab the translate button found
Answer:
Display the Review tab of the ribbon and click the Language tool and then click Translate. Click Translate Selection. Word displays the Translator pane. (A window may appear on the screen after clicking Translate Selection asking you to turn on Translation Services.)
Hope this helps : )
Which activity can produce bugs that are harmful to the security of a Web server?
Answer:
A. Software updates
Explanation:
Updating the software of something can affect how the hardware works, which can lead to making the server easier to access. A good example is the US government using at max win 7 (in some cases, XP) due to possible security issues with Win 10.
4. What type of electromagnetic waves does a computer scanner use? Explain how the photoelectric effect is an important part of this process. (2 points)
Answer:
Computed tomography
Explanation:
Study of the photoelectric effect led to important steps in understanding the quantum nature of light and electrons and influenced the formation of the concept of wave-particle duality. The photoelectric effect is also widely used to investigate electron energy levels in matter.
A type of electromagnetic wave a computer scanner use is high-frequency radio waves.
The concept of wave-particle dualism was developed and key milestones in the understanding of the fundamental nature of light and electrons were made possible by research into the photoelectric effect.
What is the use of a computer scanner?A scanner is a tool that digitizes information by scanning or taking a photo of a document and displaying it on a computer screen. It makes it easier for both teachers and students to copy instructional resources like documents and pictures, as well as to take and preserve pictures.
Discovering the quantum nature of light was advanced by research into the photoelectric effect. Examining the electron energy levels of the matter is another common application of the photoelectric effect.
Learn more about computer scanners, here:
https://brainly.com/question/14259590
#SPJ5
5.10.4: Snake Eyes
My code:
var SENTINEL = 1;
function start(){
var diceOne;
var diceTwo;
while(true) {
println("" + diceOne + "," + diceTwo);
diceOne = Randomizer.nextInt(1,6);
diceTwo = Randomizer.nextInt(1,6);
if (diceOne && diceTwo == SENTINEL){
println("" + diceOne + "," + diceTwo);
break;
}
}
}
What am I doing wrong here?
Answer:
You didn't specify what the function actually does. BTW, good luck coding, I love coding and it is lots of fun, just stick with it!
Explanation:
List three tasks that fall under the banner of MAM, and define their purpose.
Answer:
focus on device activation
enrollment and provisioning
licensing, configuration and maintenance
Explanation:
What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours. I’d say mine is
8. Super Mario 64
(sorry guys just all the bottomless pits were an issue and sometimes I was frustrated like with tryna shoot the cannon getting all those coins in the first level and the little corner parts in front of the pyramid but overall rly important and still fun)
8.5/10
7. Super Mario Sunshine
(it’s like Mario 64 but less frustrating without the bottomless pits and have to start all the way over but still has the issue of having to climb all the way up from high areas but those are the only issues with these two and how they have to )
8.8/10
6. Super Mario 3D Land
(not as mind blowing as 3D World or as big as it but still fun)
9/10
5. Bowsers Fury (actual power ups and it’s one interconnected world with a giant bowser and most of it is platforming challenge after platforming challenge which I like in my 3D Mario games)
9.3
4. Super Mario Odyssey (it’s great and not a lot of bottomless pits but the moons don’t feel super worth because of how many there are sometimes I stumble onto them)
9.5/10
3. Super Mario 3D World (I’ve had it since kindergarten ok? Its basically 3D Land but even better with tons of platforming challenges and even tho the first 6 or 7 worlds are a cakewalk the later parts get harder and harder and it’s super fun with friends)
9.9/10
1 & 2 tie Mario Galaxy 1 & 2 (I’ve had the first since I’ve existed and I recently got the second and I somehow feel so nostalgic towards it even tho I’ve never played it before this year (a lot of games from around 2009-2011 I feel nostolgic for even tho I’ve never played them) these two games are basically perfect with the only bad level being cleaning up trash for that robot but with the gravity mechanics and super fun platforming challenges while also being super original they are going to stand the test of time I’m sure of it)
10/10
Answer:
super mario galaxy best of all time
Explanation:
Describe an example of organisms with different niches in an ecosystem.
Explanation:
Organism seems to have its own bearable environments for many ecological parameters and blends into an ecological system in its own unique way. A aquatic species' niche, for particular, can be characterized in particular by the salt content or saltiness, pH, and surrounding temperature it can absorb, and also the kinds of food it can consume.
Give five examples of physical networking.
Answer:
Fully connected Network Topolgy, Common Bus Topolgy, Mesh Network Topolgy, Star Network Topolgy, and Ring Network Topolgy.
Explanation:
What protects your computer so that it doesn't get a computer virus?
Answer:
an anti-virus program such as avg
I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!
2 things are required to make a loop: a. ______________ b. _____________
Answer:
(not quite sure what the question is asking seems you need, but bare minimum is)
an initial value and an increment or decrement
a condition where the loop stops
Explanation:
assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.
e.g. say you want to add up the numbers from 1 to 10, inclusive
sum = 0
for I is 1 to 10 incremented by 1
sum=sum+I
end of loop
Which of the following best describes what a long-term goal is?
:what is the most important part of a computer
:what are the modern processors called
:what is the most important part of a computer
:what is the engine that drives every computer
goodluck :)
Answer:
a
Explanation:
2) Some graphics have usage restrictions on them. What are some copyright laws out there that affect usage of images, graphics, and photos?
(I don’t really understand what they’re asking, any help is appreciated!)
Explanation:
Ok what is Copyright The copy of something without using credit
Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?
Answer: 0
Explanation: 1/2
Answer:
a
Explanation:
What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural light to your advantage?
Answer:
lights
Explanation:
(14) Click on the
sloping forwards
button to change the selected text to appear
(Bold Italic)
Click on which button to change the selected text to appear sloping forward: Mouse button
What are the functions of a mouse?To give you an idea of all the mouse capabilities, here is a list of all the computer mouse functions and options.
Move the mouse pointer on the screen - The primary function is to move the mouse pointer on the screen.
Point - After moving the mouse, you can point something out to another user or a digital object. In a game, for example, you can use the mouse to point a gun in the direction you want to shoot.
Open or run a programme - After pointing to an icon, folder, or other object, clicking or double-clicking that object opens the document or runs the programme. Some programmes even allow you to triple-click. For more information on, please visit our click page.
To know more about Mouse, click on the link :
https://brainly.com/question/14399800
#SPJ1
How does cybercrime impact the economy? Select 3 options,
People lose their job
Intellectual property is stolen,
It stimulates the economy.
Businesses are ruined,
Opportunities are created.
Answer:
People lose their jobs.
Intellectual property is stolen.
Businesses are ruined.
Explanation:
got it right on edge
Cybercrime impact the economy by:
People lose their jobs.Intellectual property is stolen.Businesses are ruined.What is the effect of cybercrime in the economy?The growing rate of cybercrime issues is one that has lead to high cost in the economy of the world and it has also lead to global losses.
Conclusively, a lot of business has closed up due to cybercrime and the government now spends resources that can be used for other purposes to fight cybercrime.
Learn more about Cybercrime from
https://brainly.com/question/25157310
En la historia del Computador porque se caracteriza la primera generación? *
1 punto
a.Por que se reemplazo el ábaco
b.ninguna de las anteriores
c.Por la implementación del calculo
d.Por el uso de tubos de vacío
D. Por el uso de tubos de vacio.
Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.
soak testing.
stress testing
load testing
spike testing
Which term describes the gallery that allows you to customize and format text as a graphic?
Pull Quote
Text Box
WordArt
Drop Cap
Answer:
Word Art
sWord art as the ability to be custom designed and formatted as a graphic
Answer:
Word Art
Explanation:
Best beginner racing drones?
Answer:
Walkera Runner 250
Explanation:
This drone is durable, and offers a lot of features while not totally being over the top!
Which code segment results in "true" being returned if a number is even? Replace "MISSING CONDITION" with the correct code segment.
function isEven(num){
if(MISSING CONDITION){
return true;
} else {
return false;
}
}
A. num % 2 == 0;
B. num % 0 == 2;
C. num % 1 == 0;
D. num % 1 == 2;
Answer:
The answer is "Choice A".
Explanation:
In this code, a method "isEven" is declared that accepts the "num" variable in its parameter, and inside the method and if block is declared that checks the even number condition if it is true it will return a value that is "true" otherwise it will go to else block that will return "false" value, that's why other choices are wrong.
The correct code segment that tests if a number is even is num % 2 == 0
When a number is divided by 2, and the remainder after the division is 0, then it means that the number is an even number.
Assume the variable that represents the number is num
The condition that tests for even number would be num % 2 == 0
Hence, the correct code segment that tests if a number is even is (a) num % 2 == 0
Read more about boolean statements at:
https://brainly.com/question/2467366
Why do computers use binary code?
Answer:
To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand
Answer:
It has two clearly distinct states that provide a safety range for reliability and the least amount of necessary circuitry, which results in the least amount of space, energy consumption, and cost.