What is the purpose of a return statement?
a - to pass a value from inside a function to the main program
Your computer will organize files into _______ order.
A) Chronological
B) Size
C) No specific
D) Alphabetical
Brainliest for (CORRECT) answer
Answer:
c is the answer of the question
Answer:
A chronological
I'm sorry if I am wrong
!!! PLEASE HELP ASAP REALLY NEED IT !!!
which of the following is NOT a reason to make a payment online?
A- Time saving
B- Do not have a computer
C- Paper free
D- Less hassle
Answer: B
This is honestly confusing, this is the only one that makes sense...
Answer:
B but i would say all answers are correct and B seems the most logical
Keith would like to compare data he has collected from research. The data includes the electrical output
current from five different chips. Which type of graph should he use?
a line graph
a bar graph
a pie graph
an area graph
Answer: my test says line graph soooo….
Explanation: if its what the test says
what dose a hard drive do
Answer:
What does a hard drive do? Simply put, a hard drive stores data. On a computer, this includes all of your photos, videos, music, documents, and applications, and beyond that, the code for your computer's operating system, frameworks, and drivers are stored on hard drives too.
When i add someone to canvas course, do they get an invitation?.
Explanation:
Canvas generates a course invitation when an enrollment is manually added to the course. (Find that in goggle)
Knew that I'm just bad at explaining lol
What is the first step of the procedure to protect the GRUB (GRand Unified Bootloader) 2 boot loader with a password
The first part of GRUB (GRand Unified Bootloader) is to resides on the MBR/GT.
The configuration file for the GRUB (GRand Unified Bootloader) 2 boot loader is Grub.cfgThe second step of the procedure to protect the GRUB (GRand Unified Bootloader) 2 boot loader with a password is to Enter the word grub2-mkpasswd-pbkdf2 to start creating a cryptographic hash of a password.What is grub?The term grub is known as GRand Unified Bootloader. GRUB (GRand Unified Bootloader is known to be a kind of boot loader package.
It was said to be developed so as to aid a lot of (multiple) operating systems and it is one that helps the user to select among them when they are in boot-up.
Learn more about GRUB from
https://brainly.com/question/6093142
if your cell phone rings while you are driving and you do not have a hands-free device you should
Answer:
wait to get to a red light or a stop sign then answer it and put it on speaker phone
Explanation:
Which are types of wired connections for PANs?
Access point
Bluetooth
FireWire
USB
Choose 2 answers
How to tell if your computer is 32 or 64-bit windows 10.
Answer:
Find operating system info in Windows 10
Select the Start button > Settings > System > About . Open About settings. Under Device specifications > System type, see if you're running a 32-bit or 64-bit version of Windows.Under Windows specifications, check which edition and version of Windows your device is running._________ mode requires only the implementation of the encryption algorithm and not the decryption algorithm.
Answer:
CTR
Explanation:
A. CBC
B. DKS
C. ECB
D. CTR
out of those its CTR
ANs and WANs can be set up in several different shapes, also known as peripherals.
A.
True
B.
False
Answer:
The Answer Is False Because They Aren't Called Peripherals
what operating system good for 3d modeler
Answer:
If you're looking for a distribution to use for 3D work, we would recommend trying either CentOS or Ubuntu, in second place. It can be installed on any PC computer that is able to run windows, and can even dual boot. It can not, however run windows or mac applications.
Explanation:
I hope this helps!8 9. McWhorter argues that being able to understand in textspeak has many of the same benefits as being able to speak two languages. Can this same argument be applied to emojis? Why or why not?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER
Answer:
yes because i could use ️ to say im eating a chicken leg and or talking with my mouth full and got slapped so yes i believe so
Explanation:
Answer: Yes because if you speak in "emoji" you technically can talk in any language you want because whoever you are sending it to could knows what you're implying by them
Explanation:
How to mark a discussion as read on canvas dashboard.
Answer:
On a discussion page, scroll to the top, to the right of the edit button, click on the three vertical dots, and select "Mark all as Read." Explanation:
____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
Answer:
Flipped bits
Hope this help.
Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that calculations. What could she use instead?
The cube root is a number multiplied by itself three times to get another number
The code to use is y = x**(1/3)
How to determine the code to useAssume the variable is x, and the cube root of x is y.
So, we have the following equation
[tex]y = x^\frac13[/tex]
In Python, the code to use is y = x**(1/3)
Hence, the code that Rachelle can use in her calculation is x**(1/3)
Read more about cube roots at:
https://brainly.com/question/365670
Answer:
The code that Rachelle can use is x**(1/3).
Explanation:
#BrainliestBunchWhy is data-driven analytics of interest to companies?.
Data-driven analytics enables data processing through intelligent algorithms, helping companies scale business intelligence and improve decision-making.
What is Data-driven analytics?It is a technology that allows data processing to be carried out within the database, that is, it is based on statistical algorithms that allow information analysis to be carried out.
