Answer:
application programs
Explanation:
Have a nice day!
what are some technologies that professional coders use to be better at their job
please list at least 5
Answer:
Software application developer.
Web developer.
Computer systems engineer.
Database administrator.
Computer systems analyst.
Software quality assurance (QA) engineer.
Business intelligence analyst.
Computer programmer.
Explanation:
Software application developer.
Web developer.
Computer systems engineer.
Database administrator.
Computer systems analyst.
Software quality assurance (QA) engineer.
Business intelligence analyst.
Computer programmer.
C++
Javascript
Coding Training Courses
write a note on antispyware progrmaes?
Answer: See explanation
Explanation:
Spyware refers to the software that has
a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.
Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.
Answer:
Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.
Match the example with the type of collection.
{'casa': 'house'}
[3, 5]
(3, 5, 'dog')
Answer: First is a dictionary, second is a list, and third is a tuple
Explanation:
A_______VPN connection is a private network that uses a public
network to operate.
A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site
Answer:
letter c. point to site po sagot diyan
URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.
I don't see a difference. Otherwise, they both are correct.
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?
Assignee
Client
Delegate
Manager
Answer:
I think it's B, Delegate
Explanation:
Cause the other options didn't seem to fit as the answer.
I really don't know though.
A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).
What is a mailbox?A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.
A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.
When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.
Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.
Thus, the correct answer would be option (C).
Learn more about the mailbox here:
https://brainly.com/question/28430685
#SPJ6
subtract 9 from 17 using tools complement computer science class 11th
Page orientation is determined in Microsoft Word from the __________ tab
Answer:
Page orientation is determined in Microsoft Word from the Page Layout tab.
Explanation:
The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.
which power plan on a portable windows 8.1 system sets the maximum processor state value to 70%?
The power plan on a portable Windows 8.1 system that sets the maximum processor state value to 70% is the Power Saver plan.
Windows 8.1 includes several power plans that allow users to manage power settings on their portable devices. The Power Saver plan is designed to conserve battery power by reducing the performance of the system. One of the ways it does this is by limiting the maximum processor state to 70%. This means that the processor will not run at full capacity, which can help to extend battery life. Other power plans, such as Balanced and High Performance, allow the processor to run at higher speeds, which can be useful for tasks that require more processing power.
Users can switch between power plans by accessing the Power Options in the Control Panel. By default, the Power Saver plan is not displayed on the Power Options page, but it can be enabled by clicking on the "Show additional plans" option.
Learn more about power plans and power options in Windows 8.1 here:
brainly.com/question/14594383
#SPJ11
According to the article, What’s is the relationship between owning a personal computer and later success in computer?
Note that the relationship between owning a personal computer and later success in computer is relative ot several factors.
What are the factors that can help one to be succesful in computer if they own one?The key to being successful in computers is not just owning a ocmputer, Although owning one can improve ones chances of being proficient at one.
Some of the factors that can influence one being successful in being proficient in the use of computer are:
consistent practice in a given niche of computer science andconsistent education in a selected niche of computer science.So owning a computer only makes the above possible. It is correct to state thus, that owning a ocmputer is not enought to make someone successful as a computer scientist if they don't invest in education or practice.
Learn more about computers at:
https://brainly.com/question/21080395
#SPJ1
Who invented the television and what year did color come out? Explain
The television was not invented by a single person, but its development involved contributions from several inventors and engineers.
How is this so?Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.
As for color television, it was first introduced commercially in the United States in 1953 by RCA.
The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.
Learn more about television at:
https://brainly.com/question/12079773
#SPJ1
can anyone unscramble this words
Answer: The one that is gtenemamna might be management
Explanation: this is impossible but this is my best guess.
the use of body scanners at airports pose a threat to people’s a) security b) privacy c) ethics d) morality e) shareware f) malware
The use of body scanners at airports poses a threat to people's b) privacy.
