Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)
Explanation:
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera
Answer:
Hi not able to understand your language
images that are made up of pixels and cannot be resized without losing quality?
Answer:
there are no known pictures that can be zoomed in and not lose quality. they will all be pixelized. mostly everything on a computer is made of pixels.
Explanation:
hope this helps!
~evita
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
What is an "Expert System"?
If you can’t answer pls leave It
Answer:
program that use artifical intelligents
Explanation:
Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav
BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this
also i love u grammarly
Answer:
I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!
Explanation:
Answer:
have u watched euphoria
Explanation:
lol
Posts that you delete _____.
cannot ever be shared
will be released in five years
are still visible to others
may already have been shared
Answer: Below
Explanation:
JAVA
Write a method that takes an ArrayList of Strings, and an int numRepeats and returns a new ArrayList with the original ArrayList repeated numRepeats times.
For example if we had an ArrayList list with the values ["a", "b", "c"]:
repeatArrayList(list, 3)
Should return a new ArrayList with the elements:
["a", "b", "c", "a", "b", "c", "a", "b", "c"]
public ArrayList repeatArrayList(ArrayList list, int numRepeats)
{
}
Answer:
Explanation:
The following code is written in Java. It creates a function that takes in an ArrayList and an int parameter. Then it loops through the array and adds each element into a new array called newList but adds them the number of times that the numRepeats argument states. Output can be seen in the attached image below.
import java.util.ArrayList;
class Brainly{
public static void main(String[] args) {
ArrayList list = new ArrayList();
list.add('a');
list.add('b');
list.add('c');
ArrayList newList = repeatArrayList(list, 3);
System.out.println(newList);
}
public static ArrayList repeatArrayList(ArrayList list, int numRepeats) {
ArrayList newList = new ArrayList();
for (int x = 0; x < numRepeats; x++) {
for (int i = 0; i < list.size(); i++) {
newList.add(list.get(i));
}
}
return newList;
}
}
write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz
Answer:
The program is as follows:
5 INPUT A,B
6 PROD = A * B
7 PRINT PROD
8 TOTAL = A + B
9 PRINT TOTAL
10 DIFF = A - B
11 PRINT DIFF
12 END
Explanation:
This gets input for the two numbers
5 INPUT A,B
This calculates the product
6 PROD = A * B
This prints the calculated product
7 PRINT PROD
This calculates the sum
8 TOTAL = A + B
This prints the calculated sum
9 PRINT TOTAL
This calculates the difference
10 DIFF = A - B
This prints the calculated difference
11 PRINT DIFF
This ends the program
12 END
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true
You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem
Answer: Configure port security on the switch
Explanation:
Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.
When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.
Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
Answer:
insert text box
Explanation:
Explanation:
format tab
Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.
Match the roles to the task they perform.
gather requirements
create software framework
identify errors in the software
develop program code for software
Role
software architects
business analysts
programmers
testers
Software Architects: “develop program code for software”
Business Analysts: “gather requirements”
Programmers: “create software framework”
Testers: “identify errors in the software”
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
20 POINTS-
can someone help with this?
Answer:
large storage= data warehouse
data from daily= world wide
data storaage= transactional
online data= relational
I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D
Explanation:
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
What is the difference between electrical and electronic devices?
Answer:
A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.
Answer:
the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.
Explanation:
i hope it helps ;)
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability
Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
Answer:
Both animal and plant cells have mitochondria, but only plant cells have chloroplasts. ... Because animals get sugar from the food they eat, they do not need chloroplasts: just mitochondria.
1. What is a Network?
A.an arrangement of intersecting horizontal and vertical lines.
B.a group or system of interconnected people or things.
C.files on a computer
D.a device drive used to carry information
B. a group or system of interconnected people or things
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals
1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard
Answer:
Explanation:
Option B monitor is the correct answer
Answer:
ans is a
hello
myself swapna
Which of the two previously described wing designs should result in a longer flying time?
Answer:
If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.
When do you need to apply for a federal student loan?
Answer:
Explanation:
In order to apply for federal student loans, you must fill out your FAFSA during a specific time. The federal deadline for completing your FAFSA is generally very forgiving — meaning that it comes very late in the school year.
what are the answers for Quiz 7 answers computer science principles
Answer:
unknown
Explanation:
this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this
another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence
that and people are more willing to answer one question at a time then a whole quiz lol
not saying what you are doing is bad, its just impractical and not an easy way to go about this
hope you find the answers you need, have a great day/night mate :D
Write a program that asks the user for the name of a file. The program should display the contents of the file with each line preceded with a line number followed by a colon. The line numbering should start at 1. (You can create a file and populate it with some data, then run your program to open that file and display the contents line by line with the number of the line preceding the line data)
Answer:
Explanation:
The following program is written in Python. It asks the user for the file name (which needs to be in the same directory as the program) and reads the file. It then splits it by lines and saves it into an array. Then it loops through the array, printing each line with its corresponding line number.
file_name = input("File Name: ")
f = open(file_name, 'r')
lines = f.read().split('\n')
for line in lines:
print(str(lines.index(line) + 1) + ': ' + line)