Answer:
here you go man-Changing or improving graphics images. It typically refers to bit mapped images rather than vector graphics drawings. Using an image editor, images can be modified by an artist using pen, brush, airbrush and other "painting" tools.
You copy a paragraph from an article and put it into a paper you are writing as if you had written the paragraph yourself. This is an example of: Ophishing O identity theft. O augmenting reality. O plagiarism.
Copying a paragraph from an article into a paper you are writing as if you had written the paragraph is an example of: D. plagiarism.
What is plagiarism?Plagiarism can be defined as the act of representing or using an author's literary work, thoughts, ideas, language, or expressions without their consent, acknowledgement or authorization.
This ultimately implies that, plagiarism is an illegal act that involves using another author's intellectual work or copyrighted items word for word without getting an authorization or permission from the original author.
In conclusion, copying a paragraph from an article into a paper you are writing as if you had written the paragraph is an example of plagiarism.
Read more on plagiarism here: https://brainly.com/question/397668
Calculate the time complexity for the following function in terms of Big O notation. Explain your answer.
[Note: Line numbers are only for reference purpose]
int fun(int n)
{
1 int count = 0;
2 for (int i = n; i >= 0; i /= 2)
3 count += i;
4 for (int j = 0; j < n; j++)
5 count +=j;
6 return count;
}
Answer: It is 1 int count = 0;
2 for (int i = n; i >= 0; i /= 2)
3 count += i;
4 for (int j = 0; j < n; j++)
5 count +=j;
6 return count;
SO it is j(0-(-n)
Explanation: Im dum
What is the difference between
I need more context
Explanation:
you didn't the whole question
what is computer software?
Answer:
Software is a collection of instructions that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.
Define a method named orderOfAppearance() that takes the name of a role as an argument and returns that role's order of appearance. If the role is not found, the method returns 0. Ex: orderOfAppearance("Forrest Gump") returns 1. Hint: A method may access the object's properties using the keyword this. Ex: this.title accesses the object's title property.
// Code will be tested with different roles and movies
let movie = {
title: "Forrest Gump",
director: "Robert Zemeckis",
composer: "Alan Silvestri",
roles: [ // Roles are stored in order of appearance
"Forrest Gump",
"Young Forrest Gump",
"Jenny Curran",
"Lieutenant Dan Taylor"
],
orderOfAppearance: function(role) {
}
};
The method named orderOfAppearance() that takes the name of a role as an argument is; Written as below
How to write a Program in Java?The steps to write this Java program is as follows;
1) Initialize the movie JSON (JavaScript Object Notation) having the name, director, composer and title properties.2) Define a roleOf: function that has a name parameter.3) Check whether the selected is not equal to undefined and then return that name.4) Otherwise display this message: "0".let movie = {
name: "Forrest Gump",
director: "Robert Zemeckis",
composer: "Alan Silvestri",
title: {
"Forrest Gump",
"Young Forrest Gump"
"Jenny Curran"
"Lieutenant Dan Taylor"
},
orderOfAppearance: function (role) {
if (typeof (this.title[role]) !== 'undefined') {
return this.title[role];
} else {
return "0";
}
}
};
Read more about java programming at; https://brainly.com/question/16397886
Imagine that you are introducing a new system to college students where they would have to use a special ID number you create for them for activities such as logging on to campus computers or using library resources. How would you plan and implement the change? Explain using Lewin’s three-stage framework.
Explanation:
g tear valobeshe beshe dibo na ya baba ji bante
Which term refers to the data stored in computer memory on which the processor applies the program instructions?
Answer:
Cache memory
Explanation:
Cache memory is a small unit of ultrafast memory built into the processor that stores frequently or recently accessed program instructions and data.
ways of caring for storage devices
Answer:
eject the device before removing
Explanation:
If you just unplug a device, you run the risk of unplugging while an application is still using the device
You have been hired at Maria's Kitchen, a restaurant in Riverside. Chef and owner Maria has
been asking her wait staff to take orders on paper. She would like a new system where the
wait staff can type in orders. The system should also print tickets for the kitchen staff that are
easy to read so they know what dish to make and what table it belongs to
For those of you who have food service experience, you will recognize this as a very simple
point-of-sale (POS) and kitchen display system (KDS). Learn more about POS and KDS here.
Industry note: real systems tie into the restaurant's financial and accounting records for
auditing (finance and accounting majors), automatically reorder supplies and ingredients at
the right time (supply chain majors), and allow access from a dashboard that can analyze the
data for patterns and trends as well as employee performance (management, marketing, and
business analytics majors).
A new system where the wait staff can type in orders is known as waiter ordering system.
What is a waiter ordering system?A waiter ordering system is known to be a kind of system that has been made a lot easy for the employees to take in online orders through the use of a tablet or iPad or a desktop system.
Using customers notion of what it means, it is a form of online food ordering system that make sure that there is a very fast order-placement procedures. It is very useful for employees of restaurants, etc. as a waiter ordering system will help them to have a better work structure.
