The brit lives in the yellow house
the swede keeps dogs as pets
the dane drinks tea
the house colors are arranged in the order of the rainbow from left to right
the owner of the green house drinks coffee
the owner who eats pizza has birds
the owner of the red house drinks milk
the Norwegian lives in the green house
the owner who eats burgers lives immediately to the right of the one with cats
the owner who keeps the horses live next door to the one who eats donuts
the owner who eats hot dogs drinks soda
the german eats pasta
the owner who eats burgers lives next to the one who drinks water

who owns the fish ?

The Brit Lives In The Yellow Housethe Swede Keeps Dogs As Petsthe Dane Drinks Teathe House Colors Are

Answers

Answer 1

Thus, the owner of the fish is the Brit who lives in the Yellow house.

How to solve

Let's summarize and list the information given:

The Brit lives in the yellow house.

The Swede keeps dogs as pets.

The Dane drinks tea.

The house colors are arranged in the order of the rainbow (Red, Orange, Yellow, Green, Blue, Indigo, and Violet) from left to right. Since there are only 5 houses, we can assume the first 5 colors of the rainbow for the houses.

The owner of the green house drinks coffee.

The owner who eats pizza has birds.

The owner of the red house drinks milk.

The Norwegian lives in the green house.

The owner who eats burgers lives immediately to the right of the one with cats.

The owner who keeps horses lives next door to the one who eats donuts.

The owner who eats hot dogs drinks soda.

The German eats pasta.

The owner who eats burgers lives next to the one who drinks water.

Using this information, we can determine the following:

Norwegian lives in the Green house (4th house, based on the rainbow colors).

The Brit lives in the Yellow house (3rd house).

The Dane lives in the Red house (1st house) since the Dane drinks tea, and the red house owner drinks milk.

The Swede lives in the Blue house (5th house) because they are the only nationality left.

The German lives in the Orange house (2nd house).

Now we can assign pets, food, and drinks based on the given information:

Red house (1st house): Dane - Milk - Tea - Donuts - Horses (from clues 3, 7, and 10)Orange house (2nd house): German - Water - Pasta - Cats (from clues 12 and 13)Yellow house (3rd house): Brit - Soda - Hot Dogs (from clues 1 and 11)Green house (4th house): Norwegian - Coffee - Pizza - Birds (from clues 5, 6, and 8)Blue house (5th house): Swede - Dogs (from clue 2)

Since the Swede has dogs, the Dane has horses, the Norwegian has birds, and the German has cats, the only pet left is the fish. Thus, the owner of the fish is the Brit who lives in the Yellow house.

Read more about puzzles here:

https://brainly.com/question/28994707

#SPJ1


Related Questions

If you can’t see the Assets panel, which of these three buttons do you press?

A) Plugins
B) Assets
c) Layers

Answers

Answer: B

Explanation:

The answer is B


Explanation

I did it

TRUE/FALSE. The Pagefile.sys file on a computer can contain message fragments from instant messaging applications.

Answers

The statement "The Pagefile.sys file on a computer can contain message fragments from instant messaging applications" is True, as it serves as a virtual memory file that stores temporary data and information, including from such applications.

The Pagefile.sys serves as virtual memory and acts as a temporary storage space when the physical memory (RAM) is insufficient. When using instant messaging applications, temporary data such as message fragments can be stored in the Pagefile.sys file. T

his occurs because the operating system may swap out inactive data from RAM to the pagefile to free up memory. Therefore, it is possible for fragments of messages from instant messaging applications to be present in the Pagefile.sys file on a computer.

Therefore the statement is True.

To learn more about fragment: https://brainly.com/question/24171021

#SPJ11

what is processing unit?​

Answers

Answer:

A central processing unit, also called a central processor, main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.

Explanation:

Answer:

CPU is processing unit.

The main computer case containing the central components of a personal computer is central processing unit.

what are four basic properties of waves?

Answers

Answer:

Amplitude, Wavelength, Frequency, and Speed.

