01000111 01110101 01100101 01110011 01110011 00100000 01110111 01101000 01100001 01110100 00111111

Answers

Answer 1

12435 425 2 52 35 Guess what?


Related Questions

Consider a text editor that saves a file whenever you click a save button. Suppose that when you press the button, the editor simply (1) animates the button "down" event (e.g., by coloring the button grey), (2) uses the write() system call to write your text to your file, and then (3) animates the button "up" event (e.g., by coloring the button white). What bad thing could happen if a user edits a file, saves it, and then turns off her machine by flipping the power switch (rather than shutting the machine down cleanly)

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The write() method guarantees you to updates the memory of both the kernel, and may not ensure which updates were flushed through stable storage. Unless the client instead switches on either the monitor but views the file, it displays the file, to combines from older and newer versions will be shown. The very first two cases will be deemed "bad" because the user probably can not expect them after completing the save.

Anything a person writes or creates is __________

Answers

Answer:

an artist

Explanation:

Anything from writing, singing, painting, etc. is considered art because it takes creativity.

:) Have a good day.

PLS HELP!!
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your online education.
Make sure that your paper details clearly the type of game, how it will work, and how the student will progress through the action. Also include how the school or teacher will devise a grading system and the learning objectives of the game. Submit two to three paragraphs.

Answers

Incorporating cutting-edge gaming technology into web-based learning can foster an interactive and stimulating educational encounter. A clever method of attaining this goal is to incorporate immersive virtual reality (VR) games that are in sync with the topic being taught

What is the gaming about?

Tech gaming can enhance online learning by engaging learners interactively. One way to do this is by using immersive VR games that relate to the subject being taught. In a history class, students can time-travel virtually to navigate events and interact with figures.

In this VR game, students complete quests using historical knowledge and critical thinking skills. They may solve historical artifact puzzles or make impactful decisions. Tasks reinforce learning objectives: cause/effect, primary sources, historical context.

Learn more about gaming from

https://brainly.com/question/28031867

#SPJ1

what is the name for a pre-formatted word document that provides users with an outline of a final document?

Answers

The name of a pre-formatted Word document that provides users with an outline of a final document is template.

What is a template?

A pre-formatted document called a template can be used as a model for new documents. Organizations frequently use templates as a starting point when writing regular business documents including letters, memoranda, and faxes.

Using a template with a predetermined page layout, fonts, margins, and styles will save you time from having to start building the structure of the business plan from scratch.

Therefore, the template is the name of a pre-formatted Word document that gives users an overview of completed work.

To learn more about template, refer to the link:

https://brainly.com/question/4597980

#SPJ1

write keyboard shortcut to insert footnote and endnote​

Answers

Answer:

Alt + Ctrl + F to insert a footnote.

Alt + Ctrl + D to insert an endnote.

Correct me, if I am wrong :)

Have a great day!

Thanks!

all cell addresses included in a valid formula are outlined in ________.

Answers

All cell addresses included in a valid formula are outlined in absolute notation.

What is cell address?

Cell address is an address or location of a cell in a spreadsheet. It is often referred to as a cell reference, or simply a reference. Cell addresses are composed of the column letter and row number of the cell, such as A1, B2, or X99. The column letter and row number together make up the cell address, which is used to identify the specific cell in the spreadsheet. Cell addresses are often used to reference cells in formulas, making them easier to read and understand. For example, A1*B2 would be much easier to read than the formula (1*2). Cell addresses are also used in macros, allowing users to quickly select the cells that they need to automate a process.

To learn more about cell address
https://brainly.com/question/2146195
#SPJ4

a user is unable to reach by typing the url in the web browser but is able to reach it by typing 172.217.3.110 what is the cause

Answers

.
Hi! You mentioned that a user is unable to reach a website by typing the URL in the web browser but can access it by typing 172.217.3.110. The cause of this issue is likely a problem with the Domain Name System (DNS) resolution.