Learn more about waiter ordering system from
https://brainly.com/question/12827436
Which graphics element loads faster when used with text or audio on a web page?
Answer:
A slideshow uses still images that shift through a desired order.
Derrick is having trouble figuring out why his computer monitor's image is distorted. He has exhausted all of the troubleshooting ideas he can think of and has decided to contact the customer support number for his device. The Technical Support Specialist tells him that he can fix the problem but will need remote access to his computer. Remote access refers to:
using a remote control like your television has to control your device.
taking control of the operation of a computer without physically using it.
allowing someone from a remote location to come and provide in-home service on your computer.
buying a remote control peripheral and installing it on your computer.
Answer:
I think it's the second option.
Explanation:
Definitely not the first or last choice.
A tortoise is walking in the desert. It walks for 6 minutes at a speed of 7.68 meters per minute. How many meters does it walk?
Write a Java Program
Specific Instructions
Create a class for the following object.
Deck - contains 52 cards initially. Each card is represented by an unchangeable suit and value.
Suits - ♣ (Club), ♠ (Spade), ♥ (Heart), ♦ (Diamond)
Values - 1(A),2,3,4,5,6,7,8,9,10,11(J),12(Q),13(K)
Actions
draw - retrieves the top most card on the deck. When called with number of desired cards, it will try to draw the N cards, if not enough, draw all cards.
shuffle - randomizes the location of all cards, excluding the drawn cards
restore - returns the last N cards drawn on the bottom of the deck, if no number is provided, return all drawn cards.
Make sure that the class is encapsulated.
In the Deck Builder, initialize the 52 cards (along with the 4 jokers, which should be called “wild” and the suit is “wild”).
Public class Deckprivate final List<Carta> Deck;
public Baralho() {
listaCartas = new ArrayList<>();
String[] naipes = {"club", "spade", "heart", "diamond"};
int pos = 0;
Carta c;
With this code we will be able to create the Deck, initialize the 52 cards together with the 4 jokers.
Learn more about Deck in brainly.com/question/1660537
Question 6 of 10
Which level of abstraction in computing systems uses binary code to manage
information?
O A. Data
B. Programming
C. Applications
D. Operating systems
Answer:
Its A data just did the quiz
Explanation:
Data is evel of abstraction in computing systems uses binary code to manage information.
What is Data?
Data in the quest of knowledge is a collection of discrete values that transmit information, describing amount, quality, fact, statistics, other fundamental units of meaning, or just simply sequences of symbols that may be further understood.
Data can reflect both actual measures and abstract concepts. Data are frequently employed in economics, science, and practically every other aspect of human organizational activity.
Price indices (such the consumer price index), unemployment rates, literacy rates, and census statistics are a few examples of data sets. Data here refers to the unprocessed facts and numbers that can be used in this way to extract information that is useful.
Therefore, Data is evel of abstraction in computing systems uses binary code to manage information.
To learn more about Data, refer to the link:
https://brainly.com/question/10980404
#SPJ2
A student plucks a guitar string and the vibrations produce a sound wave with a frequency of
650 hertz. Calculate the wavelength of the sound wave in air at STP. [Show all work, including
the equation and substitution with units.]
Answer:
52.8 cm
Explanation:
please mark brainlest
The wavelength of the sound wave in air at STP is 0.510.
What is Frequency?This is known to be the rate at which a thing takes place at a specific interval of time.
Note that the
The speed of sound in air is
343 m/ s
At STP the speed of sound wave is
v = 331m/s
Now, the wavelength is
is to 332 / 650
= 0.510
Learn more about sound wave from
https://brainly.com/question/1199084
#SPJ2
What's the latest tech
Answer:
1. Artificial Intelligence and Machine Learning
2. Data Science
3. Full Stack Development
4. Robotic Process Automation
5. Edge Computing
6. Virtual Reality and Augmented Reality
7. Blockchain
8. 5G
9. Cyber Security
10. Quantum Computing
11. Internet of Things
12. Big Data Analytics
13. Human Augmentation
14. Everything-as-a-Service(XaaS)
15. DevSecOps
16. Predictive & Personalised Medicine
17. Voice Search Technology
18. Drones and Unmanned Vehicles
19. Mass personalization and Micro-Moments.
20. Genomics and Gene Editing
Answer:
artificial intelligence
What instructions would a computer have the hardest time completing correctly
The instructions which a computer would have the hardest time completing correctly are complex instructions.
What is an instruction?An instruction can be defined as a set of executable codes that are written and developed to instruct the central processing unit (CPU) of a computer system on how to perform a specific task and proffer solutions to a particular problem.
This ultimately implies that, it is a segment of executable codes which contain steps that are to be executed by the central processing unit (CPU) of a computer system.
In Computer programming, the instructions which a computer would have the hardest time completing correctly are complex instructions.
Read more on instructions here: https://brainly.com/question/26324021
What are two possible challenges of online collaboration?
I A. The lighting for certain team members may be dim.
A B. Team members in different time zones may have difficulty
showing up to meetings.
C. Working on the project can become drawn-out and boring.
D. A slow internet connection can make it difficult to communicate
and access online tools.
Answer:
B. Team members in different time zones may have difficulty showing up to meetings.
&
D. A slow internet connection can make it difficult to communicate and access online tools.
Explanation:
Working remotely allows for people to collaborate from virtually anywhere, but different time zones could negatively impact the work flow due to drastic differences in time.
In addition, technical difficulties are another issue to keep in mind because of the virtual setting you're working in.
Answer:
B. Team members in different time zones may have difficulty
showing up to meetings.
D. A slow internet connection can make it difficult to communicate
and access online tools.
Explanation:
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Addresses and hosts, what does she scan next on the target's network to see if any are open
After a Hacker has selects her target, the thing she scan next on the target's network to see if any are open System Ports.
How do hackers scan ports?In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.
Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.
Learn more about Hacker from
https://brainly.com/question/23294592
In a Linux machine, you have a file named "types_of_fish.txt" and you want to append the word "trout" to the file contents. Which of the following commands can you use?
A. echo trout < types_of_fish.txt
B. echo trout > types_of_fish.txt
C. echo trout >> types_of_fish.txt
D. echo trout 2> types_of_fish.txt
Answer:
B because if you where to go in and try to make a file via terminal it would have to be like
$ echo file1 > file1
$ ln -s file1 file2
$ cat file2
file1
$ ls -ld file2
lrwxrwxrwx 1 lubos lubos 5 Jan 10 14:42 file2 -> file1
for the example
Distinguished between
i. Conductors
ii Dielectric
iii. Poor Conductors
Name five (5) examples in each case and their atomic symbols
Answer:
this one is not understandable you see but I think it's better than nothing to do with it tmzr I don't know what to say to someone who did you start the morning and you can not be able to get it to
write the name of a few operating system..
In this exercise we have to use our knowledge of operating systems to explain each one, so we have to:
Microsoft Windows, Mac OS X and Linux.
What are operating systems?It is a software or set of software whose function is to administer and manage the resources of a system, from hardware components and file systems to third-party programs, establishing the interface between the computer and the user. The most common operating systems that exist for computers and that the market offers are: Microsoft Windows, Mac OS X and Linux.
So the operating system are:
Microsoft Windows is the company developed the Windows operating system in the mid-1980s. Mac OS X. This is the operating system developed by Apple Inc. Linux UbuntuSee more about operating systems at brainly.com/question/6689423
Without calculating, how can you determine the asymptotic rate of growth of the expression? Give an appropriate example to illustrate your answer.
How to make a Java GUI application? Discuss each step needed.
Explanation:
Create a JFrame container
1- In the Projects window, right-click the NumberAddition node and choose New > Other .
2- In the New File dialog box, choose the Swing GUI Forms category and the JFrame Form file type. Click Next.
3- Enter NumberAdditionUI as the class name.
4- Enter my. numberaddition as the package.
5- Click Finish.
1. provides a list of at least five SSIDs and the
corresponding wireless encryption protocol.
2. identifies their SSID and encryption protocol.
Student provides a list of at least five SSIDs and the
corresponding wireless encryption protocol.
2. Student identifies their SSID and encryption protocol.
One of the most important ways to provide wireless security is through:
The use of encryption.What is Wireless Security?This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.
With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.
Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.
Read more about wireless security here:
https://brainly.com/question/14449935
list and discuss the various scheduling techniques of operating systems
•List and discuss the various scheduling techniques of operating systems.
Answer:
•First-Come, First-Served (FCFS) Scheduling.•Shortest-Job-Next (SJN) Scheduling.•Priority Scheduling.•Shortest Remaining Time.•Round Robin(RR) Scheduling.•Multiple-Level Queues Scheduling.Explanation:
#Let's Study
#I Hope It's Help
#Keep On Learning
#Carry On Learning
what is computer hardware / software
Answer: Computer hardware is any physical device used in or with your machine, like for example, a mouse, or a keyboard. Computer software is a collection of programming code installed on your computer's hard drive it can process billions of data and inputs through this.
Hope this helps!
Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
Answer:
Research has shown that the Company unveils the industry's first high-end Wi-Fi 6E access points, Private 5G for the enterprise as a managed service, and new high-powered Catalyst 9000X series switches with Cisco Silicon One to deliver top speeds and performance with the security needed for hybrid work.
Explanation:
With these new concept/development work will be made easy.
Low Level Programming Language is also known as:
(A) Object Oriented Language
(B) Procedural Oriented Language
(C) Machine Level Language
(D) Processor Level Language
what do you mean by graphics editing
Answer:
Changing or improving graphics images. It typically refers to bitmapped images rather than vector graphics drawings. Using an image editor, images can be modified by an artist using pen, brush, airbrush and other "painting" tools.
Explanation:
Answer:
Changing or improving graphics images. To make it look much better or modify or improve digital.
Explanation: