Answer:
key margin
Explanation:
kid rally have a explantions
So far , All of the input that we have seen comes directly from the user with your partner brainstorm other ways an app might get the information that it needs
Answer:
An app can get information from the device itself like diagnostic data or location.
Explanation:
Inserting and deleting text is a basic editing task in word processing.
True or false
HELP ME PLEASE PLEASE PLEASE!!!! IM BEGING YOU!!!!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.
Explanation:
A screw has 4 threads per centimeter and a circumference of 2 centimeters. What is the mechanical advantage of the screw? 2 4 6 8
Answer:
M.A = 8
Explanation:
Given the following data;
Circumference = 2cm
Number of threads = 4
To find the mechanical advantage (M.A);
[tex] Mechanical \; advantage = \frac {Circumference}{Pitch} [/tex]
But, [tex] Pitch = \frac {1}{number \; of \; threads} [/tex]
[tex] Pitch = \frac {1}{4} [/tex]
Pitch = 0.25
Substituting the values into the equation, we have;
[tex] M.A = \frac {2}{0.25} [/tex]
M.A = 8
Therefore, the mechanical advantage of the screw is 8.
Answer:A screw has 4 threads per centimeter and a circumference of 2 centimeters. What is the mechanical advantage of the screw?
2
4
6
8 THIS IS THE CORRECT ANSWER
Explanation:
Edge 2021 Test Correct
HELP PLEASE
When typing a function in a spreadsheet, you must first type _____
Group of answer choices
A cell reference
A column header
A row number
An equals sign
You can use a cell reference, which points to a cell or range of cells on a worksheet, to tell Microsoft Office Excel where to find the numbers or data that you want that formula to calculate.Thus, option A is correct.
What a cell reference, function in a spreadsheet?When you include cell references in a calculation, Excel uses the data in the referenced cells to calculate the result. The formula automatically calculates the new result when a cell's value is changed. To enter the formula, click the cell where you want to do so.
The term “cell reference” or “cell address” refers to the combination of a column letter and a row number that identifies a worksheet cell. For instance, the references A1, B2, and so forth all refer to the cells that are situated where row 1 and column A meet.
Therefore, When typing a function in a spreadsheet, you must first type A cell reference .
Learn more about spreadsheet here:
https://brainly.com/question/8284022
#SPJ2
Find the value of the expression 5n² + 5n - 2 if n = -2.
The first photo in the collage is what I should make a copy of, anyone has any knowledge on how to add the numbers apart of the spreadsheet and the letters?
A piece of hardware used to enter data into a computer: Output Device Backing Storage Device Programming language Input Device
Answer:
Input Device.
Explanation:
A piece of hardware used to enter data into a computer is known as an input device.
Basically, this input device is also known as peripherals and it comprises of all of the devices that are interconnected with the CPU. Some examples of input devices used with a computer includes keyboards, scanner, mouse, etc. They avail the end users the ability to send an information to the computer system for processing into a desired output.
WILL GIVE BRAINLIEST IF IT IS RIGHT!! 25 POINTS!!!
Dacey needs to calculate the difference between 8,794 and 5,632.
Which Python statement should Dacey use to calculate this?
A.) print(8,794 - 5,632)
B.) print(8,794 * 5,632)
C.) print = 8,794 + 5,632
D.) print("8,794 - 5,632")
(this is for Coding)
Answer:
A
Explanation:
When you are finding the difference in a code you are subtracting the bigger number from the smaller one. You wouldn't technically use " " when printing a number equation as it doesn't work.
Answer:
The answer is A
Explanation:
they are not multiplying so its not b
they are not adding so its not c
there is NOT quotation marks when calculating.
What is the sum of
1
7
10
and
3
3
5
? Use the fraction strips to help.
An image shows two groups of fraction strips. The first group is one one-whole fraction strip and seven one-tenth fraction strips. Under the first group, the second group is three whole fraction strips and six one-tenth fraction strips.
A.
4
7
10
B.
5
C.
5
3
10
D.
3
1
2
Answer
[tex]1\frac{7}{10} + 3\frac{3}{5} = 5\frac{3}{10}[/tex]
Explanation:
Given
[tex]1\frac{7}{10} + 3\frac{3}{5}[/tex]
Required: Evaluate the sum
[tex]1\frac{7}{10} + 3\frac{3}{5} =[/tex]
Convert to improper fraction
[tex]1\frac{7}{10} + 3\frac{3}{5} = \frac{17}{10} + \frac{18}{5}[/tex]
Take LCM
[tex]1\frac{7}{10} + 3\frac{3}{5} = \frac{17+36}{10}[/tex]
[tex]1\frac{7}{10} + 3\frac{3}{5} = \frac{53}{10}[/tex]
Convert to mixed fraction
[tex]1\frac{7}{10} + 3\frac{3}{5} = 5\frac{3}{10}[/tex]
Answer:
c
Explanation:
A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
a. What does the view layer for this app contain?
b. What does the controller layer do for this app?
Answer:
B And A
Explanation:
B: The controller renders a responce it can be seen as a manager and other parts are its workers and makes sure that other parts are "working" well
Answer:
He's actually right- it's B and A.
Explanation:
PLEASE HELP ASAP!! Timed test!!
Lakendra finished working on her monthly report. In looking it over, she saw that it had large blocks of white space. What steps could Lakendra
take to reduce the amount of white space? It’s more than one answer!!