The DNS is responsible for translating a website's URL into an IP address, like 172.217.3.110, that the web browser can use to find the website. If the DNS server is not functioning properly or if there is an issue with the user's DNS settings, the web browser may not be able to resolve the URL, preventing access to the site using the URL.

To resolve this issue, the user can try resetting their DNS settings or using a different DNS server.

#SPJ11

Cause : https://brainly.com/question/31774307

Final answer:

The problem lies in the system's DNS settings which are unable to correctly translate the URL into an IP address, causing issues in reaching the website.

Explanation:

This issue is related to the system's DNS (Domain Name System) settings. The URL (Uniform Resource Locator) that a user types into a web browser is typically translated into an IP address (like 172.217.3.110) by the DNS. This allows the computer to locate and connect to the server hosting the website. If a user is unable to reach a website by typing the URL but can by typing the IP address directly, it means their system is having trouble translating the URL into the IP address - a DNS issue.

Learn more about DNS Issue here:

https://brainly.com/question/32347842

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

python



# Add a conditional statement that displays

# "Pluto is in our planets list" if Pluto is in the list of planets

# It should display "Pluto is NOT in our planets list" otherwise.







print("Let's add Pluto to our list of planets (even though it technically isn't).")



# Add Pluto to the end of the planets list.



# Add a conditional statement that displays

# "Pluto has been added to the planets list" if Pluto is in the list of planets

# It should display "Pluto has not been added to the planets list" otherwise.



print("Nevermind, let's remove Pluto from the list of planets.")


# Remove Pluto from the planets list


# Add a conditional statement that displays

# "Pluto has been removed from the planets list" if Pluto is not in the list of planets

# It should display "Pluto is still in the planets list" otherwise.

Answers

A complicated world made up of ice mountains and frozen plains, Pluto. Pluto, formerly thought to be the ninth planet, is the most well-known member of a new genus of planets known as dwarf planets.

Thus, In the Kuiper Belt, an area of frozen worlds in the shape of a donut that lies beyond Neptune's orbit, Pluto is a dwarf planet.

These ice objects, also known as Kuiper Belt objects (KBOs) or trans-Neptunian objects (TNOs), may number in the millions in this far-off region of our solar system.

The heart-shaped glacier on Pluto, which is smaller than Earth's Moon, is the size of Texas and Oklahoma. This amazing planet features clear skies, rotating moons, mountains as tall as the Rockies, and snow—but it's red snow and solar system.

Thus, A complicated world made up of ice mountains and frozen plains, Pluto. Pluto, formerly thought to be the ninth planet, is the most well-known member of a new genus of planets known as dwarf planets.

Learn more about Pluto, refer to the link:

https://brainly.com/question/13402868

#SPJ1

An array named Ages holds 10 different ages. Write pseudo-code to increase each age in the array by one. The Ages array should be initialised as follows:

Answers

Answer:

Ages = [12, 15, 20, 18, 25, 30, 40, 32, 28, 50]

for i = 0 to 9 do

Ages[i] = Ages[i] + 1

end for

Explanation:

The above code initializes the Ages array with 10 different ages. The for loop iterates through the array, and for each element, it increases its value by 1. The loop starts at index 0 and goes up to index 9, which are the indices of the 10 elements in the array. After the loop completes, the Ages array will contain the original ages increased by 1.

Review the website you selected for your Week 3 assignment.

Create a 16- to 20-slide Microsoft® PowerPoint® presentation with speaker's notes about your selected website in which you complete the following:

Assess the pros and cons of using an e-mail or newsletter strategy to help build and maintain a core customer base.
Describe any content and/or strategies you believe will help improve customer e-mail open rates and interaction.
Explain how this e-mail/newsletter strategy can be integrated with other social media marketing efforts and online communities to improve brand recognition and website performance.
Evaluate the metrics that should be used to measure the success of the new strategy and processes (i.e., how will you know if your proposed marketing efforts are making an impact?).
Recommend a plan for moving from the current marketing strategy to your proposed strategy.
Assess whether new target customers, products, or services should be included in this updated marketing plan.
Summarize the main points of your strategy and include one-, three-, and five-year projections for the growth you believe will result from the implementation of your strategy.

