Answer:
..
Explanation:
.
What behavior do elements in a stack follow?
Answer:
last in, first out, or LIFO behavior
Explanation:
B
What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^
Answer:
Serial Advanced Technology Attachment (SATA).
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.
Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.
Generally, SATA comprises of two ports and these are the power and data connector.
When should we not use Inheritance in programming?
Answer:
You shouldn't be using inheritance if your program doesn't reuse code a lot.
Explanation:
This is really the purpose of inheritance, to make it easier for us to call repeated method calls without having to copy and paste all the time and making our program long and redundant. If you have simple programs that don't have repeated calls, then inheritance is unnecessary.
Which of the following is the best example of a way in which a programmer can use abstraction to manage the complexity of a program?
Replacing each instance of repeated code with a call to a procedure
Replacing longer variable names with shorter variable names to reduce typing errors
Replacing several lines of documentation with a single line of documentation
Replacing lists with individual variables
The best example of a way in which a programmer can use abstraction to manage the complexity of a program is to Replacing longer variable names with shorter variable names to reduce typing errors.
Why the replacement?The act of Replacing longer variable names with shorter variable names to reduce typing errors is very important.
Conclusively, in any programming, to handle the complexity of a program, on can Replace the string variables such as name1, name2, name3, and name4 with the use of list of strings known as the shorter form called names.
Learn more about programmer from
https://brainly.com/question/23275071
PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because
A.The introduced species compete for resources more effectively than native species
B.These introduced species will require more land to be protected
C.Introduced species often become endangered when they are placed in a new habitat
D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat
Answer: A.The introduced species compete for resources more effectively than native species.
Explanation:
An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.
When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.
Therefore, the correct option is A.
Which option best describes what spotting sessions are in the context of filmmaking? ASAP PLEASEEEEE!!!!!!! 40 points
A.
They are sessions dedicated to discussing the film's art direction.
B.
They are sessions dedicated to discussing the film's screenplay.
C.
They are sessions dedicated to discussing the film's cinematography.
D.
They are sessions dedicated to discussing the film's costume design.
E.
They are sessions dedicated to discussing the film's score.
Answer:
E. They are sessions dedicated to discussing the film's score.
Explanation:
PLATO
What is the relationship between optical drives and WORMs?
Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck
List any two software that could be used for creating visual information
Answer: inkscape
Microsoft PowerPoint
Explanation:
Visual information is the presentation of information in visual format e.g through pictures, etc. It is the use of pictures, signs, icons etc to pass a message with one's sense of sight.
The software that could be used for creating visual information include inkscape and Microsoft PowerPoint. IInkscape is an open-source vector graphics editor which is used in the creation of vector images. Microsoft PowerPoint is also a presentation program.
What is the status of this account?
A)Current
B)Current, but closed
C)Potentially negative
D)Potentially negative, but closed
D)Potentially negative, but closed
we know this due to this
-scav
The given account is Potentially negative, but closed. Option D is correct.
What is the Potentially negative account?A closed account with a “Potentially negative closed” designation has a history that a lender would find unfavorable.
Negative account are the information includes things like missed payments on credit cards and loans, charge-offs, collections, bankruptcies, short sales, deeds in lieu of foreclosure, and foreclosures.
The given image clearly indicated that the account is under the debt and it is called as the Potentially negative, but closed account. The section under “Potentially negative items” will contain a list of all accounts that could be seen negatively by lenders or other people looking at your credit history.
Therefore, option D is correct.
Learn more about the account, refer to:
https://brainly.com/question/29108212
#SPJ2
Write a program to Find the Sum of 4 numbers
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
int main()//main method
{
int a,b,c,d;//defining integer variable
cout<<"Enter numbers:";//print message
cin>>a>>b>>c>>d;//input numbers
int sum=a+b+c+d;//add value in sum variable
cout<<"4 number sum is:"<<sum;//print sum
return 0;
}
Output:
Please find the attachment file.