Explanation:

Amplitude: The maximum displacement of the wave from the centerline (undisturbed position).

Wavelength: The distance from one crest (outer egde of wave) to crest.

Frequency: The number of crests that pass a single point over a unit of time.

Speed: How far the wave travels in a unit of time.

The basic properties of waves are: Amplitude, Wavelength, Frequency

and Speed.

Four basic properties of waves are:

1. Amplitude: The amplitude of a wave is the maximum displacement or distance that a particle in the medium (or the wave itself) moves from its rest position when the wave passes through.

2. Wavelength: The wavelength of a wave is the distance between two consecutive points that are in phase, such as two crests or two troughs. It is measured from one point in the wave to the corresponding point in the next wave.

3. Frequency: The frequency of a wave is the number of wave cycles (complete oscillations) that pass through a specific point in one second. It is measured in Hertz (Hz).

4. Speed: The speed of a wave is the rate at which the wave travels through the medium. It is the distance that a wave travels in a given amount of time.

Learn more about Waves here:

https://brainly.com/question/3381679

#SPJ6

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

Write a python program to change variable value of your previous result percentage to your current percentage of mid-term

Answers

Answer: Make one variable equal to the current percentage and do mid term = current percentage. Then when to put in the current percentage it will always change the midterm score.

Which z/os component manages communications between applications in a parallel sysplex?

Answers

The IBM mainframes, a Cross-system Coupling Facility, or XCF, exists as a component of z/OS that handles communications between applications in a sysplex.

What is Parallel Sysplex in the mainframe?

A sysplex can be either basic or parallel. A basic sysplex can communicate utilizing channel-to-channel (CTC) relationships between LPARs. Parallel Sysplex utilizes something named a Coupling Facility (CF).

IBM® Parallel Sysplex allows you to run multiple replicas of a z/OS as a single image, so you can control multiple systems and resources from a single point of control. In a Parallel Sysplex, operating systems can span multiple systems and transfer their applications and data.

All Parallel Sysplexes should contain at least two CFs and those CFs should be available to every member of the sysplex. z/OS needs a dataset (and an alternate dataset exists suggested for availability) to be transmitted by all methods in the Parallel Sysplex.

To learn more about the z/os component refer to:

https://brainly.com/question/11914151

#SPJ4

Consider the following class definitions: class Animal: def __init__(self, name, habitat): if habitat != self.habitat: raise Exception('{0:10s) is an invalid habitat for animal {1:12s}' format (habitat, name)) self.name = name class Horse (Animal): habitat = 'land' def moves (self): print("\n The horse named {0:10s} gallops on {1:8s)'. format(self.name, self.habitat)) class Whale(Animal): habitat = 'ocean def moves (self): print ('\nThe whale named {0:10s) swims along }',format(self.name)) class Tiger(Animal): habitat = 'mountain def roars (self): print("\nThe tiger named {0:10s} roars aloft in {1:8s)'. format(self.name, self habitat)) class Eagle(Animal): habitat = 'air def moves (self): print("\nThe eagle named {0:10s} soars aloft in {1:8s}'.format(self.name, self. habitat)) class Snake: def _init__(self, name, habitat): if habitat != 'ground: raise Exception('{0:10s) is an invalid habitat animal {1:12s} '. format (habitat, name)) self.name = name def moves (self): print("\n The snake named {0:10s} slithers along'.format(self.name)) What is true about the code in this question after the above definitions are executed and the following global code is executed? Check all that apply. a. the code shows examples of inheritance b. the code shows an example of Python 'Duck typing c. the code shows examples of polymorphic behavior d. each of the classes has a constructor, either inherited as as part of its definition e. None of the listed answers is correct

Answers

The given code demonstrates examples of inheritance, polymorphic behavior, and each class has a constructor, either inherited or defined within its own class. However, the code does not exhibit an example of Python 'Duck typing'.

