Answer:
Explanation:
The following code is written in Python. It prompts the user for the name and age, saves them to their own variables. Then it creates and calculates the dogAge variable. Finally, it combines all of this information and prints out the statement.
name = input("Enter your name: ")
age = input("Enter your age: ")
dogAge = int(age) * 7
print("Your name is", name, "and in dog years you are", dogAge, "years old.")
U
Question 5
1 pts
Which of the following Python code segments best matches this Scratch block?
set X
to 0
x > 0
then
change x by 1
se
change
by 10
x = 0
if x > 0:
X = X - 1
else:
X = X + 10
The ribbon in Excel is a
tab based user interface.
True
False
Answer:
Explanation:
This should help i think it is true just read this first "Like any other application, Excel has a basic workspace called the user interface. ... The Ribbon is the name given to the row of tabs and buttons you see at the top of Excel. The Ribbon's tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories."
Answer:
True
Explanation:
NO LINKS
Do you need to pay monthly to stream on Twitch?
they will wash the car change into tag question
Answer:
They will wash the car, won't they?
Explanation:
A tag question usually comes after an independent clause. The tag question is most times attached with the intent of affirming the statement made in the independent clause. Our independent clause in the answer above is; "They will wash the car". The tag question, "Won't they?" is meant to affirm that statement.
Another example is, "They are going to school, aren't they?" In this example also, the independent clause makes a sentence that is to be confirmed by the tag question.
Let's talk about this cryptocurrency: Vechain (VET)
Answer:
This is gonna be interesting
who was the first inventor of computer
Answer:
Explanation:
English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Answer:
Charles Babage is the first inventor of computer.
personal computer is the rise of what?
Answer:
Overuse injuries of the hand.
Obesity.
Muscle and joint problems.
Eyestrain.
Behavioural problems including aggressive behaviour.
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory.Starting with this memory arrangement , follow the sequence of instructions and record the final contents of each of these memory cells: Address Contents 00 AB 01 53 02 D6 03 02 Step 1. Move the contents of the cell whose address is 03 to the cell at address 00. Step 2. Move the value 01 into the cell at address 02. Step 3. Move the value stored at address 01 into the cell at address 03.
Answer:
I DON'T KNOW THE ANSWER SO SORRY
Explanation:
BUT THANKS FOR THE POINTS
A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup
Answer:
D. Disconnect the PC from the network
Explanation:
I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.
In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:
A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.The wrong option can be defined as follows:
In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.Learn more:
Ransomware: brainly.com/question/14455233
A digital footprint is .
Your digital footprint is the trail of 'electronic breadcrumbs' you leave behind when you use the internet. It can include the websites you visit, the photos you upload and your interactions with other people on social networks.
Answer: is something you must manage
Can someone plz answer these questions plz
Answer:
ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!
HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career of your choice.
Answer:
Explanation:
Summary. Technology has had a dramatic impact on the nature of work itself, individual applicants and employees, employers, and career counselors. It has changed the nature of work and the types of jobs that people do today. It has altered the knowledge and skills individuals need to be effective workers.
⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.
It doesn’t take up any storage space on the physical machine.
You can save the entire state of a VM to your files.
Provides fault and security isolation for the computer’s hardware
Answer:
It doesn’t take up any storage space on the physical machine.
Explanation:
The virtual machine does take up some storage space on the physical machine.
HELPPPP In 5-6 sentences explain how technology has impacted engineers.
Answer:
Digitization is changing the playing field for engineers.
It alters the culture by providing more real-time data on the performance of equipment in the field today, allowing engineers to consider improvements that can be achieved in months through data algorithms rather than years or decades.
They can analyze and simulate almost everything that a product would go through, virtually.
how do you think the blitz might have affected civilian morale in london
Answer:
It would have seriously negatively affected civilian morale in London. Hearing about the horrors of the war even from far away does a number on morale. This, however, was not exactly the case for London in WWII, because even as air raids were executed on the city, the citizens, confined to underground bomb shelters, still managed to pull together and keep morale high, causing London NOT to plunge into chaos, but to stand united against Germany.
6.20 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Ex: If the input is: Institute of Electrical and Electronics Engineers the output should be: IEEE
Answer:
Explanation:
The following code is written in Python. It creates a function that takes in a phrase as an argument. Then it splits the phrase into a list of words. Next, it loops through the list and adds the first letter of each word into the acronym variable if it is a capital letter. Finally, returning the acronym variable. Output can be seen in the attached picture below.
def accronymGenerator(phrase):
phrase_split = phrase.split(' ')
acronym = ""
for x in phrase_split:
if x[0].isupper() == True:
acronym += x[0]
else:
pass
return acronym
You want to change your cell phone plan and call the company to discuss options
Which option is the default configuration of the Junk Email Options in Outlook 2016?