Answers

I apologize, but I cannot fulfill your request. The question you provided seems to be a specific task or assignment that requires a personal response based on individual research and analysis of a chosen website.


However, I can offer guidance on how to approach the assignment. Here are some steps you can follow:
Select a website for your review. It could be a website of a company, organization, or any other entity that you find interesting and relevant to the topic.

Remember to support your points with relevant examples, data, and references to reliable sources. Good luck with your assignment.

To know more about apologize visit:

https://brainly.com/question/32499461

#SPJ11

Does anyone do scratch? (Its a coding website)

Answers

Answer:

heck yeah i do

Explanation:

What kind of loop should be used in a game where the user is guessing a secret code and the message, “Guess again!” appears until the user guesses correctly?
a for loop
a binary loop
a digital loop
a while loop

Answers

A while loop

In python for example
While x != correct:
Print(“guess again”)

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, after a time, links may no longer work. Can you think of ways that you can avoid broken links?

Answers

Answer:Image Control

We can use the height and width properties to control the size of our image. Let’s say we only want the recipe image to take up approximately one-third of the page. Do you remember from math class what percentage one-third is? Type in the following CSS rule, and watch your picture change size before your very eyes!

img {

   height:33%;

   width:33%;

}

That wasn’t too difficult, right? Let’s make the image stand out a bit more by adding a border. Inside the img rule, add the following declarations:

border-style:dashed;

border-width: 5px;

Your picture should now have a dashed border around it that is five pixels in width. Play around with the different border styles that are available. You should see a drop-down box of choices, including dotted, dashed, double, groove, inset, and outset. You can also adjust the width of your border. Using your informative guessing skills, can you predict what property you might use to change the color of the border? Try it and see if you’re right!

Explanation:

 this is a direct quote from my lesson

Which of the following symbols comes first when a formula or function is written in a spreadsheet?()+=*

Answers

Answer:

Order of Evaluation in Computer:

()

Arithmetic Operators ( * / % + - ) IN THIS ORDER

Relational Operators (< ,<= , >,  >=,  ==,  !=)

NOT

AND

OR

Explanation:

So to answer the question. Here is the order in which they will be written

()

*

+

=

The Product Backlog is baselined at the start of the project and not changed for at least three Sprints

Answers

This statement is incorrect. The Product Backlog is not baselined at the start of the project and is expected to change and evolve throughout the project. The Product Backlog is a living artifact that is continuously updated and refined as the team gains more understanding of the product and its requirements.

In Scrum, the Product Backlog is maintained by the Product Owner and is the single source of truth for all the requirements of the product. The Product Backlog is not a static document, and it is expected to be updated frequently throughout the project as the team learns more about the product, customer needs, and the market.

In fact, one of the principles of Agile software development is to embrace change, which means that the team should be prepared to adapt to changing requirements and priorities throughout the project. The Product Backlog is the primary tool for managing changes to the product scope, and it should be updated frequently to reflect new priorities, insights, and feedback from stakeholders.

To know more about Product Backlog,

https://brainly.com/question/30456768

#SPJ11

how do you add text in Photoshop CC?​

Answers

Explanation:

First select the Type Tool from the Toolbar

Click in the document to view the live preview.

Choose a new font.

Choose a type size.

Add your text.

Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Laura involved?
A.
analysis
B.
design
C.
development
D.
testing
E.
implementation

Answers

Answer:

answer is c

if my answer is wrong than sorry

Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)

Answers

Answer:

dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.

------------------------------------------------------------------------------------------------------------

dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.

