Answer:
C - perceptiveness
Explanation:
PLATO
What is the measure of each angle of an equilateral traingle what is that answer is it 30 or 45or 60 or 90 hmmmm
Answer:
60°
Explanation:
The measure of each angle of an equilateral triangle is 60°.
An equilateral triangle is a kind of triangle where all angles are equal to each other.
The sum of angles of a triangle is equal to 180
A triangle has 3 sides
Calculating the measure of each angle,
a + a + a = 180°
3a = 180°
a = 180 / 3
Therefore a = 60°
Explain the process of a for loop and how it is used in code
Ex:
FOR Count= 1 TO 50
.......................
Body
......................
NEXT
Next keeps incrementing count by 1
Hope it helps
What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check digit d)consistency check
Answer:
a) range check
Explanation:
Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.
Basically, there are five (5) main validation methods and these includes;
I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.
II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.
III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.
IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.
V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.
Hence, range check is a validation type you would use to check that numbers fell within a certain range.
For example, 0 < x > 1000 is a range check.
ANSWER ASAP!!!!!
Which statement is true regarding achievers?
A.
Achievers bring about a reduction in socializers.
B.
Achievers interact with the environment.
C.
Achievers cause grief to other players.
D.
Achievers like to interact with other players.
E.
Achievers like to collect points and earn rewards.
Answer:
The correct answer will be:
E. Achievers like to collect points and earn rewards.
Explanation:
All _______ that store more than one piece of data
Answer:All data structure that store more than one piece of data
.
Explanation:
All organizations need good quality cybersecurity to ensure _____. Select 4 options.
operational security
operational efficiency
operational tangibility
operational profitability
operational continuity
Answer:
option 1
Explanation:
it is because they need better security for operational
Answer:
operational continuity
operational profitability
operational security
Explanation:
The most effective leaders treat everyone alike. True True False
Answer:
you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)
Explanation:
Answer:
True
Explanation:
ANSWER ASAP!!!!!
Which statement best describes licensed characters?
A.
They are based on real-life characters from past periods in history.
B.
They are given human qualities, and star in games for young children.
C.
They are based on preexisting media.
D.
They are based on legend and folklore.
E.
They are characters specifically created for a game.
Answer:
my friend thinks its c
hes too smart to be wrong 100% :DDDD
Explanation:
Calculate the value of z. Given v=4, w=5, x=8, y=2z= (v+ w) * x / y;print (“value of z is “, z)
Answer:
value of z is 36.0
Explanation:
Given
[tex]v = 4\\\\w = 5\\\\x = 8\\\\y = 2\\\\z = (v+2)*x/y[/tex]
Required
Print the value of z
To answer this, I will make use of Python and also provide a manual solution:
The program (in python) is as thus:
v = 4
w = 5
x = 8
y = 2
z = (v + w) * x/y
print (“value of z is “, z)
Manually, we have:
z = (v + w) * x/y
z = (4 + 5) * 8/2
Solve the bracket
z = 9 * 8/2
z = 9 *4
z= 36
Either ways, the value of z is 36
2. ¿Cuáles de los siguientes Software son lenguajes de Programación?
A) Word, Excel y Powerpoint
B) C# Java y Visual Basic
C) Pseint, Raptor Flowchart
D) Windows, Linux, Mac OS
B) C# Java y Visual Basic
Q6.
A doctor's surgery provides medical care for people in the local area. The surgery uses Information
Technology to collect, store and process patient data.
Usernames and passwords are used to restrict user access to patient data.
Explain two other ways the surgery can restrict user access.
Anybody know #11 ? I need two ppl to answer this!!! Free Brainliest!!
Answer:
A because system program will give the operating systems and other platform details
Explanation:
I think its A
which tool is used to select adjacent areas of the same colour in an image.
Answer:
Magic wand tool
Hope it helps
Please mark me as the brainliest
Thank you
in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly
Answer:
Wireless LAN
Wireless MAN
Explanation:
I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.
Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a great location, but they are requesting that she send her personal information over the internet. What should Jackie do?
A) Ignore the request and not enter any personal information.
B)Provide only her name and date of birth.
C) Provide only her name and address.
D) Provide the requested information.
PLS HELP ASAP
Answer:
A
Explanation:
She is going to get scam
Answer:
A) Ignore the request and not enter any personal information
Explanation:
I just took the exam and I got this question right
Tema: LA CIENCIA Y SUS APORTES AL MEJORAMIENTOO TÉCNICO SEGUNDO GRADO SECUNDARIA 1.¿Cuál es el inicio de los procesos técnicos y científicos? 2. En la actualidad ¿ De que están hechas la mayoría de las construcciones? 3.¿Que material usaron en la construcción de sus pirámides de los teotihuacanos? 4.Este material de construcción es artesanal, no contamina, es térmico y está hecho con tierra y paja.
Answer:
1. El inicio de los procesos técnicos y científicos es la realización de observaciones objetivas y basadas en hechos previos o recurrentes y verificables como verdaderas o falsas por otros observadores.
2. La mayoría de los edificios de hoy en día están hechos de hormigón que consiste en cemento adherido en una proporción fija con agregados, que se pueden moldear en la forma deseada cuando se convierten en una lechada. El agua del proceso de poro se evapora fácilmente y el hormigón se seca después de varios días para formar una estructura sólida de la forma deseada.