No Automatic Filtering
Low
High
Safe Lists Only
Answer:
No Automatic Filtering
Answer:
NO automatic filtering
Explanation:
i took the quiz
All changes
1.(01.01 LC)
To make sure you do not get too tired when using the computer for long periods of time, how often should you get up to stretch and move? (5 points)
O Every hour
O Every 10 minutes
O Every 30 minutes
O Every two hours
You should get up and move every 30 minutes
Hope this helps
-scav
Answer:
C
Explanation:
Edna needs a safer car to drive. She likes to travel a lot, so she is looking for a small SUV. She is trying to decide between buying a new or used car. After doing some research, she finds out that most cars lose value each year by a process known as depreciation. You may have heard before that a new car loses a large part of its value in the first 2 or 3 years and continues to lose its value, but more gradually, over time. That is because the car does not lose the same amount of value each year, but it loses approximately the same percentage of its value each year. What kind of model would be most useful for calculating the value of a car over time?
Answer: Buy a new car
Explanation: If its a used car its breaks will be worn out and more likely the breaks will stop working in 6 months and you have to change them. May the forse be with you.
What are the two main parts of system unit hardware?
Answer: Computers have two main parts: hardware and software
Like piano (hardware) and music (software)
Explanation:
Consider four Internet hosts, each with a TCP session. These four TCP sessions share a common bottleneck link - all packet loss on the end-to-end paths for these four sessions occurs at just this one link. The bottleneck link has a transmission rate of R. The round trip time, RTT, for all fours hosts to their destinations are approximately the same. No other sessions are currently using this link. The four sessions have been running for a long time. What is the approximate throughput of each of these four TCP sessions
The correct response is - The TCP protocol creates a three-way connection between hosts on a network to send packets. It is a connection-oriented protocol. It is a protocol found in the OSI network model's transport layer. Given that all lost packets are sent again, it is trustworthy.
What is a TCP protocol?One of the key protocols in the Internet protocol family is the Transmission Control Protocol. It was first used to supplement the Internet Protocol in the first network installation. TCP/IP is the name given to the full suite as a result.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity. It is therefore used to transfer data from higher-level protocols that demand the arrival of all sent data.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity.
To read more about TCP protocol, refer to - https://brainly.com/question/27975075
#SPJ6
⚠️⚠️⚠️⚠️HELP - What is the software that allocates resources of a physical computer to a virtual machine?
Group of answer choices
Switch
Operating systems
Hypervisor
HostVM
Answer:
the answer is going to be hostvm
Need help ASAP??? Pick the best answers
Answer:
A and C are correct pick both
Who is the one you shouldnt have killed from fnaf?
(I already know but whoever answers first and right gets brainlest)
Answer: He was thought to be one of William Aftons victims who is also thought to be the child who possessing golden freddy
Explanation:
Answer:
Cassidy I guess
A financially stable person is able to:
A. spend money without having to save.
B. use loans to cover his or her living costs.
C. default on loan payments.
D. save money.
Answer:
Save Money
Explanation:
D
Aspire is a test you take to prepare for the
A. PSAT
B. SAT
C. ACT
D. FAFSA
Answer:
ACT
Explanation:
"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing." - https://greentestprep.com/resources/act-prep/act-aspire-test/
Aspire is a test you take to prepare for the ACT. Thus, option C is correct.
What is ACT?"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing.Aspire is a test people take as a preparation for both ACT a d SAT.
Aspire is a valuable tool to help students and their parents monitor progress towards a good ACT exam from 3rd to 10th grade. The Aspire test assesses student performance in five areas covered by the ACT exam: English, math, reading, science and writing. Aspire Test is offered in the spring and fall seasons, the cost of the assessment tool depends on how many subjects you would like to measure and how often you want your student to be tested.
Learn more about Aspire Test on:
https://brainly.com/question/4469429
#SPJ7
What keys on the keyboard have the ability to move the cursor around on a window?
No links and files or I report!
Will give Brainliest!
Answer:
Press the Windows key on your keyboard. In the box that appears, type Ease of Access mouse settings and press Enter . In the Mouse Keys section, toggle the switch under Use numeric pad to move mouse around the screen to On. Press Alt + F4 to exit this menu.
PLZZZZ HELP!!!
Select the correct answer.
What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules
Answer:
B.
writing sequences of statements in a suitable programming language to produce the desired program
Explanation:
During the coding phase, developers analyze the feasibility of each coding language and begin programming according to coding specifications. Without proper coding, the product won't function according to the customer's specifications, and new codes may need to be implemented
What do y’all think are the pros and cons to using technology?
Answer:
Explanation:
pros. convenient, easy to use, and educational cons. addictive, mentally draining, and creates a social divide.