Body scanners at airports are security measures implemented to detect concealed weapons, explosives, or other prohibited items that may pose a threat to aviation safety. While these scanners serve a vital security purpose, they also raise concerns regarding the invasion of personal privacy. Body scanners use advanced imaging technologies that create detailed images of a person's body, including sensitive areas that are typically considered private. This intrusion into individuals' personal privacy has led to debates and discussions regarding the balance between security measures and the protection of personal rights. Privacy advocates argue that the use of body scanners may violate an individual's right to privacy and dignity, as it exposes intimate details of their body without their consent. Thus, the use of body scanners at airports is seen as a potential threat to people's privacy.
The other options provided in the question, such as a) security, c) ethics, d) morality, e) shareware, and f) malware, are not directly related to the use of body scanners at airports.
Security: Body scanners are implemented as security measures to enhance safety and detect potential threats, so they contribute to security rather than pose a threat to it.Ethics and Morality: Ethics and morality refer to broader philosophical concepts related to right and wrong, good and bad, and the principles governing human behavior. While the use of body scanners may raise ethical and moral questions regarding privacy and individual rights, it is not the primary threat posed by their use.Shareware and Malware: Shareware refers to software distributed on a trial or evaluation basis, while malware refers to malicious software. These terms are unrelated to the use of body scanners at airports and do not represent threats associated with their implementation.To learn more about Malware: https://brainly.com/question/28910959
#SPJ11
After the recursive sorting step, ____ does not need to combine the sorted sub-arrays.
After the recursive sorting step, merge sort does not need to combine the sorted sub-arrays.
What is merge sort?Merge sort is an efficient, general-purpose, comparison-based sorting algorithm in computer science.
Most implementations yield a stable sort, which means that the order of equal elements in the input and output is the same.
Merge Sort can be used to sort linked lists. Merge Sort is a stable sort, which means that the same element in an array retains its original position in relation to the others.
Thus, a merge sort does not need to combine the sorted sub-arrays after the recursive sorting step.
For more details regarding a merge sort, visit:
https://brainly.com/question/13152286?referrer=searchResults
#SPJ4
To open something, using a key or an electronic device/ to use a password in order to use a mobile phone
Answer:
yes that is true
Explanation:
true or false
trueeeee
a cat5e network cable has a specific color code pinout. in which color specification order would you use to build a cross-over (x-over) patch cable?
To build a cross-over (x-over) patch cable using a Cat5e network cable, you would follow this specific color code pinout order: 1. White/Green, 2. Green, 3. White/Orange, 4. Blue, 5. White/Blue, 6. Orange, 7. White/Brown and 8. Brown.
To build a cross-over (x-over) patch cable using a Cat5e network cable, you would need to follow a specific color specification order. This order is different from the standard straight-through cable color code pinout. The color specification order for building a cross-over patch cable is as follows:
- Pin 1 (white/orange) to Pin 3 (white/green)
- Pin 2 (orange) to Pin 6 (green)
- Pin 3 (white/green) to Pin 1 (white/orange)
- Pin 6 (green) to Pin 2 (orange)
As you can see, the order of the orange and green wires is reversed on one end of the cable. This is necessary to allow for communication between two devices of the same type (e.g. two computers or two switches) without the use of a network hub or router.
In summary, building a cross-over patch cable requires following a specific color specification order that is different from the standard straight-through cable color code pinout. This color specification order enables communication between two devices of the same type.
Know more about the cross-over patch cable
https://brainly.com/question/30887253
#SPJ11
What is the default starting value of i in a for loop?answer choicesa. 0b. 1c. 2d. 10
The initial value of a CSS property is its default value, as given in its definition table in the standard. The default starting value of an I in a for loop is 0, and the default value of a CSS property is its default value.
A default value value is what?Default value is a value that can, under certain conditions outlined in this Directive, be used in place of a real value. It is a value that is derived from a typical value by the application of certain parameters.
Where is the default setting?When a column is created with the default keyword, a default value may be used. When inserting data, the default value is utilized if an explicit value is not given for that column.