Explanation:

what type of data type is 1+78-5​

Answers

Answer:

Integer

Explanation:

Given

\(1 + 78 - 5\)

Required

The datatype

1, 78 and -5 are all numbers and they are without decimal points,

When a number is without decimal, such number is referred to as integer.

Hence, the datatype is integer

I WILL MARK BRAINLIEST
Create a concept for a new social media service based on new technologies. The service must include functions or features that require using rich media and geolocation or some other location-sharing technology that you have researched.

Submit your plan using both text and visual elements (graphics or drawings).

These are some key points you need to cover in your concept document:

What type of social media service is it?
What is the purpose of the service?
List the functions that the service provides.
List the features that the service provides
What makes the service unique?
Who is the target audience?
What type of layout did you use for the service?

Answers

Answer:... what are the answers u got

Explanation:

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

When walking in a group single file What should the person in the front do?.

Answers

When walking in a group single file, the thing that the person in the front should do is that the person need to have the gun as it will be or must pointed ahead but it should not be over the shoulder.

What is single file?

The term single file is seen as a line of objects or persons that is only one broad.

Therefore, in regards to the above, The person in the lead should always point the gun forward and never over their shoulder. The firearm must be held at an angle by the person in the middle. The hunter in the back may aim the gun in either the front, side, or rear.

Learn more about single file from

https://brainly.com/question/29310255
#SPJ1

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

racs use a software program to analyze a practice’s claims, looking for

Answers

Software program for claims analysis and error detection.

What are some common software development methodologies used in agile project management?

RACs (Recovery Audit Contractors) use a software program to analyze a practice's claims, looking for potential billing errors or fraudulent activities.

This software program scans the claims data and compares it to established billing rules and regulations to identify any inconsistencies or irregularities.

By employing automated data analysis, RACs can efficiently review a large volume of claims and identify potential areas of concern, helping to ensure proper billing practices and prevent fraud.

Learn more about Software program

brainly.com/question/1576944

#SPJ11

leroy buys three identical 2 tb ssds to implement a fault tolerant raid configuration. he configures raid 1 using the three disks, and later discover that the total storage is only 2 tb. what alternative, if any, does leroy have?

Answers

Leroy bought three identical 2 TB SSDs to use for a fault-tolerant RAID configuration, which he then configured as RAID 1. He later discovered that the total storage capacity was only 2 TB and wants to know if there are any alternatives.

RAID 1 creates an exact copy of data on two drives, resulting in redundancy and data protection in the event of a disk failure. Leroy's RAID 1 configuration resulted in a 2 TB storage capacity because all three drives are exact copies of one another, and the total storage capacity of a RAID 1 configuration is equal to the capacity of a single drive. Leroy has two options if he wants to increase his storage capacity: He can either replace the 2 TB SSDs with higher-capacity SSDs or configure the drives as RAID 5. By using RAID 5, Leroy can use all three drives and still have data redundancy while increasing his storage capacity.

In conclusion, RAID 1 does not increase the storage capacity of the drives and provides redundancy instead. If Leroy wants to increase the storage capacity, he can replace the 2 TB SSDs with higher-capacity SSDs or configure the drives as RAID 5.

To know more about RAID visit:
https://brainly.com/question/31925610
#SPJ11

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Answers

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

Anyone who uses search engines should be aware that the content of their searches could become public.


True or false

Answers

The given statement "Anyone who uses search engines should be aware that the content of their searches could become public." is true.

Using search engines does come with the risk that the content of searches could potentially become public. While search engine providers generally prioritize user privacy and take measures to safeguard user data, it is still important for individuals to be aware of the potential risks and exercise caution when conducting searches.

Search engine data collection: Search engines collect data about users' search queries, including the terms they search for, the time and date of the searches, and sometimes the user's IP address or location. This data is typically used to improve search results and provide personalized recommendations.

Data retention: Search engines may retain this search data for varying periods of time, depending on their privacy policies and legal obligations. Even if the data is initially anonymized, there is a possibility that it could be linked back to individual users through other means.

