Which is an example of a technology that has changed the safety of humans?
A) a bicycle

B) a window

C) a rope

D) a baseball bat

Answers

Answer 1

Answer:

B

Explanation:

because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city


Related Questions

Buying a new computer for which of these reasons is most likely a sound
financial decision?
A. You liked the ad for it on TV.
B. You need it to do your homework.
O c. Your friend has one.
D. You were persuaded by a salesperson.

Answers

Answer:

b. you need it to do your homework

Explanation:

If you can answer theses ill give u a brainliest (i think thats how u spell it) but only if u get it right u will get one NOT A SCAM!!

Question: In which logical operator at least one condition has to be true?

O or

O None of the above

O not

O and

Question: In which logical operator both conditions must be true?

O and

O or

O not

O None of the above

Answers

Answer:

or / and

Explanation:

i took the quiz at unitek college

Answer:

1. or

2. and

Explanation:

The illegal copying of program​

Answers

Answer:Software piracy

Explanation:

The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.

a
Conclusion
b
Introduction
c
Counterclaim
d
Topic Sentence
Question 9 (5 points)

Answers

Answer:

D. Topic Sentence

Explanation:

Which of these are true? Check all that apply.

a. You can have many processes running for one program.
b. A program is a process that is executed. A process is a program that we can run.
c. A program is initially stored in RAM. A process is initially stored in the hard drive.
d. A program is an application that we can run. A process is a program that is executed.

Answers

Answer:

The following are true according to the process and the information which is  being implemented.

b. A program is a process that is executed. A process is a program that we can run.

c. A program is initially stored in RAM. A process is initially stored in the hard drive.

d. A program is an application that we can run. A process is a program that is executed.

Explanation:

Statements that are true as regards how programs and the information is  being implemented are;

A program is a process that is executed. A process is a program that we can run.A program is initially stored in RAM. A process is initially stored in the hard drive.A program is an application that we can run. A process is a program that is executed.

According to the question we are to discuss program and its implementation and how it is been run.

As a result of this we can see that program is an application that we can run. A process is a program that is executed.

Therefore, program is a process that is executed. A process is a program that we can run..

Learn more about program at;

https://brainly.com/question/16397886

draw internal architecture of computer​

Answers

Answer:

If this is good, let me know in the comments and I'll draw it

Explanation:

The default for automatic replies in outlook is what?

Answers

Answer:

The default for automatic replies in outlook is turned off, so the user has to turn it on in order to use it.

Out.look is a program developed by Micro.soft for managing e-mails, being together with G.mail one of the most used worldwide. As in most of these programs, you can configure automatic responses in order to give a quick and generic response to certain types of messages (or even all). Now, this option is disabled by default, so the user must activate it through the configuration of the email box.

The default for automatic replies in Outlook is

disabled

It is best to

schedule  automatic replies.

Automatic replies may validate your

email  to spammers.

Automatic reply rules are for

conditional  settings like forwarding a message to a coworker.

Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool should an Administrator use to get this information

Answers

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

Name one characteristic of natural languages that prevents them from being used as programming languages.

Answers

Answer:

Ambiguity.

Explanation:

Natural language of human beings are believed to be ambiguous, as it often required settings punctuation, and intonation to determine certain meanings correctly.

Also is the fact that natural language sometimes has more than one meaning for the same words.

Hence, one characteristic of natural languages that prevent them from being used as programming languages is AMBIGUITY.

joe Hubb does not have a secure workplace to do payroll and store confidential records in the store. He uses a space in his home exclusively for this purpose and documents the use thoroughly. What form is used to calculate his office in the home deduction

Answers

Answer:

Joe Hubb can use Form 8829 to calculate his office in the home deduction.

Explanation:

Based on the scenario, Joe is a self-employed taxpayer.  Self-employed taxpayers who are filing IRS Schedule C, Profit or Loss from Business (as Sole Proprietorship) calculate their 'Expenses for Business Use of Home' on Form 8829.  The expenses that are deductible include costs of electricity, heating, maintenance, cleaning supplies, and minor repairs, but only the business-use portions.

Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack

Answers

D. 15 minute snack
Sorry if wrong

Which are the steps in the process of creating a database

Answers

Answer:

Determine the purpose of your database. ...

Find and organize the information required. ...

Divide the information into tables. ...

Turn information items into columns. ...

Specify primary keys. ...

Set up the table relationships. ...

Refine your design. ...

Apply the normalization rules.

Answer:

identifying fieldnames in tables

defining data types for field names

Explanation:

sorry I'm late. future Plato users this is for you

What is the difference between a programming language and natural (every-day) language?

Answers

Natural languages are used for communication between people

Consider a file/directory with the following info:

-rwxr-x--x 1 milk milk 1858 May 1 16:29 abc

Which of the following statement(s) is/are true for the file/directory? Pick ONE OR MORE options

a. abc is a directory.
b. The group the owner belongs to can read and execute abc.
c. All other users can execute abc.
d. The owner can not execute abc.

Answers

Answer:

The statement that is true for the file/directory is:

a. abc is a directory.

Explanation:

A file directory is a computer filing system with cataloging and referencing structure to computer files and other directories.  Also known as folders or drawers, directories are like the workbench or traditional office filing cabinet.  Information is stored in files, which are then stored in directories (folders). Directories can also store other directories to form a directory tree.

"abc" is a directory. A further explanation is below.

A file directory would be a type of computer organizing system that provides cataloging and reference architecture for computer records as well as other directories.Files have been used to hold knowledge, which would be subsequently organized into directories. Additional directories could be stored in directories just to construct its hierarchy.

Thus the above approach is right.

Learn more about the directory here:

https://brainly.com/question/7007432

Rita tried unsuccessfully to open a PDF file attachment in her Inbox by double-clicking the attachment in the Reading Pane. What is the most likely reason that the file would not open properly? The PDF attachment should have been right-clicked. PDFs are too large to be sent through most e-mail systems. An add-in for PDFs was not set up in the system. Outlook never accepts PDF files as attachments.

Answers

Answer:

3rd option

Explanation:

he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do

Answers

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software. It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.

please help

Write a method that takes 5 ints as parameters and returns the average value of the 5 ints as a double.

This method must be named average() and it must have 5 int parameters. This method must return a double.

Calling average(1, 5, 7, 4, 10) would return 5.4.

Answers

Answer:

Answered below

Explanation:

This solution is written in Kotlin programming language.

fun average (a: Int, b: Int, c: Int, d: Int, e: Int) : Double {

#variable to hold the addition of all parameters

var sum = a + b + c + d + e

#variable to hold the average of sum

var avg = sum / 5

return avg

}

#call the function to see how it works.

# this operation is done in the fun main()

var test: Double = average ( 5, 4, 7 , 3, 9)

print (test)

how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address

Answers

Answer:

The answer is "14".

Explanation:

Let the IP address [tex]= 196.45.204.0[/tex]

When it borrowed 4 bits

[tex]\therefore\\\\ subnet = 28[/tex]

[tex]IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000[/tex]

If the borrowed bits are left out then:

The Number of useable host addresses:

[tex]= {(2^4) - 2} \\\\ = 16-2\\\\ =14[/tex]

What property can we use to check if a string matches a regular expression?


A. match

B. isEqual

C. isSimilar

D. equal

E. matched


I probably won't be able to see the answer in time but I hope this'll help anyone else

Answers

Answer:

A.Match

Explanation:

Plato

The property that can be used to check if a string matches a regular expression is match. The correct option is A.

What is a regular expression?

Simple characters, like /abc/, or a mixture of simple and special characters, like /ab*c/ or /Chapter (d+).d*/, make up a regular expression pattern. Parentheses, which serve as a storage mechanism, are employed in the final illustration.