A. Include more special effects
B. Have an unjustified right margin
C. Increase the use of boxes and rules
D. Adjust column spacing
Answer:
d i think
Explanation:
hi good morning how are you all
I hope you all are fine
ok now question is what is LAN?
have a nice day
Answer:
Local area network
Explanation:
d6odyiitdidditsitstiistssitdditzdditidztsto
help ......... pleaseeeee
Answer:
Follows are the solution to this question:
Explanation:
Transport layer:
In the OSI model, this layer lies on the 4th part, which primary function is to directly supply the network connectivity to applications mostly on various hosts.
It provides end-to-end communication over a network and also allows you to send and receive error-free data in the form of data packets that enhanced your privacy.
Flow control and Error control:
The flow control is only used to send or receive information transmission only, while Error control is used designed for error-free communication for both (sender or receiver).
Layer related to the data link layer:
It must be done at different layers on both layers like node-to-node connections, the communicative needs are controlled by flow and error. Flow and error control in the transport layer is done from endpoint to endpoint.
please an urgent answer
will give brainliest
what is the definition of bucket address.
What actions can you take to ensure the physical security of network devices?
Answer:
Here are some steps you can take to make sure your network is secure:
Take physical precautions. ...
Make sure all of your server's security features are enabled. ...
Use both hardware and software firewalls. ...
Install the latest version of your server's software. ...
Guard passwords. ...
Be Wi-Fi savvy.
Explanation:
PLEASE MARK ME AS BRAINLIEST
Read through the following scenario, and then decide which computer is the best fit.
Answer:
gaming pc?
Explanation:
i dont know why you have this question kinda weird but entertainment pc or gaming pc sounds right
Answer:
B. Gaming or media production computer
Explanation:
Gaming or media production computer is the best computer you'll need because if you don't have the best computer it probably won't work on you. But if you the gaming or media production computer it will work on you.
I hope this helps.<3
Have a nice day.<3
How do ACLs work on a router?
Answer:
An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.
Explanation:
PLEASE MARK ME AS BRAINLIEST
Help Me Please. I'm Begging you
Answer:
d and b can't see the last ones answer so im guessing this is what you needed.
Explanation:
DOSE ENY ONE KNOW WHAT TOOLS THEASE ARE NEXT TO THIS GUY BECAUSE I AM AT A LOSE ON THIS ONE??????????
All are secret and destructive weapons I guess
1) What is a RAM and what are it's functions?
2) What is a ROM and what are it's functions?
Answer:
The interpretation of the statement is characterized in the answer section below.
Explanation:
RAM:
This would be the real physiological remembrance of such a computer where even the OS and initiatives were also stacked as well as stored so that the processor could be made available extra rapidly.The function of RAM:
It's own key marketing strategy as both temporary storage with program guidelines that could be brought major more by CPU even before needed.ROM:
ROM contains computing which enables the computer system to commence as well as replenish every time these are switched on.The function of RAM:
Most PCs have such a minuscule percentage of ROM which stores government initiatives, including the program which boots just one desktop.Workers in a child care facility or preschool are part of what career path?
A. education and training
B. health care
C. human services
D. hospitality
Answer:
A
Explanation:
Preschool teachers show education
Engineers use the following tools to perform their duties. A: science and math, B: math and English, C: science and English, D: math, science , and English
Answer:
Science and math
Explanation:
Answer:
D
Explanation:
You need all 3.
What is 01010101 converted to denary
Answer:
85
Explanation:
0 + 64 + 0 + 16 + 0 + 4 + 0 + 1 = 85
PLS HELP ILL GIVE BRAINLY- (enter the answer) Microsoft _________ is an example of a desktop publishing software
Answer:
word fffffffffffffffffffffff
The binary number represented by the voltage graph below is
I will give you brainlist if you actually answer
Answer:
the answer is the pattern is odd numbers like Odd numbers are whole numbers that cannot be divided exactly into pairs. Odd numbers, when divided by 2, leave a remainder of 1. 1, 3, 5, 7, 9, 11, 13, 15 are sequential odd numbers. Odd numbers have the digits 1, 3, 5, 7 or 9 in their ones place.
Explanation:
Answer:
11010100
Explanation:
Will give brainliest!
Who created binary, and does anyone have any idea how?
Answer:
Gottfried Leibniz created it and Leibniz was trying to find a system that converts logic's verbal statements into a pure mathematical one.
In the scenario below, decide whether you should upgrade the computer or replace it. You’ve been working on your existing laptop computer for 3 years. It seems to be running just fine except for the times that you need to run video-editing software for your film hobby. Plus, there is a new program that your friends are using for their video editing, and you think it is pretty cool, but it might not run on your laptop. What should you do?
Answer:
Replace
Explanation:
Since the laptop is already 3 years old and you cant just open laptops it wuld be better to just replace
Answer:
B. Replace
Explanation:
When you been working on the laptop for three years it probably won't work so you'll need to replace the old laptop with a new laptop. But if the laptop still works over that three years you can still replace it if you want.
I hope this helps. <3
Have a nice day.<3
How do we store value in a variable? Give an example
How do we use the value in variable? Give an example
Answer:
hi
Explanation:
im not smart
PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.
Answer:
Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed
Explanation: