plsss help me

1)give 2 examples of systems that you use or see in your day-to-day life​

Answers

Answer 1

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.


Related Questions

Please help. Will give brainliest

Answers

I don’t understand it sorry :(.

Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check

Answers

Answer:

Essayons

Explanation:

the answer is Language

write an essay about yourself based on the dimensions of ones personality​

Answers

I don’t think that we can answer this question, since it’s based on yourself.

What was the name of first computer?

Answers

The ENIAC (Electronic Numerical Integrator and Computer) was the first electronic programmable computer built in the U.S. Although the ENIAC was similar to the Colossus, it was much faster, more flexible, and it was Turing-complete.

Emma was typing two pages in her document. When she was typing, she wanted to undo an error. A few lines later, she wanted to repeat the
action that she had last performed
After her typing was done, Emma wanted to improve the formatting of the document. Therefore, she cut the subheading on the first page
and pasted it on the second page. She also copied a paragraph from the first page and pasted on to the second page. Arrange the tiles
according to the keyboard shortcuts Emma used when she was typing.

Answers

Answer:

I don't know what the options are, but here is my answer:

Ctrl + Z (Undo - "When she was typing, she wanted to undo an error.")

Ctrl + Y (Redo or repeat - "A few lines later, she wanted to repeat the

action that she had last performed")

Ctrl + X (Cut - "Therefore, she cut the subheading on the first page")

Ctrl + V (Paste - "and pasted it on the second page.")

Ctrl + C (Copy - "She also copied a paragraph from the first page")

Ctrl + V (Paste - "and pasted on to the second page.")

Hope this helped! (Please mark Brainliest)

In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }

Answers

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.

True/False

Answers

Answer:

Yes they are to programmer

Explanation:

Plz give me brainiest

Answer:

true

Explanation:

A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.

Answers

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

Encryption are used to protect data and files when they are is being transmitted

The encryption program written in Python, where comments are used to explain each line is as follows:

#This gets input for the number

num = int(input())

#This converts the number to string

digit = str(num)

#This creates a list

myList = list()

#This encrypts the number, and add the numbers to a list

for i in digit:

   d = str((int(i) + 3)%10)

   myList.append(d)

#This prints the result of the encryption

print(int("".join([myList[2],myList[3], myList[0], myList[1]])))

Read more about encryption at:

https://brainly.com/question/14298787

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:B

Explanation: its the nucules

The answer most likely is B

which of the following file formats cannot be imported using Get & Transform

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table  

B.)CVS  

C.)HTML  

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

How DNS service are to be deployed on the network (15 -30 words)

Answers

Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an even greater impact on your life.

2. Identify one environmental and organizational background imperative of a contemporary technology. How might those conditions have influenced that technology’s development?3. Solve (2011) uses the hammer and an example of his concept polypotency; what are some other examples of familiar artifacts?

Answers

Explanation:

1- The cell phone is a modern technology that has been developing and gaining new features in addition to being just a device for making phone calls. Currently cell phones perform the same tasks as computers, making it possible to exchange information from the internet, share media, etc.

The development of smartphones will still be significant and will impact even more on the lives of all users, as an essential device for communication at work, and through software developed for cell phones that facilitate human life, such as through the possibility of making purchases , order a taxi, carry out bank transactions, etc.

2- A management information system is a technology aimed at organizations, in order to assist a manager in the decision-making process.

An MIS is an intelligent system that uses a large volume of data and information to generate information and solutions so that a manager has a greater chance of analyzing a scenario in the organization, and makes a more effective decision for the company.

The system is derived from procedures and interaction between people, which generates constant learning and improvement focused on organizational decisions.

MIS was created to assist current organizational management, whose processes derive from a large amount of data and information, in addition to the high competitiveness in the market, which requires decisions to be made quickly, effectively and at the lowest cost.

3- The cell phone and the computer are examples of polypotent technologies, that is, those that are used for purposes greater than those for which they were created, for example, the computer was created to compute data, and the cell phone to make telephone calls, but currently perform functions of being media sharing, communication and leisure equipment.

/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}

/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}

function
move();
turnRight();
move();
move();
turnLeft();
move();
}

i need help finding the issues

Answers

anything

Explanation:

I know what to say this time

Answer:

turn right

Explanation:

i think sorry if it is wrong

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:

C

Explanation:

Animal cells each have a centrosome and lysosomes, whereas plant cells do not. Plant cells have a cell wall, chloroplasts and other specialized plastids, and a large central vacuole, and animal cells do not.

what's a website layout

Answers

Answer:

Explanation:

A website layout is a pattern (or framework) that defines a website's structure. It has the role of structuring the information present on a site both for the website's owner and for users. It provides clear paths for navigation within webpages and puts the most important elements of a website front and center.

Effective home page layout is all about making your website easy to use and navigate. It allows you to steer your visitors' focus to things you want them to pay extra attention to. Let's get started on what to include in an effective home page, and we'll dive into some specific examples and layouts!

Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save those ten numbers in the reverse order. Display the original array and new array. Then define two separate methods to compute the maximum number and minimum number of the array.Sample Run:Please enter 10 numbers: 1 3 5 8 2 -7 6 100 34 20The new array is: 20 34 100 6 -7 2 8 5 3 1The maximum is: 100The minimum is: -7Bonus: Determine how many numbers are above or equal to the average and how many numbers are below the average.

Answers

import java.util.Scanner;

import java.util.Arrays;

public class JavaApplication47 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Please enter 10 numbers: ");

       String [] nums = scan.nextLine().split(" ");

       int newNums[] = new int [nums.length];

       int w = 0, total = 0, above = 0, below = 0;

       for (int i=(nums.length-1); i>=0;i--){

           newNums[w] = Integer.parseInt(nums[i]);

           w++;

       }

       System.out.println("The old array is: "+Arrays.toString(nums));

       System.out.println("The new array is: "+Arrays.toString(newNums));

       Arrays.sort(newNums);

       System.out.println("The maximum is: "+newNums[9] + "\nThe minimum is: "+newNums[0]);

       for (int i : newNums ){

           total += i;

       }

       total = total / 10;

       for (int i : newNums){

           if (i >= total){

               above += 1;

           }

           else{

               below += 1;

           }

       }

       System.out.println("There are "+above+" numbers above or equal to the average.");

       System.out.println("There are "+below+" numbers below the average.");

   }

   

}

I hope this helps!

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should:

Answers

Answer:

import random

def simulateRound(choice, options):

   compChoice = random.choice(options)

   if choice == compChoice:

       return ["Tie", compChoice]

   elif choice == "rock" and compChoice == "paper":

       return ["Loser", compChoice]

   elif choice == "rock" and compChoice == "scissors":

       return ["Winner", compChoice]

   elif choice == "paper" and compChoice == "rock":

       return ["Winner", compChoice]

   elif choice == "paper" and compChoice == "scissors":

       return ["Loser", compChoice]

   elif choice == "scissors" and compChoice == "rock":

       return ["Loser", compChoice]

   elif choice == "scissors" and compChoice == "paper":

       return ["Winner", compChoice]

   else:

       return ["ERROR", "ERROR"]

def main():

   

   options = ["rock", "paper", "scissors"]

   choice = input("Rock, Paper, or Scissors: ")

   choice = choice.lower()

   if choice not in options:

       print("Invalid Option.")

       exit(1)

   result = simulateRound(choice, options)

   print("AI Choice:", result[1])

   print("Round Results:", result[0])

if __name__ == "__main__":

   main()

Explanation:

Program written in python.

Ask user to choose either rock, paper, or scissors.

Then user choice is simulated against computer choice.

Result is returned with computer choice.

Result is either "Winner", "Loser", or "Tie"

Cheers.

Please solve the ones you can. Solving Both will be appreciated. thank you

Answers

Answer:a=b+c=2ca

Im not sure about this answer

Explanation:

Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note​

Answers

Answer:

End note, I think plz tell me if im wrong thank you

which of the following file formats cannot be imported using Get & Transform?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table

B.)CVS

C.)HTML

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Answers

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

Answer:

D.  

triple Data Encryption Standard (DES)

Explanation:

                                       Sincerely : Baby weeb

UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE​

Answers

Explanation:

A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.

fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating

Answers

Answer:

that's a good fact about yourself the more love that better

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

An inkjet printer’s output appears to have missing elements. What is the first thing a technician should try if the ink cartridge appears to be full?

Answers

Answer:

Check the printing properties or print test page.

Explanation:

In a situation whereby an inkjet printer’s output appears to have missing elements. The first thing a technician should try if the ink cartridge appears to be full to "Check the printing properties."

This helps to serve as a maintenance technique or solve the ink cartridge problems.

Depending on the windows or PC's Operating System. To check the printer's properties on Windows 7, a user will have to click on the “Start” button > Control panel > Devices and Printers. Followed by right-clicking the printer icon and open up “Printer Properties” and click “Print Test Page”

Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.

Answers

Answer:

MULTITASKING OS

Explanation:

MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.

Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously

Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.

Write a complete program that reads a string and displays the vowels. The vowels are A, E, I, O, U and a, e, i, o, u. Here are three sample runs:Sample Run 1Enter a string: Welcome to PythonThe vowels are eoeooSample Run 2Enter a string: Student UnionThe vowels are ueUioSample Run 3Enter a string: AREIOUaeiouRTEThe vowels are AEIOUaeiouENote: your program must match the sample run exactly.using python

Answers

text = input("Enter a string: ")

new_text = ""

vowels = "aeiou"

for x in text:

   if x.lower() in vowels:

       new_text += x

print(new_text)

I hope this helps!

Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.

A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.