The following statements are true about the code in this question after the above definitions are executed and the following global code is executed:

the code shows examples of inheritance.the code shows examples of polymorphic behavior.each of the classes has a constructor, either inherited as a part of its definition.

The following class definitions show the following:

a. The code shows examples of inheritance as each of the classes are extending the Animal class. This is shown in the code as `class Horse (Animal):`, `class Whale(Animal):`, `class Tiger(Animal):`, and `class Eagle(Animal):`.

b. The code doesn't show an example of Python 'Duck typing'.

c. The code shows examples of polymorphic behavior as each of the classes have their unique behavior.

d. Each of the classes has a constructor, either inherited as a part of its definition. This is shown in the code as `def __init__(self, name, habitat):` for the `Animal` class, and `def _init__(self, name, habitat):` for the `Snake` class.

Learn more about code demonstrates: brainly.com/question/28338824

#SPJ11

1. A ______ is a block of code that can be run by calling it by name



2. _____ are pieces of information that can be sent to a function


I already solved this.
Answers:
1.Function
2.Parameters
3.function
4.random

Answers

A function is a block of code that can be run by calling it by name.

Parameters are pieces of information that can be sent to a function.

What is a function?

A function can be defined as a named portion of a block of executable code that is written to perform a specific task, which is usually a single, related action and can be run when it is called by name.

This ultimately implies that, a function comprises a group of related statements (block of code) that would only run and returns a data when it is called.

In this context, we can reasonably and logically deduce that a parameter is any information that can be passed to a function when it is called by name.

Read more on function parameter here: brainly.com/question/28249912

#SPJ1

When do you use a while loop instead of a for loop? (Select multiple answers)
1. You do not know how many times a loop will need to run
2. To do number calculations
3. When using a count variable
4. To repeat code.

Answers

Answer:

1. You do not know how many times a loop will need to run

4. To repeat code.

Explanation:

Required

When to use while loop instead of for loop?

Option 1 and 4 answer the question

1. You do not know how many times a loop will need to run

Using while loop in this case is suitable to the for loop.

Take for instance

You want a set of instruction to be repeated until the user enters 1

e.g.

while a != 1:

    print("abc")

    print("def")

    a = int(input("Input: "))

The above is written in Python

The print instructions will be repeated until the user enter 1.

Now, you do not know if the user will enter 1 the first time or the 100th time or the 10000th time.

In other words, you don't know how many times the loop will be executed.

In this case, while loop is preferred to for loop

4. To repeat code:

The same analysis as used in (1) above is applicable in (4).

The print statements in

while a != 1:

    print("abc")

    print("def")

    a = int(input("Input: "))

will be repeated until the user enters 1

The for loop isn't preferable in this case

Other options (2) and (3) can be implemented using both the for loops and the while loops

The while loops allows the execution of a block of code over and over again until a condition or certain conditions are met. The while lop are used instead of the for loop in the following circumstances :

You do not know how many times a loop will need to runWhen using a count variable

Certain loops requires that a condition is met before the loop terminates. While some loops have a clear and predictable number of runs, some do not. Hence, due to this unpredictability, while loops are preferred :

Code snippet in python :

num = int(input())

while num < 5 :

print('invalid')

num = int(input())

Also, when using a count variable, the while loops is more appropriate as also more appropriate ;

Code snippet in python :

count = 20

while count > 0 :

print('available')

count -= 1

Therefore, the while loop is more appropriate for a loop with an unknown number of runs and when using the count variable.

Learn more :https://brainly.com/question/15745784

Web are websites that allow people to congregate online and exchange views on topics of common interest.

a. True

b. False

Answers

Answer:

B

Explanation:

B. False a web is not a Website

what is sensitive compartmented information cyber awareness

Answers

Answer:

Sensitive Compartmented Information (SCI) is a classification label that is put on data and information that is sensitive in nature and belongs to a certain program or department.

Explanation:

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering.

What is the term for this type of NAT router?

a. Next Generation Firewall

b. Last mile technology

c. Demarcation point

d. Point-to-Point Protocol over Ethernet (PPPoE)

Answers

Next Generation Firewall is the term for this type of NAT router. Hence option a is correct.

