Question 17(Multiple Choice Worth 5 points)
(03.02 MC)
You want to buy a new jacket. Which program will help you see how much money you need to save?
O Budget simulator
O Navigation app
O Virtual shopping app
O Investment simulator
Answer:
a
Explanation:
Which is the correct way to pass an array named studentScores that holds 25 values to a function named getAverage and save the result to a variable named average
The correct way to pass an array named student Scores that holds 25 values to a function is Set average = getAverage(studentScores, 25).
What is array?An array is known to be a set of same kind of data types. An example an int array is known to holds the elements of int kinds and a float array is said to keep the elements that are of the float kinds.
Note that The correct way to pass an array named student Scores that holds 25 values to a function is Set average = getAverage(studentScores, 25) as it is the only right way
Learn more about array from
https://brainly.com/question/24275089
True or False? Any edition or version of Windows can join a domain.
Answer: TRUE! 100%
If I was helpful i would to be rated brainliest please thank you!
Explanation:
What should you do to avoid cheating in online classes, even if your behavior was unintentional?
Answer:
answer in picture below for edge 2022
Explanation:
posting because i couldnt find good answers for myself
A fixed-point method that uses only four bits can represent only 16 values. This is described as a limit on its ________.
A fixed-point method that uses only four bits can represent only 16 values. This is described as a limit on its precision.
What is a bit?In computers, a bit is the most basic unit of information employed during the transmission of digital data.
The combination of 4 bits generates 16 different data to be used during digital transmission.
The fixed-point computing method fixes the points of a given function to obtain a limited number of combinations (fixed-point iterations).
Learn more about computing bits here:
https://brainly.com/question/8431891
who is the king of computers?
Answer: Bill Gate, who is known as the king of computer programs
Hope this helps!
Answer:
Professor Eric Roberts
Explanation:
Computer scientist
An electricity power plant was redesigned so that the old system consisting of a single large display screen which could be seen by all of a team of three operators was replaced by individual workstation screens for operators. This worked well until there was a problem which resulted in dangerous gases being released. The team of operators had great difficulty in finding the source of the problem and deciding what to do. Because they no longer have access to all the information, they have to spend time explicitly co-ordinating their understanding of the situation by talking to each other. Under the old system, the knowledge would be shared – one operator would know what was happening with another’s area of the plant without explicit Communication.
The new system of individual workstations can be modified to make better use of distributed cognition by mapping out the different representational states.
What is distributed cognition?Distributed cognition can be defined as a framework that was proposed by E. Hutchins in 1991 and it is based on the idea that to explain human behavior, one has to look beyond both the individual human and the single (individual) task.
This ultimately implies that, any functional system comprises a collection of individuals (actors), setting, technology, and the interrelations with one another based on distributed cognition.
In conclusion, the new system of individual workstations can be modified to make better use of distributed cognition by mapping out how the different representational states are coordinated with respect to time, location, operators and objects.
Read more on distributed cognition here: https://brainly.com/question/14555199
Functions are used to reuse the codes number of times in program
Answer: this is what i found to help
Explanation:
Marcus traded in his 10-year-old truck for a new one. Because it is the first new truck he
has ever owned, he is especially concerned about protecting it as much as possible.
Marcus should get_______
insurance
Answer:
Car Insurance
Explanation:
Hope this helps! Please let me know if you need more help or think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!
1 pts Question 9 is what we use to communicate day to day.
can you do the assignment I attach to this
Answer:
If I could see it maybe the text is too small. try to take smaller photos
Explanation:
Match each type of video camera to its features:
prosumer
studio
DSLR
ENG
provides good shutter speed, image quality, and manual control
records all studio events either on tape or digitally
combines a professional and a consumer camera
has controls to adjust the zoom and focus
The type of camera matched with its appropriate features are below;
Prosumer Camera - combines a professional and a consumer camera in one.Studio Camera - records all studio events either on tape or digitally.DSLR Camera - has control to adjust zoom and focus.ENG Camera - provides good shutter speed, image quality, and manual control.What is a camera?A camera is a device used for taking still or moving pictures or photographs.
Read more on camera types:
https://brainly.com/question/26320121
Define the 7 steps to web design.
research the risk of social media and list 3 websites that have information about the topic instead of the one you listed on your chart.
what are cyber criminals like today
Answer:
Cyber criminals are very professional and organized. Cyber criminals today are even able to be hired and have product adverts. Cybercriminals now have crime packs with business intelligence reporting dashboards to manage the distribution of their malicious code.
Explanation:
Carl wants to add two new characters to the extraterrestrial battleship game he's
building in order to have multiple players battling each other. This not only helps him
create engagement for users, but it adds excitement to his recreational game. One
character is a water-based alien with only one eye and 8 legs, resembling the
features of an octopus. The second character is a land-based alien with no eyes, 3
claws, and 3 legs, resembling the features of a crab. Which is the best explanation
why there is only one class with the new characters?
A game must have the same values under one class.
A game can have multiple properties under one instance.
A game can have multiple instances using the same class.
A game can have multiple functions under one class.
The option that best explains the game is that a game can have multiple instances using the same class.