Importance of Data-driven analytics to companiesIt allows organizations to analyze all their data to identify patterns and automate decisions.It is used in various industries to allow businesses to verify and refute existing theories or models.Create projections on the future impact of making a specific decision, accelerating response times to market opportunities or difficulties.Therefore, we can conclude that Data-driven analytics drives companies forward by introducing algorithms to optimize better decision making.
Learn more about Data-driven analytics here: https://brainly.com/question/26684573
Assignment 6: Animation
I am stuck and am wondering where I need to place an if statement and what needs to be in it.
Answer:
its because you should have put (BODY_LEN./2 on line 45 instead of (BODEY_LEN./2) and in line 23 it should have been else: (counter < 185) and if any one deletes my answer its because you dont understand coding and you dont know how complex it is to code and make games, content and animations as simple as that Katie
Explanation:
Graphing calculator how to turn off scientific notation.
Answer:
Check to see if there is a button labeled “mode”. If there is a button labeled mode push it, then select “NORMAL” instead of “SCI”. Check to see if there is a button labeled “mode”. If there is a button labeled mode push it, then select “NORMAL” instead of “SCI”.
sorry if it doesn't help
good luck!
Explanation:
why might enforcement policies be used to prevent usb tethering when a smartphone is brought to the workplace
Enforcement policies can be applied to prevent sensitive company information from being extracted by an employee using a USB-connected mobile device.
What is the enforcement policy?The enforcement policy is a set of rules and regulations that limit the actions of an employee during their work in the company. These compliance policies establish codes of behavior, clothing, data processing and other matters relevant to the company.
In accordance with the above, the enforcement policy can establish a rule for employees to avoid extracting confidential or proprietary information from the company using mobile devices.
Learn more about enforcement policies in: https://brainly.com/question/10220062
Which of the following activities is not permissible for IT professionals while on the job? Check all of the boxes that apply.
working on a side job while at work for one’s primary job
viewing s3xual content on a company computer
sending coworkers an e-mail joke containing suggestive humor
downloading music from a file-sharing service
The activities that is not permissible for IT professionals while on the job are option A, B, C and D.
Working on a side job while at work for one’s primary jobViewing s3xual content on a company computerSending coworkers an e-mail joke containing suggestive humorDownloading music from a file-sharing service What values underpin the IT industry?In the workplace, employees are frequently required to uphold professionalism, also the issue of accountability, as well as integrity. This entails managing private information responsibly, ensuring a secure workplace, and abstaining from illegal behavior like taking bribes.
IT specialists are the people that often design, test, as well as install, maintain, and that of repair hardware and software for businesses.
Therefore, Employees have a responsibility to comprehend a user's capabilities and needs in order to supply the goods and services that best satisfy those needs, subject, of course, to financial and logistical limitations. The public expects professionals to contribute significantly to society and to behave responsibly.
Learn more about IT professionals from
https://brainly.com/question/17496239
#SPJ1
write keyboard shortcut to insert footnote and endnote
Answer:
Alt + Ctrl + F to insert a footnote.
Alt + Ctrl + D to insert an endnote.
Correct me, if I am wrong :)
Have a great day!
Thanks!
The diagram shows the parts of a computer. In which part is data processing done?
Answer: Control unit
Explanation: Took test
________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and decryption.
Answer:
RSA
Explanation:
Pretty sure it's RSA, hope this helps!
If you select one slice of pie in a pie chart, you have selected a ____
data series
data set
data point
data line
Answer:
a date point I think I don't really know
Which does an artboard layer allow users to create in photoshop?.
An artboard layer allow users to create multiple canvases in a single document.
What is an Artboard?This is defined as a graphic design application which is mainly used in the creation of product mockups.
it can be used in photoshops and help create multiple canvases in a single document which is why it is regarded as an important application in graphic designing.
Read more about Artboard here https://brainly.com/question/7221559
Every artboard has its own set of layers, component groups, text, smart objects, and whatever else a PSD document can have.
Artboard Layer:In a Layers palette, you may change the layering order in each image as well as the order of the artboards themselves.Users can use an artboard layer to generate many canvases in a single document.It is a graphic design program that is primarily used for the creation of product mockups.This may be used in Photoshop to create several canvases in a single project, which is why it is considered a useful tool in graphic design.Find out more about Artboard here:
brainly.com/question/26821177
What happens when you change just ONE character in your input string?
To send the content of one file to another file, you can use the _______ redirector.
Hope this helps!
HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.
Answer:
My goal is to have good grades because I failing now and I want to try and try to get my grade up if I do I will be successful and when I grow up I will have a good job and a better life for me and my family.If I success my life will be so different.
Why are we currently undergoing a switch from ipv4 to ipv6?.
There are not enough addresses in IPv4 to support all of these devices of the lPv6 also allows for more secure communications between these already insecure devices