What is NAT ?

NAT stand for network address translation. It is defined as a method that makes it possible for one distinct IP address to represent a whole network of machines. Most individuals do not use Network Address Translation (NAT), a sophisticated networking configuration.

Before uploading the data, there is a means to map several local private addresses to a public one. Both most household routers and organizations that need many devices to share a single IP address use NAT.

Thus, next generation firewall is the term for this type of NAT router. Hence option a is correct.

To learn more about NAT, refer to the link below:

https://brainly.com/question/28340750

#SPJ1

In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
O A. investigating and reflecting
B. designing
C. prototyping
D. testing

Answers

B draining I’m pretty sure is the answer

8.6 Code Practice: Question 2

Instructions

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.


After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.


Sample Run

How many values to add to the array:

8

[17, 99, 54, 88, 55, 47, 11, 97]

Total 468

Answers

Answer:

import random

def buildArray(a, n):

   for i in range (n):

      a.append(random.randint(10,99))

     

arr = []

def sumArray(a):

   tot = 0

   for i in range(len(a)):

       tot = tot + a [i]

   return tot

       

   

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

print("Total " + str(sumArray(arr)) )

Explanation:

The program is an illustration of lists

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs to the array

n = int(input("How many values to add to the array: "))

#This initializes the sum to 0

sumArray = 0

#This initializes a list

myList = []

#This iterates through n

for i in range(n):

   #This gets input for the list elements

   num = int(input())

   #This appends the input to the list

   myList.Append(num)

   #This calculates the sum

   sumArray+=num

#This prints the list elements

print(myList)

#This prints the sum of the list elements

print("Total",sumArray)

Read more about lists at:

https://brainly.com/question/24941798

You are writing a paper and find some information you want to use in a journal article: Original text: Among students with incorrect answers at pre- and posttest, the largest percentage had trouble recognizing an example of patchwork plagiarism. Apparently, many did not understand that cutting and pasting is plagiarism. Source: Fenster, Judy. "Teaching Note—Evaluation of an Avoiding Plagiarism Workshop for Social Work Students." Journal of Social Work Education, vol. 52, no. 2, Apr-Jun 2016, pp. 242-248. Academic Search Complete, doi:10.1080/10437797.2016.1151278 Entry in your paper: Among students with incorrect answers, most couldn't recognize patchwork plagiarism and did not understand that cutting and pasting is plagiarism. What is your judgment- is this plagiarism?

Answers

Answer:

The answer is "True".

Explanation:

The term Plagiarism is a word, that implies as a form of cheating, which includes the usage, of all or part, of its thoughts, words, designs, arts, the music of anyone else without any of the author's recognition or permission.

In the question, it is already defined that students copy and paste the data, which is lying in the criteria of plagiarism, that's why the given statement is "true".

Next

Emerging Network Technology - Cloud Computing: Mastery Test

Type the correct answer in the box spell all words correctly

Which type of virtualization de storage area networks (ANS) typically use?

SANs typically use

virtualization

Reset

Next

Answers

Answer:

SANs typically use block-level virtualization. Block-level virtualization involves creating virtual copies of physical storage devices, such as hard drives or solid-state drives, and presenting them to the host computer as if they were physical devices. This allows for the creation of multiple virtual storage devices on a single physical storage device, enabling the host computer to access and manage the virtual devices as if they were separate physical devices. Block-level virtualization is commonly used in SANs because it allows for the creation of multiple virtual storage devices with different performance characteristics, such as different capacity or performance levels, that can be tailored to the specific needs of different applications or workloads.

Explanation:

Can someone create a zoom and invite me?

Answers

Answer:

How do you do that

Explanation:

I've never used zoom before

You can't export data from Access to Word. True False

Answers

False. Exporting data from Access to Word is a relatively simple process that can be done in just a few steps. By doing so, you can create documents, reports, and other written materials that include data from your database.

