What does "CYBER-COCKROACH" mean??

Answers

Answer 1

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:


Related Questions

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Answers

Answer:

1. SMTP.

2. 25.

3. POP.

4. IMAP.

5. POP.

6. POP.

7. 110.

8. IMAP-capable server.

Explanation:

The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis

Answers

Since Ned is trying to decide how he wants to connect the nodes on the network he created, the  two options that he has are option b and C:

b. Through hard cabling or wireless radio waves.

c. Through ethernet cables or Bluetooth.

What kind of cable does a computer system typically use to connect to a network?

A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.

Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.

Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.

Learn more about ethernet from

https://brainly.com/question/28156384
#SPJ1

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD. ​

Answers

Answer:

Cccccccccccccccccccccccccccccccccc

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?

Answers

Answer:

The largest dimensions we can make of an image with the pixelation widget is 255*255.

When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.

Explanation: This is all I could find. I hope its helps Sorry.

The sample size that would provide a good digital approx. will be  255 x 255

When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user.  also

when an image is resized the size of original size is either larger or smaller than the resampled image.

Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255

Note : A picture showing the effect of pixelation is attached below

learn more : https://brainly.com/question/19038576

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

what's the answer to this​

Answers

Answer:

S

Explanation:

The index operator will address individual characters in the string.

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants to be able to access his media wherever he goes. He needs a cheap storage solution. Which type of storage would be best for Joshua?

Answers

Answer:Cloud storage

Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

The correct answer will be "Semi-structured data".

Explanation:

Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

The code the application software needs in order to interact with the CPU

Explanation:

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used

Answers

The type of deployment model that is used is referred to as Thin client.

A thin client is also referred to as lean client. It is a model that runs on the resources that are stored on a central server rather than in the resources if the computer.

A thin client is useful for shared services, and desktop virtualization. The work carried out by the server include storage of data, performing if calculation, launching software programs etc.

On conclusion, since the information given in the question explains that there's a remote connection to the data center to run the user's virtualized desktop, then the deployment model is a thin client.

Read related question on:

https://brainly.com/question/13934016

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a

Answers

Answer:

A reverse proxy.

Explanation:

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.

In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

DONDE PUEDO VER LA HABITACIÓN EN ROMA?? ONLINE SIN PAGAR (ES UNA PELI)

Answers

Answer:

Sorry, Room in Rome is not available on Indian Netflix, but you can unlock it right now in India and start watching! With a few simple steps you can change your Netflix region to a country like Japan and start watching Japanese Netflix, which includes Room in Rome

Lo sentimos, Room in Rome no está disponible en Netflix indio, ¡pero puedes desbloquearlo ahora mismo en India y empezar a mirar! Con unos simples pasos, puede cambiar su región de Netflix a un país como Japón y comenzar a ver Netflix japonés, que incluye Room in Rome.

You are an IT technician for your company and would like to be able to:

Establish a remote server management session.
Send unencrypted (clear text) transmissions to the remote server.
Manage specialized industrial and scientific devices.
Which of the following utilities would be the BEST to use to accomplish these tasks?
A. xterm
B. PuTTY
C. Telnet
D. RUMBA

Answers

Answer:telnet

Explanation:

Is clear text ssh secure

The best utility to accomplish these remote server tasks would be PuTTY (option B).

What is Puytty?

PuTTY is a versatile and widely-used utility that allows for establishing remote server management sessions using various protocols such as SSH, Telnet, and others.

It provides a secure and encrypted connection, ensuring the confidentiality of transmissions.

Also, PuTTY is capable of managing specialized industrial and scientific devices through its support for serial connections and customizable configurations.

Options A (xterm) and C (Telnet) do not provide the same level of security and features as PuTTY. Option D (RUMBA) is more focused on mainframe and terminal emulation, rather than remote server management.

Learn more about remote server at:

https://brainly.com/question/29032807

#SPJ6

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

some of y'all make me lose braincells with your questions

Answers

Answer:

ok done we will try

BTW have a nice day enjoy your day Stay blessed stay happy stay strong

When your brain undergoes sensory deprivation for longer periods of time, you lose brain cells. When cells are not stimulated for long periods of time, your brain reorganizes itself; you naturally lose the unused, understimulated cells.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

Define:-

Absorption law ​

Answers

Answer:

Absorption law is an identity linking a pair of binary operations. 

Hope it helps you.


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

Can you recommend me a movie? ​

Answers

Ice age definitely……….
Other Questions
A 1.2 L weather balloon on the ground has a temperature of 25C and is at atmospheric pressure (1.0 atm). When it rises to an elevation where the pressure is 0.73 atm, then the new volume is 1.8 L. What is the temperature (in C) of the air at this elevation? the process by which water boils into a steam is Find the mean.20, 5, 45, 90, 60, 45, 30, 10, 20, 45, 15,25 Transaction are posted into ledger account from a) voucher b) journal book c) bank statement d) none of these A company developed the following per unit materials standards for its product: 3 pounds of direct materials at $5 per pound. If 10000 units of product were produced last month and 31250 pounds of direct materials were used, the direct materials quantity variance was Question #2: Which sentence is a run-on sentence? A. Although Jack was inexperienced, the other players had helped him learn the game. B. His brother played baseball before, and he was teaching Jack the basics of the game. C. Jack was trying out for the baseball team it was his first time ever playing the game. D. Jack was excited to learn the game; therefore, he was eager every time he practiced. what does this quote mean? from Catcher in the Rye" Sex is something I just don't understand".plss no links Explain whether or not you think civil rights legislation is still needed today. (1) People collect different objects as a hobby, and starting a collection can be the beginning of an exciting opportunity. (2) When deciding on an object to collect, one must decide what interests them. (3) Items that are often collected include postage stamps, coins, sports memorabilia, seashells, and many other diverse objects. (4) The object being collected must be accessible to the collector. (5) The collector will need to develop an understanding of the objects and learn as much as possible about their collection. (6) For example, collecting seashells when one does not live near the ocean would not be a good choice. (7) Organization and dedication are also important traits for a new collector. Which sentence is out of order in the paragraph? Area And Perimeter! Find the Area and the Perimeter of the Triangle!!! and explain.... ( help hurry!!) PLZ HELP!!An absolute location is a place in relation to other places a mathematical formula involving maps the exact spot on the planet where something is located the approximate location of a place according to the known coordinates of other places __________ is when the mind supports the efforts of the body and vice versa. A) Total fitness B) Heart rate C) Muscle tone D) Strength-building pls help draw a graph of 2x - 3y = 6 88 feet/second = 60 miles/hour. How many feet per second is 1 mile/hour? (Hintdivide both sides of the equationby the same amount.)Round to the nearest thousandth.One mile per hour is equivalent toao feet/second. how to write this in number form The difference of 9 and the square of a number A polynomial has one root that equals 2 + i. Name one other root of thispolynomial. Identify the obsession in the following sentence. "Keisha is overly concerned aboutgerms, so she spends hours wiping the surfaces of her home and washing her hands."a) spending hours wiping the surfaces of her homeb) germsc) spending hours washing her handsd) concern over germs The IMF policies that accompany most IMF loans are typically: Multiple Choice expansionary in the short run. procyclical in the long run. contractionary in the long run. contractionary in the short run. This person did something wrong and I do not know what it is :( Please help this is for points! what are the three components of the British Constitution that needed to be examined and improved for the betterment of English society