Answer:
Your answer would be gas.
Explanation:
Steam is just water just evaporated.
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
Answer: bastion host
Explanation:
List three (3) features of first generation computer
Answer:
features are
the first generation computer were based on vacuum tube technology
they were very large in size,very slow in speed and very low in capacity
they used to get heat very soon
Brake fluid is made up of a chemical that:
hi there!
Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.
hope this helps.
Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer.
Answer:
The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.
Hope that helps. x
In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines
The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.
Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.
Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.
This ultimately implies that, various symbols, signs and objects that were mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.
Read more: https://brainly.com/question/14810228
hellowsss im bord :>
add my media pls its lil bunny(bunni) shoty (shawty)
Answer:
Bold
Italicized
Underlined
BOLDLY UNDERLINED
Okay! I will! ;)
I adore rabbits too!
I even made a book about them!
(It's not published tho :( )
write a program to print even numbers from 1 to 20
Answer:
If qbasic then
pls mark barinist
Answer:
print(“2 4 6 8 10 12 14 16 18 20”)
Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD
Answer:
C
Explanation:
Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.
Hope this helped, and sorry if I didn't answer in time.
You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable
Answer:A. A default Variable
Explanation:
Answer:
A
Explanation:
Did it on a Test
what method does a gsm network use to separate data on a channel?
To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library
Answer: import
Explanation:
solve each of the following a. 3x=27
Answer:
3^(x)=27 x=3
Explanation:
3x3x3 27
:)
3ˣ = 27
Factorise 27.
27 = 9 × 3
27 = 3 × 3 × 3
27 = 3³
So,
3ˣ = 27
=》ˣ = ³
3³ = 27
_____
Hope it helps ⚜
What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and device drivers The combination of hardware, software, and controls that work together to enforce a security policy
Answer:
yuh
Explanation:
The trusted computing base of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system
3.) The primary storage device that holds the data currently being processed by the computer is
Answer:
I personally think its a hard drive or something like that,im not a computer expert to be honest
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.
An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.
In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).
Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.
In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.
Read more: https://brainly.com/question/5660386
Question 11
Methods that return a decimal value must be declared using what type?
a. int
b. void
c. double
d. String
e. null
Question 12
Which of the following is true when x = 15?
a. (x >= 15) && (x < 13)
b. !(x > 13) || (x > 16)
c. (x > 13) && (x < 17)
d. (x < 15) || (x > 15)
e. (x <= 13) || (x >= 17)
Answer:
11. a, 12.c
Explanation:
bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17
When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at that memory location the new number gets assigned to a neighboring memory location the computer issues an error the new value is destroyed and the old value remains
Answer: the new number overwrites the previous value at that memory location
Explanation:
When a number gets assigned to a variable that already has a value, the new number overwrites the previous value at that memory location. The correct option is A.
What is assigning value?To "assign" a variable is to symbolically link a specific piece of data to a name. Any operations performed on this "name" (or variable) must be true for all possible values.
The assignment operator is the equals sign, which should never be used for equality, and should never be followed by the double equals sign.
To assign a value to a variable, use the simple assignment operator. The assigned value is evaluated by the assignment operation.
It is possible to chain the assignment operator to assign a single value to multiple variables.
When a variable receives a new value, the previous value is overwritten.
Thus, the correct option is A.
For more details regarding assigning value, visit:
https://brainly.com/question/28587274
#SPJ2
What number is represented as a binary code of 101110
Answer:
46 i think
Explanation:
sorry if thats wrong
the service you are attempting to use is restricted
Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.
Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.
When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.
A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.
Learn more about restricted from
https://brainly.com/question/15870692
Before taking the boat out for an excursion, it is always a good idea to let someone know you are leaving. Which would be the best way to accomplish this?
The best way to let someone know you are leaving on an excursion with a boat is: by filing a boat plan.
A boat plan is also referred to as a sail plan or float plan and it can be defined as a paper document that outlines a traveler's itinerary and other important information while on water.
Generally, a boat plan comprises the following important information about traveler and the trip:
NameOwner's address Telephone numberDestinationSafety equipment on boardDate and time of departureNumber of persons on board.Ideally, it is a good idea to ensure that you inform a friend or family before taking your boat out for an excursion. Also, the best way to accomplish this is to file a boat plan.
Read more on here: https://brainly.com/question/10339634
once multiple layers are selected which keyboard shortcut merges them
Considering the computer system analysis, when the multiple layers are selected, the keyboard shortcut that merges them is "Ctrl+E for (Windows) or Command+E for (Macbook)."
What Keyboard Shortcut?Keyboard Shortcut combines keyboard keys to ensure software programs perform specific functions.
Keyboard Shortcuts can be made by a Computer manufacturer as part of the standard functionality of the operating system or application program or made explicitly by the user in a scripting language.
Keyboard Shortcut is different in both Windows and Macbook Operating systems.
Hence, in this case, it is concluded the correct answer is "Ctrl+E for (Window) / Command+E for (Macbook)."
Learn more about Keyboard shortcuts here: https://brainly.com/question/14447287
Which of the following programming scenarios would benefit most from the use of lists?
The programming scenarios which would benefit most from the use of lists is: B. writing a program to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score).
Computer programming involves the process of designing and developing an executable instructions (codes) or collection of data to perform a specific task.
In Computer programming, a list can be defined as an abstract data type that represents a finite number of either ordered or unordered values. Thus, a list can be used to perform the following tasks:
Store data items.Delete data items.Add data items.A computer program that is used to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score) would benefit most from the use of lists because it comprises a set of numerical values that can be sorted in either an ordered or unordered array.
Read more on lists here: https://brainly.com/question/15092271
about how many smart devices are active today coinbase
Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.
What is Smart Device?Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.
Examples of Smart DevicesSmart devices generally include the following:
SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.Hence, in this case, it is concluded that the correct answer is 21.5 billion.
Learn more about Smart Device here: https://brainly.com/question/24803254
The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted
Answer:
D
Application
System software is the set of programs that enables your computers hardware devices and Application software to work together.
Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)
Explanation:
what computer is designed for particular application
Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it
Explanation:
This is an image of the ...........................Topology.
if answer Correct i will mark the first person brainly.
Answer:
Mesh
Explanation:
lenny joggy along a trail for 1.35 hours he ran at a pace of 3.2 miles per hour. how far did lenny jog?
Answer:
Lenny jogged along a trail for 1.35 hours. He ran at a pace of 3.2 miles per hour. How far did Lenny jog? Answer Lenny jogged 4.32 miles.
Explanation:
According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.
Answer:
a hypothesis that forms into a question.
Explanation:
What is the main difference between structured and unstructured data?
Answer:
answer is 4.
Explanation:
for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..
Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one from a lesser-known brand. Which questions should she consider before she buys the jacket? Check all that apply. Is advertising influencing her? What are her motivations? Has she compared prices? Is she buying at the right time? Will her sister like the jacket too?
The questions that she should consider before she buys the jacket are:
Is advertising influencing her?What are her motivations?Has she compared prices?Is she buying at the right time?What is buying?The act of buying an item is known to be acquiring a specific possession, or ownership/ rights to the use that thing or services. This can only be done through payment that is mostly based on the use of money :
Note that before getting something, one must consider other things such as prices and the reasons for buying the item before one can go ahead to purchase that thing.
Learn more about buying from
https://brainly.com/question/25745683