You can export data from Access to Word.Access and Word are part of the Microsoft Office suite of productivity applications. Although they are separate applications, they can be used together to perform a variety of tasks. Access is a database management application that can be used to create, store, and manage data, while Word is a word processing application that can be used to create documents, reports, and other written materials.

While it is true that Access and Word are different applications, they can be used together to perform a variety of tasks. For example, you can export data from Access to Word to create a report or other document that includes information from your database. This process is known as a mail merge.In order to export data from Access to Word, you will need to follow these steps:Open the database that contains the data you want to export.Select the table or query that contains the data you want to export.

Click on the "External Data" tab in the ribbon.Select the "Word" option from the "Export" group.In the "Export - Word Document" dialog box, select the options you want for your export, such as the file name, file format, and data to include.Click "OK" to export the data from Access to Word.

To know more about export data visit :

https://brainly.com/question/14337731

#SPJ11

A(n) ___________ should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.

Answers

A special report should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.

What must accompany claims when using an unlisted procedure code?

Claims that are known to make use of unlisted codes need to be followed by specific information in regards to the service as well as the  procedure and aiding documentation.

Note that documentation is one that differs by payer and as such, due to the above, A special report should always accompany an unlisted procedure code, to describe the procedure and why it was medically necessary.

Learn more about procedure code  from

https://brainly.com/question/1056731

#SPJ1

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

____ is a type of software that is computer oriented. It often manages system resources such as memory, storage, processor use, and network access. An example of this type of software is an operating system.

Answers

System software is a type of software that is computer oriented. It often manages system resources such as memory, storage, processor use, and network access. An example of this type of software is an operating system.

System software is a set of programs that enable the user to interact with the computer and its hardware components. It acts as an interface between the computer hardware and the application software installed on it. It provides a platform for other software to run on. Operating systems, device drivers, utility software, and programming language translators are examples of system software. An operating system is the most common type of system software. It is the primary software that a computer uses to manage its resources.

Learn more about system software:

brainly.com/question/13738259

#SPJ11

blank uses computer resources from multiple locations to solve a common problem.

Answers

Answer:

Grid computing

Explanation:

Worksheet Identify the devices for moving the cursor around your computer screen

Worksheet Identify the devices for moving the cursor around your computer screen

Answers

Wouldn’t it just be the mouse

In a database, which of the following enables you to connect two tables to each other?
field
record
table
database

Answers

The term that enables you to connect two tables to each other in a database is "table".

In a database, a table is a collection of related data entries or records, each of which consists of several fields or columns that store specific pieces of information. To establish a relationship between two tables, you need to identify a common field that exists in both tables. This field is known as a foreign key, and it enables you to link the records in one table to those in another. By connecting two tables in this way, you can retrieve and combine information from both tables as needed.

In more technical terms, the process of connecting two tables in a database involves creating a relationship between them. There are three types of relationships that can exist between tables: one-to-one, one-to-many, and many-to-many. In a one-to-one relationship, each record in one table corresponds to exactly one record in the other table. In a one-to-many relationship, each record in one table can correspond to multiple records in the other table. In a many-to-many relationship, each record in one table can correspond to multiple records in the other table, and vice versa. To create a relationship between two tables, you typically use a database management system (DBMS) that provides tools for designing and managing the database. Most DBMSs allow you to define the relationship between two tables by specifying the foreign key field in one table and the primary key field in the other table. The primary key field is a unique identifier for each record in the table, while the foreign key field contains the same value as the primary key field in the related table. This creates a link between the two tables that enables you to retrieve data from both tables as needed. In summary, the term that enables you to connect two tables to each other in a database is "table". By creating a relationship between two tables using a common field, you can retrieve and combine information from both tables as needed.

To know more about table visit:

https://brainly.com/question/22736943

#SPJ11


The website allrecipes is a clearinghouse for recipes of all kinds, with users being able to post new ones as well as try and comment on the recipes of others. Members can get personalized recommendations and find ways to use ingredients they already have on hand. The allrecipes website would be considered

Answers

Answer:

The right answer is "web community ".