Can a class have multiple instances?A game is one that can always create multiple instances of a class. This is known to be the reason that classes are made.
Conclusively, each object often has its own specific inner variables and they do not have only if they are static but games of multiple instances is the reason why there is only one class with the new characters.
Learn more about Games from
https://brainly.com/question/1786465
Can someone help me answer this someone please.
Answer:
2. The tower that is balencing on a giant hand and the humans that is standing on the giant hand.
3. The artist show proportion by the relationship of the picture that create harmony in the picture and the meaning of this picture is friendly and it shows proportionate size, color and shape it works together to make the picture bounce.
4. Maybe the artist could make the background more bouncy and clear and could use a little bit more details.
Briefly describe what is RAM & give a description of how it has evolved ?
Answer:
Ram is a secondary storage device
8. Which of the following is an output device
a. CD
b. Hard Drive
C joystick
D printer
1. Fill in the correct tags:
<___________> important text <___ strong>
<___________ > subscripted text
The correct tag are:
<strong>important text</strong><sub>subscripted text</sub>What are computer tags?The information systems is known to be made up of tag. This tags are known to be keyword that are often given to a piece of information e.g. computer file, etc.
Conclusively, Note that it is a kind of metadata that helps to tell more about an item and an example of the correct tag above are:
<strong>Spam</strong>
<sub>Spam</sub>
Learn more about tags from
https://brainly.com/question/13153211
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the decrypted number is R. Are the identities of Alice and Bob verified in this protocol?
There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.
What is public and private key in SSL?These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).
Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.
Learn more about public/private key from
https://brainly.com/question/8782374
what field in the ipv4 datagram header can be used to ensure that a packet is forwarded through no more than N headers
Answer:
Time to Live (or TTL)
Explanation:
This counter field is initially set at some value that is decremented by one each time the packet "hops." When the counter reaches zero the packet is disposed of.
what is a web browser
Answer:
A web browser takes you anywhere on the internet, letting you see text, images, and video from anywhere in the world. The web is a vast and powerful tool. Over the course of a few decades, the internet has changed the way we work, the way we play and the way we interact with one another. Depending on how it’s used, it bridges nations, drives commerce, nurtures relationships, drives the innovation engine of the future and is responsible for more memes than we know what to do with.
Explanation:
Your workstation needs additional RJ-45 network connections. Which of the following changes do you implement to meet this need?
Answer:
Install a network interface card
FUNCTIONAL REQUIREMENTS FOR TRAVEL AGENCY SYSTEM
A minimum computer system with an Intel Pentium VI – 1000 MHz Processor or higher, at least 512MB of RAM, and at least 10 GB of hard disk space is required for server configuration in order for the Travel Agency System to be efficient and completely functioning.
According to the amendment, the federal government has only those powers specified by the Constitution. These powers include the ability to declare war, collect taxes, control interstate commerce, and others specified in the articles.
Answer:
please where's the question
short notes on primary key
Answer:
A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each table record. A primary key is used as a unique identifier to quickly parse data within the table. A table cannot have more than one primary key.
Primary Key.
Candidate Key.
Alternate Key.
Super Key.
Composite Key.
Foreign Key.
Unique Key.
In the relational model of databases, a primary key is a specific choice of a minimal set of attributes that uniquely specify a tuple in a relation. Informally, a primary key is "which attributes identify a record," and in simple cases constitute a single attribute: a unique ID.
Explanation:
You and your coworkers are designing the audit policy for WeServeU, the banking entity you’ve worked with on prior activities. Make an argument for why the audit system should be able to search for each of the following log items: user, action performed, time of action, and location. For each item, include two reasons you would want to conduct a search on it: First, after you have reason to believe your system has been compromised in some way, and second, how you would monitor each item in routine audits to look for “suspicious behavior”/explain what “suspicious behavior” would look like during a routine audit. Then, argue for a specific lockout policy for each of the following groups: customers; staff (workers); and IT administrators.
The audit system should be able to search for the above listed log items as it will help us to know if there is any abnormalities or discrepancies in the logs.
Why are audit logs vital?The detailed audit of logs such as action performed, time of action, etc., is very important to firms as it will help them to be able to handle or look into data movement and keep record of any kind of security breaches or internal mismanagement of information.
Note that it will make sure that users follow all the given protocols and directives and help also to hinder and track down issues of fraud.
Learn more about audit system from
https://brainly.com/question/14541181
#SPJ1
What do people realize about global issues because of the Internet?
A. That countries cannot affect or influence one another
B. That one country's issues can affect another country
C. That nobody has the power to help others in the world
D. That other countries' problems are of no concern to us
Answer:
B
Explanation:
More people are able to see how other countries' problems affect different countries
Select the terms relating to numbers larger than 50,000.
char
boolean
string
short
byte
double
long
The term that refers or relate to numbers larger than 50,000 are:
Char LongWhat is char in java?Char in Java is known to be made up of the size of 16 bits and it ranges is said to be from 0 to 65,535.
Conclusively, The int in java is made up of 32 bits and ranges from from -2 , 147,483,648 and above. The long is made up of 64 bits nd ranges from -9, 223,372,036 and above.
Learn more about Java from
https://brainly.com/question/24275769