Explanation:
In the program inside the main method 4 integer variable "a,b,c, and d" is declared that uses the print method to input the value from the user-end and after accepting the value an integer variable "sum" is declared that adds all input values and use a print method that prints the value with the message.
por que se dice que las TIC´S son las integracion de las TI y las TC?
La respuesta correcta para esta pregunta abierta es la siguiente.
A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.
Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.
Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.
Need answer ASAP. Thanks
Answer:
1. XHTML
2. XML
3. HTML
4. CSS
Explanation:
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in: a) agriculture and away from services b) services and away from agriculture c) industry and away from services d) agriculture, services, and industry
Answer:
^^^^^ what they said
Explanation:
its b
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture. Thus, option C is correct.
What does the graph represents?According to the graph, the globalization process (period 2000-2019) has affected China by decreasing the proportion of workers in agricultural activities from more than the 40% to not much above the 10%.Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture.
Meanwhile, workers in the service sector have increased from less than the 30% to more than the 60%. The percentage of people working in manufacturing activities has remained more or less stable, around the 30%.
Thus, option C is correct.
Learn more about service sector on:
https://brainly.com/question/14606383
#SPJ7
Which of the following best describes the protocols used on the Internet?
The protocols of the Internet are designed by government agencies to ensure they remain free to use
The protocols of the Internet are secret to maintain the privacy and security of people using them
Each device connected to the Internet will use a protocol designed by the company that manufactured it
The protocols of the Internet are open and used by all devices connected to the network
The protocols of the Internet are open and used by all devices connected to the network
-scav
A computer database uses a binary sequence of 10 bits to represent unique user IDs. To increase the number of unique IDs that the database is able to represent, the database administrator increases the number of bits in a user ID to 11 bits. How many times more unique user IDs can be represented with the new system?
Answer:
2 times more unique IDs
Explanation:
The number of bits used to represent unique IDs in the computer system = 10 bits
The number of bits to which the database is upgraded to = 11 bits
The number of unique IDs represented by a 10 bits binary sequence, n = 10¹⁰ = 1024
The number of unique IDs represented by a 10 bits binary sequence, n = 10¹¹ = 2048
Therefore, the number of times more unique IDs that can be represented with the new system of 11 bits = 2048/1024 = 2 times more unique IDs
Write the program to convert the string “ SOFTware” into lower case ,”hardware “ string into upper case.
Combine the two strings and find the length of the combined string.
Answer:
The program in Python is as follows:
str1 = " SOFTware".lower()
str2 = "hardware ".upper()
str3 = str1+str2
lent = len(str3)
print(lent)
Explanation:
(1) Convert " SOFTware" to lower
str1 = " SOFTware".lower()
(2) Convert "hardware " to upper
str2 = "hardware ".upper()
(3) Combine both strings
str3 = str1+str2
(4) Calculate the length of the new string
lent = len(str3)
(5) Print the calculated length
print(lent)
Harold is working on a science project that includes a spreadsheet containing calculated results based on the data. An obviously incorrect result is being calculated and displayed. The data is correct, but the formula must be flawed. To get the correct information, Harold clicks on the cell containing the incorrect results and adjusts information contained in the:
A. the formula bar.
B. the shortcut toolbar.
C. the calculator pop-up.
D. the column header.
Answer: When entering a formula into a cell, you begin with an equal sign
Functions and formulas are calculations a spreadsheet program applies to data.
Functions are preset calculations within spreadsheet software.
Formulas are user-entered calculations that may contain cell references, numerical values, and preset calculations.
Item 3
Which of the following describes new technology development?
A harmless process
A somewhat assured process
A partially risky process
A very risky process
Answer:
A somewhat assured process
B. A somewhat assured process is describes new technology development
What are the five phases in technology development process?Five phases guide the new product development process for small businesses: idea generation, screening, concept development, product development and, finally, commercialization.
What is technology development process?Technology Development Process, is a directed process at developing new knowledge, skills and artefacts that in turn facilitates platform development
To learn more about new technology development, refer
https://brainly.com/question/27090068
#SPJ2
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service
Answer:
C. user accounts
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.
Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.
In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.