3. El material utilizado en la construcción de las pirámides de Teotihuacanos incluye una roca volcánica, conocida como tezontle tallada
4. Un material de construcción artesanal que no contamina, es térmico y está hecho con tierra y paja es el adobe
Un adobe consiste en una mezcla de paja, arena y arcilla, así como otros materiales fibrosos que se secan al sol después de moldear la mezcla en ladrillos.
Un adobe tiene una alta capacidad calorífica y, por lo tanto, una habitación con paredes de adobe se mantiene fresca en climas cálidos, mientras que en climas fríos, la pared de adobe libera calor lentamente para mantener la habitación caliente
Explanation:
Which validation check can be used on the following data. "XX000"
1. Range
2. Limit
3. Format
4. Length
Answer:
Format and Length
Explanation:
If there is a range or limit on the data, you would need to know more about the format.
3. Rajat wants to assign green colour to a paragraph. Write the code that will help him in completing the task
Answer fast , will mark branliest .
Explanation:
use the style attribute
it connects computers in different cities and different countries
Answer:
I think VPN firewall devices can do that.
what if the result of conectivity testing is 100%Loss?Explain.
Answer:
If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server
Describe how checksum detects errors
Answer:
For error detection by checksums, data is divided into fixed sized frames or segments. Sender's End − The sender adds the segments using 1's complement arithmetic to get the sum. It then complements the sum to get the checksum and sends it along with the data frames.Write a program using for loop to find the cube of numbers from 50-100
FASTT
Answer:
JAVA
for(int i = 50; i <= 100 i++;)
{
int cubedNum = Math.pow(i, 4);
System.out.println(cubedNum);
}
Explanation:
The For loop is set so that it will go the amount of times until the variable i reaches 100, then it will stop increasing i.
Then, we raise i to the 4th power in the loop, and then print it out.
#teamtrees #PAW (Plant And Water)
Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.
Answer:
B
Explanation:
I am big brain
Which of the following are recent trends? Check all of the boxes that apply.
fewer applications
more access points
fewer mobile devices
new applications
Answer:
More access points
New applications
Explanation:
Answer:
2 and 4
Explanation:
Did it on edge
Which statement is not true of mainstream media?
Answer:
The phrase Mainstream Media refers to those media that, due to the size of their presence on the different platforms (TV, radio, internet, newspapers, etc.) have a large audience share, with which everything they manifest in their different spaces is welcomed by a large part of society. Thus, the Mainstream Media have the possibility of forming an opinion and influencing the audience with ease, which leads to these media being criticized for their ideological influences on society.
A group of users in a small publishing office want to share large image files in a common folder with high availability. Which of the following devices would best meet this need?
Networked storage appliance
An SSD for each computer
Large USB flash drive to move the files between computers
Portable external HDD for each user
Answer:
Network storage appliances
Explanation:
Because I just took a test
Examples and meaning of external hardware.
Answer:
External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.
5 examples of hardware?
Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.
Explanation:
Hope this help have a good rest of your day
The following statements describe the use of graphics in presentations.
Graphics should be large enough to be seen by the audience.
Graphics should be used on every slide.
Graphics should be used when they are relevant to the content.
Many graphics will make a boring presentation interesting.
Select all that apply
Answer:
I. Graphics should be large enough to be seen by the audience.
II. Graphics should be used when they are relevant to the content.
Explanation:
Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources, slides or samples.
PowerPoint application refers to a software application or program designed and developed by Microsoft, to avail users the ability to graphically create various slides containing textual and multimedia informations that can be used during a presentation.
Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.
Hence, the following statements describe the use of graphics in presentations;
I. Graphics should be large enough to be seen by the audience.
II. Graphics should be used when they are relevant to the content.
Answer:
I. Graphics should be large enough to be seen by the audience.
II. Graphics should be used when they are relevant to the content.
Explanation:
In honor of Black History Month, write an essay about a black person who has inspired YOU in some way. This person does not have to be famous, it can be a coach, a pastor, or family friend. This essay must be 10 sentences or more.
Answer:
I will be talking about Jackie Robinson. Robinson was known for playing baseball with the Brooklyn Dodgers from 1947 to 1956, I will share a few of his other accomplishment.
In 1935, Robinson graduated from Washington Junior High School and enrolled at John Muir High School Recognizing his athletic talents, Robinson's older brothers Mack (himself, an accomplished athlete and silver medalist, at the 1936 Summer Olympics) and Frank inspired Jackie to pursue his interest in sports.
At Muir high school , Robinson played several sports , football, basketball, track, baseball and tennis. He played shortstop and catcher on the baseball team, quarterback on the football team, and guard on the basketball team. With the track and field squad, he won awards for the broad jump.
In 1936, Robinson won the junior boys singles championship at the annual Pacific Coast Negro Tennis Tournament.
He earned a place on the annual baseball tournament all-star team,
In late January 1937, the News newspaper reported that Robinson "for two years had been the outstanding athlete at John Muir, starring in football, basketball, track, baseball and tennis.
As Jackie was encouraged to move forward by his brothers Mack and Frank. Today, his accomplishments inspires me to keep moving forward.
Explanation:
Which is not a unit of Personal Computer?