Answer:
No
Explanation:
you dont really need java on computers today
Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack, you discover some rope, a pocket knife, a roll of duct tape, and three modern technological devices. Where are you? What is the time period? What tech devices are in your backpack? Write a diary or journal entry about how you survive for 24 hours with the help of the items you have on hand. Describe in detail and write a story about what you did those 24 hours.
Answer:
Day 1:Today I time traveled. it was pretty crazy, hope nothing goes bad.
1 hour in: Went asking around to see who is the king around here is. Everyone seems to look at me weird, I don't know why.
2nd hour: while asking around this dude came up to me and asked for silver. I said I didn't have any so then he walked away. He was an older man with a scrawny figure. Most people I see are a little bigger.
3rd hour: I finally found out who the king was
but I cant remember his name right now so I'll pit it in a different entry.
here u can start out with this if u want me to finish it just ask.
Is the app scener safe? its a chrome webstore app on computer.
Answer:
Maybe
Explanation:
If you are unsure if a website is safe look for signs. If its asking you to allow advertisement then no. I suggest you download a VPN before going to the website just to be safe
Question 14 of 20
What does action mean when solving a problem?
A. Thinking of different ways to solve the problem
B. Implementing the best solutions you came up with
C. Thinking of potential solutions and determining which will work
D. Figuring out what you want and what stands in the way of a
solution
Answer: B. Implementing the best solutions you came up with.
Explanation: with A C and D you’re only thinking but not taking action
When using word, on which tab would you find the word count tool
A) home tab
B) insert tab
C) backstage view
D) review tab
Answer:
your answer is d. review tab becoz it comes under the proofing group and the proofing group is found in the review tab
Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time listening intently but not speaking. Robert knows they are smart, but he becomes
frustrated when they don’t respond to his attempts to engage them.
Which excerpts from a report to his supervisor explains the most likely reason that the students don’t speak? Check all that apply.
A. There are differences in our communication styles because of the cultures the students grew up in.
B. Online meetings are an ineffective way to meet with people from different cultures.
C. There are differences in social behaviors because the students come from cultures that emphasize listening.
D, The language barrier is too great for our group to have an effective meeting online.
E. Online meetings make it hard for the students to discuss material they don’t understand.
Answer:
A & C
Explanation:
Answer:
A&C
Explanation:
I took this on a test
3.Troubleshooting Methodology: Given a scenario, you should be able to know how to troubleshoot.
Troubleshooting methodology is a systematic approach to identify, analyze, and resolve problems or issues that arise in various scenarios. While the specific troubleshooting steps may vary depending on the situation, there are some common principles and techniques that can be applied.
If a scenario is given, here are some general steps to follow when troubleshooting:
Define the problem:
Clearly identify the problem so that you know what to look for and how to fix it. Check whether the issue is related to hardware, software, or a mixture of both. Check if there is any error message appearing and try to decode the message. Identify the root cause of the problem.Understand the system or network:
Identify the system or network components that could be affected by the problem. Check whether the system or network is operational. If it is operational, perform a status check to identify any obvious problems.Identify the possible causes:
Identify the potential causes of the issue. Consider what changes may have been made to the system recently, as this can often help in identifying the problem.Implement a solution:
Depending on the issue, this might involve reconfiguring software settings, replacing a hardware component, or reinstalling a program.Verify the solution:
Verify the solution by testing the system or network. Check if the solution has solved the issue completely or partially. If the issue is partially resolved, repeat the above process. If the issue is resolved completely, then the solution is good to go!Document the issue and the solution:
Write down the issue and the solution for future reference. If the problem was complex, document the process followed to solve the problem. This documentation will be useful for future reference and might help other people who might encounter a similar problem.To learn more about troubleshooting: https://brainly.com/question/28508198
#SPJ11
IS EVERYONE ASLEEP!!!!
where the smart people at
PLEASEEEEE HELPPPPPP
you can use the [nav] element to contain the major navigational blocks on the page, as well as links to such things as
a. privacy policy, terms, and conditions.
b. [div] elements
c. header and footer information
d. [article] and [section] elements
Answer:
a. privacy policy, terms, and conditions
Explanation:
The nav element usually includes links to other pages within the website. Common content that is found within a webpage footer includes copyright information, contact information, and page links
in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4
Answer:
c)4
Explanation:
Hope it could helps you
which of the following regarding a data flow diagram is correct? a process must have both an input and output data flow. a data store must be connected to at least one process. external entities should not be connected to one another. all of the above
All of the above is correct regarding data flow diagrams.
A data flow diagram (DFD) is a graphical representation of the "flow" of data through a system. It illustrates the process of data transformation from one form to another. A process must have both an input and output data flow. This means that any process in a data flow diagram must be connected to at least one input and one output data flow. This ensures that data is received, transformed, and passed on to the next step in the system.
A data store must be connected to at least one process. A data store is used to store data between processes and to accumulate and retain data. It must therefore be connected to a process that reads or writes data to it. External entities should not be connected to one another. External entities are used to represent the external sources or destinations of data, such as people or other systems. Therefore, they should not be connected to one another. In conclusion, all of the above is correct regarding data flow diagrams.
Know more about Data flow diagram here :
https://brainly.com/question/31066888
#SPJ11
DogRunner.java
/*
* Activity 1.2.4
*/
public class DogRunner
{
public static void main(String[] args)
{
}
}
public class Dog
{
public Dog(String name)
{
System.out.println("Hi! I am a dog. My name is " + name + ".");
}
public void sit()
{
System.out.println("OK! I am sitting.");
}
public void speak()
{
System.out.println("arf arf!");
}
public void walk(int num)
{
System.out.println("I love to walk for " + num + " minutes.");
}
public void walk(int num, String park)
{
System.out.println("I love to walk for " + num + " minutes and go to " + park + "!");
}
public void eat(String food)
{
System.out.println("I eat " + food + ".");
}
public void eat(String food, int num)
{
System.out.println("I eat " + food + " " + num + " times a day.");
}
public void eat(String food, double amount, int num)
{
System.out.println("I eat " + amount + " cups of " + food + " " + num + " times a day.");
}
public void setAge(int years)
{
System.out.println("I am " + years + " years old.");
}
public void setAge(int years, int months)
{
System.out.println("I am " + years + " years and " + months + " months old.");
}
public void setAge(double years)
{
System.out.println("I am " + years + " years old.");
}
public void play(String toy)
{
System.out.println("Oh boy! I get to play with my " + toy + "!");
}
}
write java code to create a generic class that stores two generic objects and name the generic class after your last name.
The java code that creates a generic class that stores two generic objects and name the generic class after your last name is
public class MyClass<T1, T2> {
private T1 object1;
private T2 object2;
public MyClass(T1 obj1, T2 obj2) {
this.object1 = obj1;
this.object2 = obj2;
}
public T1 getObject1() {
return this.object1;
}
public T2 getObject2() {
return this.object2;
}
public void setObject1(T1 obj1) {
this.object1 = obj1;
}
public void setObject2(T2 obj2) {
this.object2 = obj2;
}
}
Generics are a generic programming feature that was added to the Java programming language in version J2SE 5.0 in 2004.
They were created to supplement Java's type system by allowing "a type or method to operate on objects of various types while providing compile-time type safety."
Learn more about Generic Class:
https://brainly.com/question/12995818
#SPJ1
Select the correct answer from each drop-down menu.
NEED HELP ASAP
How do scientists represent subjects and predicates in first-order logic?
Scientists use ______to represent subjects and ____ to represent predicates in first-order logic.
Answer:What are the options?
Explanation: Its most likely research and formulas if its on edge
The types of ____ systems used with personal and business computers today include smart cards.
Answer:
Storage.
Explanation:
I ran into this question before
Answer:
Storage
Explanation:
I've seen this question in a quiz before.
Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.
#include <iostream>
#include <vector>
#include <numeric>
int main() {
std::vector<int> store(3);
for(int i=0;i<3;i++){
std::cout << i+1 << ". test result: ";
std::cin>>store[i];
}
for(int i=0;i<3;i++) {
std::cout << i+1 << ". test score: " << store[i] << std::endl;
}
std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;
return 0;
}
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database
The reason why, in the final stage of the model for e-commerce, to captured in the supplier's database is because it hasten customer service after an order had been delivery.