A string of characters called a regular expression is used to search for patterns. It is primarily used for string matching, pattern matching with strings, etc. They are a general method of matching patterns to character sequences.

The phrase "regular expression" derives from theories in mathematics and computer science and refers to the regularity of mathematical expressions. The earliest grep tools employed text patterns that were regular expressions in a mathematical sense.

Therefore, the correct option is A. match.

To learn more about regular expression, refer to the link:

https://brainly.com/question/17255278

#SPJ5

In REPL.it, the interface includes an Editor and an Interpreter.
True
False

Answers

Answer:

Its true.

Explanation:

Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList vals in the order they originally appeared. The contents of vals should not change. For example if an ArrayList containing the Integers 2, 5, 8, 6, 7, 3, 12 in that order is passed as a parameter to getOdds, it should return an ArrayList containing the Integers 5, 7, 3 in that order. Write your getOdds method in the U7_L2_Activity_Three class. Use the runner class to test your method but do not add a main method to your U7_L2_Activity_Three.java file or your code will not be scored correctly.

Answers

Answer:

Answered below

Explanation:

//Program is written in Java programming language.

public ArrayList<Integer> getOdds( ArrayList<Integer> list){

// Create variables to hold the new list and the //indexes.

int i;

ArrayList<Integer> oddList = new ArrayList<Integer>()

//Loop over the list and add every odd element // to the new list

for ( i = 0; i < list.length; I++){

if ( list[i] % 2 != 0){

oddsList.add(list[i])

}

}

return oddList;

}

Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple function to test it out.

For example, if you made a call like

x = quadruple(3)
then x should hold the value 12.

Print the value of x to verify your function works correctly.

(CODEHS, PYTHON)

Answers

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

/kwɒdˈruː.pəl/ to increase by four times, or to multiply anything by four: In the past ten years, the college's enrolment has increased by a factor of four.

What is the role of quadruple that quadruples a number?

Finding the array's four maximum and four minimum components is another method for locating the quadruple with the highest product. And then supply the maximum of these three product values, which will result in a quadrupled maximum product.

When ordering a quadruple-shot latte, which contains four shots of espresso, you can also use the word quadruple to signify “four times as many.” The suffix quadric-, which means “four,” is the source of the Latin root quadruple, which means “create fourfold.”

Three address codes are also referred to as quadruples. Using pointers to entries in a symbol table as the operands and an enumerated type to represent the operations, quadruples can be accomplished.

Therefore, One operation and up to three operands are divided into four fields in a quadruple.

Learn more about quadruples here:

https://brainly.com/question/7966538

#SPJ2

An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in this array. Which of the following preconditions must she ensure to perform a binary search?

The list has a large number of names.
The name X is present in the list.

In addition to the two statements above, which of the following is correct?

a. There should be no duplicates in the list.
b. The names in the list should be alphabetical order.
c. The name X should occur near the middle of the list.

Answers

Answer:

Preconditions that she must ensure to perform a binary search are:

The list has a large number of names.

The name X is present in the list.

c. The name X should occur near the middle of the list.

Explanation:

Nancy's binary search for a name X should begin by comparing an element in the middle of the array or list with the name X (target value). If this name X's value matches the value of an element in the list, Nancy must return its position in the array.  If the name X's value is less than the element's value, Nancy will continue the search in the lower half of the array.  Usually, the name X should occur near the middle of the list or array.

Which of the following terms best describes the product development life cycle process?
descriptive
iterative
Static
evaluative

Answers

Answer:

D

Explanation:

Evaluative

a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​

Answers

Answer:

would it be term and tequnique?

Explanation:

oooooooo

Can you sort by reading the string in reverse in python?