Answers

Answer:

A one

Explanation:

A because workers may get hesitated in front of everyone but at home they will feel free

Answer:

Its probably D

Explanation:

It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong

the term technology is derived from the Chinese word. it is true or false​

Answers

Answer:

True

Explanation:

it's your perfect answers

Yes it is true
Its true

Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5 hurricanes have sustained winds of at least 157 miles per hour. The minimum sustained wind speeds for categories 4 through 1 are 130, 111, 96, and 74 miles per hour, respectively. Any storm with winds of less than 74 miles per hour is not a hurricane. If a storm falls into one of the hurricane categories, output This is a category # hurricane, with # replaced by the category number. If a storm is not a hurricane, output This is not a hurricane.

Answers

Answer:

def Hurricane(wind_speed):

   if wind_speed >= 157:

       print("Category 5 hurricane")

   elif wind_speed >= 130:

       print("Category 4 hurricane")

   elif wind_speed >= 111:

       print("Category 3 hurricane")

   elif wind_speed >= 96:

       print("Category 2 hurricane")

   elif wind_speed >= 74:

       print("Category 1 hurricane")

   else:

       print("Not a hurricane")

Hurricane(121)

Explanation:

The function "Hurricane" in the python code accepts only one argument which is the recorded speed of a hurricane. The nested if-statement evaluates the speed of the hurricane and output the appropriate category of the hurricane based on the speed.

Other Questions
How does O'Keeffe's use of color contribute to the unity in this painting? A person on a moving sidewalk travels 56 feet in 8 seconds. The moving sidewalk has a length of 210 feet. How long will it take to move from one end to the other?PLEASE HELP ME WILL REPORT IF TROLL What are the Janus masks? a type of stage direction determined by the director the international symbol for comedy the international symbol for drama a type of stage mask worn by dramatic actors when performing tragedies 1. Is it possible to distinguish DNA and RNA structures by using Bials Test? Explain.2. What are the functions of orcinol and FeCl3 in Bials Test. In Anne Frank: The Diary of a Young Girl, how does Anne make a connection between the residents of the Secret Annexe and the city beyond?She concludes that both groups are united in their conviction that the Allies will successfully liberate Holland.She analyzes how both groups resort to crimes like thievery.She explains how both groups depend on each other for survival during the occupation.She compares how each group responds to deprivations like food shortages. Number 2: (look at pivture) 10 point HURRYYYYYWhich system of linear inequalities is graphed? I have a question in french how should an author effectively address opposing claims in writing True/False- A magnet can be strong enough to erase computer evidence. Group of answer choicesTrueFalse Root systems are classified as fibrous root systems and taproot systems.Which property distinguishes the two types of root systems from each other?A) the method of water absorptionB) the branching pattern of the rootsC) the presence of xylem and phloemD) the growth rate of the roots Sierras parents were extremely proud of here admirable achievement in school. it was obvious that her hard work had been rewarded. Which word has almost the same denotation as theword admirable? simplify: (-3x^3+2x^2+4x)-(8x^4-5x^3+6x^2-2x This is an LSAT practice questions.I need help answering the questions. Please do a step-by-step- explanation. I prefer that you draw out the game to help me understand the question. Jason enters six races: biking, canoeing, horseback riding, ice skating, running, and swimming. He places between first and fifth in each. Two places are consecutive only if the place numbers are consecutive. Jason's places in canoeing and running are consecutive. His places in ice skating and swimming are consecutive. He places higher in biking than in horseback riding. He places higher in canoeing than in running.1. If Jason places higher in running than in biking and places higher in biking than in ice skating and swimming, which one of the following allows all six of his race rankings to be determined?A. He places fourth in horseback riding.B. He places fourth in ice skating. C. He places the same in both horseback riding and ice skating.D. He places the same in both horseback riding and swimming.E. He places higher in horseback riding than in swimming.2. If Jason places higher in running than in biking and places higher in horseback riding than in ice skating, exactly how many of his rankings can be determined? A. 2 B. 3 C. 4D. 5E. 6 3. Assume that Jason's rank in running is higher than his rank in ice skating and consecutive with it, and that his rankings in swimming and running differ. Which one of the following must be true?A. Jason places both first and second.B. Jason places both first and third. C. Jason places both second and fourth.D. Jason places both second and fifth. E. Jason places both fourth and fifth. Are the lines shown below parallel? Explain 2+4 i need help right now 4x + 16y = -19-2x - 8y = 10 9. What type of bond is pictured in the image below?a. covalent bondb. ionic bondc. metallic bondd. electron bondONLY 9 Choose the best term from the box.Write it on the blank equation exponent factor multiple power product(n)__tells the number of times the base is used as a(n)__..50 is a(n)___of 10 because 5 10 = 50 PLZ Help Urgent. 15 POINTS, BRAINLY Guaranteed.Plz Answer honestly or you will be reported.Evaluate.(2/7)^3A: 8/343B: 8/7C: 3/343D: 6/7