Answer:
user accounts
Explanation:
The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended. PROCEDURE allPositive(myList) { index ←← 1 len ←← LENGTH(myList) REPEAT len TIMES { IF(myList[index] > 0) { RETURN(true) } index ←← index + 1 } RETURN(false) } For which of the following contents of myList does the procedure NOT return the intended result?
Answer:
[-1, 0, 1]
Explanation:
Given
The above procedure
Required
Which list does not work as intended
The question has missing options (the options are available online).
From the question, we understand the procedure is to return true for lists that contain only positive numbers.
However, the list does not work for [-1, 0, 1]
The reason is that; the procedure starts checking from index 1.
i.e. index ←← 1
In [-1, 0, 1], the element at index 0 is negative (-1).
Since the procedure starts checking from index 1, the procedure will not check the element at index 0 (i.e. -1).
Hence, it will return true, instead of false
In this exercise we have to use the knowledge of computational language in python, so we have that code is:
It can be found in the attached image.
So, to make it easier, the code in python can be found below:
NumList = []
Number = int(input("Please enter the Total Number of List Elements: "))
for i in range(1, Number + 1):
value = int(input("Please enter the Value of %d Element : " %i))
NumList.append(value)
print("\nPositive Numbers in this List are : ")
for j in range(Number):
if(NumList[j] >= 0):
print(NumList[j], end = ' ')
See more about python at brainly.com/question/2266606
Need answer ASAP I’ll mark brainliest if correct
How can you create a class without any methods, yet call a method from that class?
The class can___ methods from another class
1. Samantha uses the RSA signature scheme with primes p = 541 and q = 1223 and public verification exponent e = 159853. (a) What is Samantha's public modulus? What is her private signing key? (b) Samantha signs the digital document D = 630579. What is the signature?
Answer:
Why is samantha asking us? She should find out herself smh
Explanation:
Need answer ASAP
Complete the following sentences
____ objects are programmer defined objects with programmer developed properties and methods. Custom objects are ____
Objects.
Options for first box are:custom, built-in, user-defined
Option for the second box: user-defined, system-defined, undefined
Answer:
built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.
Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap
list and explain seven functions of operating system software
Answer: Security – ...
Control over system performance – ...
Job accounting – ...
Error detecting aids – ...
Coordination between other software and users – ...
Memory Management – ...
Processor Management – ...
Device Management –
HOPE THIS HELPS
What is the purpose of a hyperlink in a presentation?
A to add a joke to a presentation
B to create an attractive image
C to connect a user to a new slide, a file, or a webpage
D to keep track of the order of slides
Answer:
Answer:c to connect a user to a new slide, a file, or a webpage
Explanation:
Explanation:c
Answer:
c
Explanation:
In an event-driven program, you design the screens, define the objects, and define how the screens will connect.
Answer:
True.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
One of the most important steps in the software development life cycle (SDLC) is design. It is the third step of SDLC and comes immediately after the analysis stage.
Basically, the design phase is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.
Hence, in an event-driven program, the software developer design the screens, define the objects to be used, and define how the screens will connect to other sources or resources.
When entering numbers that start with a zero, apply the _____ number format.
A. Text
B. Context
C. Zero
D. Zero decimal
Answer:
The Answer is gonna be D. Zero decimal
Hey does anyone think nervegear would be possible? (Just asking)
Answer:
Depends
Explanation:
Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.
Answer:
No, the Nerve Gear cannot be possible at the moment. However, in Japan, they are creating the Nerve Gear and is to be released in May 2022 told by the creator, Kayaba Akihiko. So, the Nerve Gear cannot be possible in 2020 but in 2022. We just have to wait for two more years.
Explanation:
please choose me as brainliest if that is ok ;)
5.What type of mic would you use for the following scenario:
• You want to pick up a wide range of frequencies , You are looking for an extraordinarily rich representation of the original sound, You seek smooth, detailed sound, You want to capture the subtle nuances in a recording studio, You expect and appreciate subtle, sensitive sound
a. Ribbon
b. Condenser
c. Dynamic
Answer: ribbon
Explanation:
Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.
Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.