Answers

Explanation:

# Let our string is brainlycom

Main = "brainlycom"

# First we will print the original string.

print("The original string : " + str(Main))

#Now Reverse Sort a String

Reverse_Sort= ''.join(sorted(Main, reverse=True))

print("String after reverse sorting : " + str(Reverse_Sort))

After running the above code you will get the result:

The original string : brainlycom

String after reverse sorting : yronmlicba

A pitch is used to bury your screenplay? True or false

Answers

The correct answer for your question would be true

Which example can be used to perform a binary search?

Answers

Answer:

In any case, binary search can be used to solve more extensive scope of problem, for example, finding the next smallest or next-biggest element in an array comparative with the target regardless of whether it is present or missing in the array.

Explanation:

In computer science, binary search, otherwise called logarithmic search, is a search calculation that finds the position of an objective incentive inside an arranged array. Binary search compares  the  target value to the center component of the array. In the event that they are not equivalent, the half in which the value can't lie is dispensed with and the search proceeds on the other half, again taking the center value to contrast with the target value, and continues this until the target value is found. On the off chance that the search ends with the other half being empty, the target value isn't in the array.

Binary search is quicker than linear search aside from small arrays. Nonetheless, the array should be arranged first to have the option to apply  binary search. There are particular data structures intended for quick looking, for example, hash tables, that can be looked through more effectively than binary search.

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

Problem decomposition means
O Fixing the problem
O Solving the problem
O Breaking down tasks into smaller, manageable parts
0 None of the above
PLEASE HELPPPPPP

Answers

Answer: Breaking down tasks into smaller, manageable parts

Explanation:

The word decomposition means to break down so Problem decomposition means to break down the problem being faces into smaller parts with the reason being to be able to manage it better.

Some problems are simply too large to handle singularly because of the amount of resources that would have to be devoted. It would be better to break them down into smaller tasks that can then be be confronted one at a time with enough resources to solve them each.

Other Questions
helphelphelphelp im desperate Can someone answer all 3 questions plz? everal of the main characters in Trifles are housewives. Why would writing about a housewifes situation be an appropriate way to express a feminist theme? Carl Lester has liquid assets of $3,400 and current liabilities of $1,800.(a) What is his current ratio please help. im pretty stumped SOLVE THIS MATH PROBLEM PLEASE!!-4-2(4+-2)*3 what is the important forest? PLZZZ HELP!!!!!The Scholarship Jacket: Reread lines 47-48. During the teachers' argument, one of the teachers says "Martha is Mexican." What could he mean by this?Line 47- " The pounding in my ears drowned out the rest of the words, only a word here and there filtered through. . . . Martha is Mexican . . . resign. . . wont do it . . . . Line 48- "Mr. Schmidt came rushing out and luckily for me went down the opposite way toward the auditorium, so he didnt see me." Lacy saves 45% of her paycheck. If Lacy's paycheck is $680, how much does she save? the difference of 2 numbers x and y multiplied by 6 Which is the only center point that lies on the edge of a triangle?the incenter of a right trianglethe incenter of an obtuse trianglethe circumcenter of a right trianglethe circumcenter of an obtuse trianglegive me the best weeb memes you have XD solve for x. 3x - 8x + 2 = 17X= PLEASE PLEASE HELP!~!!!!!!!!!!!!!!!!!!!!!!!! NEED HELP ASAP!! I'LL GIVE BRAINLIEST TO THE CORRECT ANSWER!!A.) 20.6 unitsB.) 4 unitsC.) 19.4 unitsD.) 5 units six times the quotient of four and a numberPLEASE HELP ME!!!!!!!! Two points charge of 4\mu C and 2\mu C are placed at theopposite corners of a rectangle. What is the potential difference Va- Vb could someone answer these? Is this a sentence fragment?In the midst of ski season, a gigantic avalanche.PLZ HELP ! Name4.BanltwoLine m is the perpendicular bisector of AB andintersects the segment at point P. Whichstatement is true?(A) AP = 2 ABPA & BP()AB = APBP = 2 AB b.10 ftC3 ftarea of the rectangle =area of the triangle =