To know more about default starting value visit :-
https://brainly.com/question/7120026
#SPJ4
question 2 for what purpose would computer 1 send a ff:ff:ff:ff:ff broadcast arp message to all nodes on network a?
To determine the MAC (Media Access Control) address of a specific IP address: When computer 1 wants to communicate with another device on the network, it needs to know the MAC address of that device. It can send ARP broadcast messages to all nodes on the network, requesting the MAC address of a specific IP address. A device with that IP address will respond with its MAC address, which can then be used by computer 1 to communicate with it.
Media Access Control is a method for signal transmission so that conflicts do not occur when connected to the network. When two computers issue signals simultaneously using network media such as network cables, this condition often causes collisions. This will make the data that is being transmitted damaged or even lost. One way to overcome this problem is to use the Media Access Control method. Because it can function as a traffic light and make data flow stay in the network and avoid data flow experiencing collisions.
You can learn more about Media Access Control here brainly.com/question/29670807
#SPJ4
A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Multiple choice question. relational primary key real
Answer:
relational DBMS
Explanation:
Examples MSSQL
Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves moving computing resources out to the Internet.
a. True
b. False
Answer:
b. False
Explanation:
Cloud computing may be defined as an on-demand availability of any computer system resources. These are especially the data storage as well as the computing power, without the direct active management by a user.
It is the delivery of the computing services which including storage, software databases, analytics, servers, networking and intelligence.
Hence the answer is false.
what is the name of the study involving participants who administered what they believed to be a series of increasing shocks to actors when prompted by a researcher in a white lab coat?
The study is known as the "Milgram Experiment." This study was designed and conducted by Stanley Milgram, a psychologist at Yale University, in the 1960s. The experiment was designed to test the obedience of individuals to authority figures and the extent to which people would comply with orders to administer what they believed to be dangerous and potentially lethal electric shocks to another person.
In the experiment, participants were instructed to administer what they believed to be increasing levels of electric shocks to an actor playing the role of a "learner" whenever the learner made a mistake on a task. The participant was told that the shocks would increase in intensity each time the learner made a mistake.
Despite the pleas and cries of the learner, many participants continued to administer the shocks as instructed by the authority figure (the researcher in the white lab coat). The results of the Milgram Experiment showed that the majority of participants were willing to obey authority figures and administer what they believed to be dangerous electric shocks to another person, even when they were clearly uncomfortable with doing so.
The results of the Milgram Experiment have important implications for understanding the power of authority and obedience. It highlights the ease with which people can be influenced to act against their moral principles and conscience when instructed by an authority figure. The experiment has been widely criticized for its ethical implications and the use of deception on participants, and it would not be possible to conduct such a study today due to ethical considerations.
To know more about Milgram Experiment: https://brainly.com/question/19328289
#SPJ4
3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
sales to find desirable items, fix them up, and then resell them online for much higher prices. Megan's
apartment is broken into and items valued at $2500 are stolen. How much would her renters insurance cover?
a. $0, because she'd need small business insurance to cover those losses
b. $200
c.
$1000
d. $2500
Answer:
a
Explanation:
Megan doesn't have a registered business. She can't claim insurance
The amount that she would use for her renters insurance cover is $0, because she'd need small business insurance to cover those losses.
What is business insurance?This is known to be a kind of cover that helps against business losses as a result of events that could have happen.
Note that The amount that she would use for her renters insurance cover is $0, because she'd need small business insurance to cover those losses as that is what the insurance does.
Learn more about business from
https://brainly.com/question/24553900
#SPJ5
A flower is an example of _______________? (Select the best answer.)
Question 2 options:
Water
Soil
Fauna
Flora
Air
Answer:
flora
Explanation:
Flora is plant life; fauna refers to animals. Fauna derives from the name of a Roman goddess, but the handiest way to remember the difference between flora and fauna is that flora sounds like flowers, which are part of the plant world; fauna, however, sounds like "fawn," and fawns are part of the animal kingdom.
Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons on the micro:bit.
Answer:
Say you already have the A and B buttons hooked up. You can still use the tape or foil to hook more things up to the micro:bit.