Data breaches: While search engines implement security measures to protect user data, data breaches can still occur. In the event of a breach, search data could potentially be exposed to unauthorized parties, including the content of users' searches.

Legal requests and government surveillance: Search engines may be subject to legal requests or government surveillance, which could lead to the disclosure of user search data. In certain jurisdictions, search engines may be required to comply with court orders or government demands to provide access to user data.

Third-party data sharing: Search engines often have partnerships or advertising networks that may collect user data for targeted advertising purposes. This data sharing could involve sharing search history or search preferences with third parties, potentially exposing the content of searches to external entities.

Given these factors, it is important for individuals to understand that there is a potential risk that the content of their searches could become public. While search engines strive to protect user privacy, it is advisable to exercise caution, be mindful of the information being searched for, and consider using additional privacy-enhancing measures, such as using encrypted search engines or virtual private networks (VPNs), if desired.

For more such questions on search engines, click on:

https://brainly.com/question/512733

#SPJ8

the workstations and servers are quite obvious. what are some other things you should add to your shopping list?

Answers

Other items you should add to your shopping list include a high-capacity data storage facility and electronic name badges for each team member.

How do forensic workstations work?

Forensic workstations are top-of-the-line computers with lots of memory, disk storage, and quick processing. These workstations can do crucial tasks such data duplication, data recovery from erased files, data analysis across the network, and data retrieval from slack.

What two duties fall within the purview of an acquisitions officer at a crime scene?

A list of storage media, such as detachable disk photos of equipment and windows taken before they were taken down, is included in the documentation of the materials the investigating officers gathered using a computer.

To know more about workstations visit :-

https://brainly.com/question/13085870

#SPJ4

Other Questions
HELP ASAPPPPPPP PLZZZZZZZ Two trains start from Fort Worth traveling at the same speed. The trip for Train W takes 20 hours, while the trip for Train Z takes 25 hours. If the city Train Z is traveling to is 400 miles farther away than the city Train W is traveling to, how far will Train Z travel in total to reach its destination?a) 1,200 milesb) 480 milesc) 2,400 milesd) 2,000 milese) 1,600 miles The vast majority of World War II casualties were among ___ When the burglars were caught trying to break into the office of the DNC Chairman, what was the initial reaction of President Nixon Lf one of the root of the equation X^2-4x+k=0 exceeds the other by 2 then find the roots and determine the value of k the mean of the t distribution is a. .5. b. 1. c. 0. d. problem specific. Wright Mills advocated the use of the sociological imagination to view divorce in the United States because divorce a) has been a serious problem throughout history b) is not just an individual's personal problem but a societal concern c)is a serious personal problem for numerous men and women d)may create emotional scars for divorcees Find the value of x in the figure. A book has a front and back and 400pages the front and back are 0.9mm thick to 1 decimal place and each page is 0.13mm thick to two decimal places calculate the minimum thickness of book Which company used techniques such as a profit distribution system, fixing retail prices, and endorsements and licensing connections to establish itself as an industry standard? Select the correct text in the passage.Which sentence correctly uses parallel structure? Manual is a word processor operator and makes $11.50 an hour. How much is his gross earnings for one week if he worked a total of 52 hours? Determine regular pay, and overtime pay How to reduce 0.35 to the lowest term Help show how you got it In what ways is the Silk Road significant? Please help 100pts!! And I need 2-3 sentences! New technology in allows producers to use materials from all over the world to manufacture goods. Exercise 5 Complete each sentence by adding the adverb in the form indicated.He knew the material in the chapter ___________ better than anyone else. (well, comparative) Exercise 1 Draw one line under the simple subject and two lines under the simple predicate. Circle the direct object. At the end of the sentence, write the word what? or whom? to tell which question the direct object answers.All the planets orbit the sun. during the process of alternative rna splicing, where on a pre-mrna transcript does a spliceosome bind? Pls help find the area of the smaller sector.