Explanation:

A digital community, commonly known as a social community as well as a web community, seems to be a virtual environment where representatives predominantly communicate over the internet. They become web-based community centers for stakeholders, specialists, collaborators, and many others to resolve issues, post feedback, including communicate with someone on the goods, services, and reputation of an organization. For several internet platforms, a "gang of silly superstitions" can feel most comfortable.

What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers quzlet

Answers

Answer:

A KVM switch.

Explanation:

A KVM switch would be the best solution for a customer to share the monitor, mouse, and keyboard between the two computers assuming he or she has one computer specifically for web services and another for a different purpose.

A KVM is an acronym for keyboard, video and mouse.

Basically, it is a hardware device which enables computer users to connect a keyboard, mouse and monitor (video display device) to several other computers and as such facilitates the sharing of these devices between multiple computers.

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

An algorithm to find the perimeter of a triangle

Answers

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

Other Questions
simplify -26+7r-15p-7p Who expressed concern that political parties were a threat to the ability ofpeople in government to work together?A. Alexander HamiltonC John AdamsB. George WashingtonD. Thomas Jefferson Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to be including a conditional , parameter and loop. I'm suppose to make a library out of it and then use the library to test the code? please help!here is the link to the code.https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVFijy6blqJPMBOgh5tQ5osNhq5cP.S. you cant just type on the link i shared you have to click view code and then remix to edit it. thanks If UW = 25 - 35 and UY = S, find the valueof s that makes quadrilateral VWXY aparallelogram. EXPLAIN IN YOUR OWN WORDS HOW IS OUR EVERY DAY LIFE SOMETIMES LIKETHUNDER?TUNIA Which of the following statements about asexual reproduction is NOT true? A Only one parent sex cell is needed. B The offspring are copies of the parent. C Most single-celled organisms reproduce this way. Dit results in more variation in species than does sexual reproduction nap-shot of part of the contents of the memory. 8-bit address (shown as hex values) 16-bits data (shown as hex values) ... decreasing address values ... -------------- b 7 6 a b b b 8 c 0 2 6 b 9 1 5 b c b a c 3 2 7 b b b f 7 e b c 3 4 b 9 ... increasing addresses values ... --------------- given the above memory values, what value does the following instruction load into the accumulator? load immediate b 7 A manufacturer's marginal-cost function is dc/ dq=0.4q+9. If c is in dollars, determine the cost involved to increase production from 70 to 80 units. The cost involved to increase production from 70 to 80 units is $.....(Type an integer or a simplified fraction.) A piece of string is 120 centimeters long.How long would the piece of string Measure in meters?Picture: if a machine does kj of work after an input of kj of heat, what is the change in internal energy for the machine? change in internal energy Which of the is not a function A company's mission statement typically addresses which of the following questions?Who are we, what do we do, and why are we here? A mixture of purple paint contains 6 teaspoons of red paint and 15 teaspoons of blue paint. To make the same shade of purple paint using 25 teaspoons of blue paint, how much red paint would you need? Use the double number line diagram to help if needed. What are two major advantages and two major disadvantages of having unions in the UnitedStates? Explain each advantage or disadvantage. One of your friends gives you $10 for a charity walkathon. Another friend gives you an amount per mile. After 5 miles, you have raised $13.50 total. Write an equation in slope-intercept form that represents the amount y of money you have raised after x miles.y= (2w2+4w)(w2) divide please tell us what you find most appealing about columbia and why what feature increases the high skim value of the activity report? justified right margins bullet points indented paragraphs what is effective about the activity summary section of the report? Use distributive property to write an expression that is equivalent to 12 + 4x. Draw a diagram that shows the two expressions are equivalent. the cash register subtract $2.50 from a $25 Coffee Cafe gift card for every medium coffee that Kareem buys, how many medium coffees can Korean buy with a gift card. I need slope, y intercept, and equation