Explanation:
Answers for 1-6 on 9.3 Lesson Practice Edhesive?
Answer:
1.two
2.row, columns
3.will
4.realize
5.fabric
6.bandana
Explanation:
If this is the quiz after the videos here are the answers that got me through it
disadvantages of computer.
Answer:You cant carry it around like a phone
Explanation:
represent the following decimal numbers in binary using 8-bit signed magnitude, one's complement, two's complement, and excess-127 representation:
The decimal numbers will be represented in binary using four different representations: 8-bit signed magnitude, one's complement, two's complement, and excess-127 representation.
8-bit signed magnitude representation: In the signed magnitude representation, the leftmost bit is used as the sign bit. A '0' sign bit represents a positive number, while a '1' sign bit represents a negative number. The remaining 7 bits represent the magnitude of the number. For example, the decimal number -5 would be represented as 10000101 in 8-bit signed magnitude representation.
One's complement representation: In one's complement representation, negative numbers are represented by flipping all the bits of the positive number's binary representation. The leftmost bit still represents the sign. For example, the decimal number -5 would be represented as 11111010..
Two's complement representation: In two's complement representation, negative numbers are represented by taking the one's complement of the positive number and adding 1 to the result. The leftmost bit still represents the sign. For example, the decimal number -5 would be represented as 11111011 in two's complement representation.
Excess-127 representation: Excess-127 representation is commonly used in floating-point arithmetic. In this representation, the number is offset by a bias value, which is 127 in this case. The decimal number is first converted to its 8-bit binary representation. Then, 127 is added to it to get the excess-127 representation. For example, the decimal number 5 would be represented as 10000100 in excess-127 representation.
Learn more about magnitude here; brainly.com/question/31022175
#SPJ11
(Python 3.5, short and simple codes please)Two non-negative integers x and y are equal if either:Both are 0, orx-1 and y-1 are equalWrite a function named equals that recursivelydetermines whether two parameters (both containing integer values)are equal and returns True or False.
The programs that illustrate the non-negative integers x and y is given below:
def equals(x, y):
if x == 0:
return y == 0
elif y == 0:
return x == 0
else:
return equals(x - 1, y - 1)
What is a program?A computer program is a set of instructions written in a programming language that a computer can execute. The software includes computer programs as well as documentation and other intangible components.
The ways to do the program will be:
Define the program's purpose. Consider the program that is currently running on the computer. Create a program model using design tools. Examine the model for logical flaws. Create the source code for the program. Build the source code. Correct any compilation errors that were discovered.Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
How is your mental health as you're returning to school virtually or in
person at this stage of the pandemic? Do you feel hopeful, exhausted,
overwhelmed or something else? Why?
Answer:
My Answer is Below.
Explanation:
I have been experiencing stress, anxiety, fear, sadness and loneliness. And mental health disorders, including anxiety and depression, slowing it's going away once I get to talk to my friends and get to interact with others. Even though I get lots of anxiety from talking in public. I actually feel all of those hopefuls, exhausted, overwhelmed and more, because it's hard at home especially when my mom is really sick with brain cancer, since she was 12 yrs old now 40 yrs old. It's a lot to take in but I'm still trying.
Hopes this Helps :D
If a request is made to use a resource that is busy, the request is dropped and must be re-issued. T/F
True, if a request is made to use a resource that is busy, the request is dropped and must be re-issued.
The request is dropped: In some systems, if a request is made to use a resource that is currently busy, the system may simply drop the request without attempting to fulfill it. This is often the case in real-time systems, where it is important to prioritize certain tasks over others.
The request is queued: In other systems, if a request is made to use a busy resource, the request may be placed in a queue and processed when the resource becomes available. This is common in many computer systems, where multiple processes may be competing for limited resources.
Therefore, the statement "if a request is made to use a resource that is busy, the request is dropped and must be re-issued" is false in general. The actual behavior depends on the system or resource being used.
Learn more about such Requests at:
https://brainly.com/question/30244337
#SPJ11