What is e-commerce?The word electronic commerce is often known as e-commerce. It is a term that connote a type of business model that gives room for firms and people to buy and sell goods and services using the Internet.
Note that the reason why during the final stage of the multistage model for e-commerce, a comprehensive customer information captured in the supplier's database is important because it boast or make faster customer service when an order have been delivery.
Learn more about e-commerce from
https://brainly.com/question/23369154
With the knowledge of computer studies or ICT mention two methods of keeping material
Answer:
ICT teaching tools include simulation, modelling, CD-ROMs, teacher web publishing, word processing, spreadsheets, data logging, databases, e-mail, smart boards, interactive whiteboards and Internet browsing.
Explanation:
Computerized machines have taken the place of most __________.
A.
teachers
B.
IT specialists
C.
order clerks
D.
graphic designers
Answer:
B??
Explanation:
I feel like B. is the correct answer.
If i'm wrong plz let me know :>
Answer:
B
Explanation:
Why do computers use binary code?
Answer:
To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand
Answer:
It has two clearly distinct states that provide a safety range for reliability and the least amount of necessary circuitry, which results in the least amount of space, energy consumption, and cost.
Adrcle has a diameter of 4 inches. Which statement about the area and circumference of the circle is true?
A comparison of the area and circumference of the circle is not possible because there is not enough information
to find both
The numerical values of the circumference and area are equal
The numerical value of the circumference is greater than the numeste value of the area
The numerical value of the circumference is less than the numerical value of the area
Answer:
The numerical values of the circumference and area are equal
Explanation:
Area of a circle = πr²
Circumference of a circle = 2πr
Radius, r = diameter/2
= 4 inches/2
= 2 inches
r = 2 inches
π = 3.14
Area of a circle = πr²
= 3.14 * 2²
= 3.14 * 4
= 12.56 inches ²
Circumference of a circle = 2πr
= 2 * 3.14 * 2 inches
= 12.56 inches
Area of a circle = 12.56 square inches
Circumference of a circle = 12.56 inches
The numerical values of the circumference and area are equal
Question 2 (Show your steps, not only the final results.) According to the PMF table in Question 1, a bag is considered underqualified if it weights less than 47(<47). Randomly select three packages. What is the probability that at least one is underqualified ( 2 points)?
To calculate the probability of at least one underqualified package out of three randomly selected packages, we need to consider the complement rule. This rule states that the probability of an event occurring is equal to 1 minus the probability of the event not occurring. We will calculate the probability of none of the packages being underqualified and then subtract it from 1 to obtain the desired probability.
To calculate the probability of none of the packages being underqualified, we need to find the probability that each package weighs 47 or more. According to the PMF table in Question 1, the probability of a package weighing 47 or more is 0.67. Since the selection of each package is independent, we can multiply these probabilities together to obtain the probability of none of the packages being underqualified:
P(None underqualified) = 0.67 * 0.67 * 0.67 = 0.300763.
Next, we calculate the probability of at least one package being underqualified by subtracting the probability of none of the packages being underqualified from 1:
P(At least one underqualified) = 1 - P(None underqualified) = 1 - 0.300763 = 0.699237.
Therefore, the probability that at least one package out of three randomly selected packages is underqualified is approximately 0.699 or 69.9%.
Learn more about probability here: https://brainly.com/question/31355126
#SPJ11
main uses of personal computer
Explanation:
ph (vids)Internet browsing: from the desktop to smartphone these devices are optimized for online operation. They can be used for simple internet browsing to intense research depending on user needs.Gaming: PCs are also used for gaming. The games can either be online or offline games.
the safari browser comes preinstalled on apple computers and devices. true or false?
Yes, that is true. Safari browser comes preinstalled on Apple computers and devices.
when you purchase an Apple device, it comes with a variety of built-in applications, including Safari browser. This means that you don't need to download or install the browser separately because it's already there. Safari is designed specifically for Apple's operating systems, such as macOS, iOS, iPadOS, and watchOS. It's known for its fast performance, clean interface, and excellent security features. Therefore, if you own an Apple device, you can start browsing the internet right away using Safari without any extra steps.
The Safari browser comes preinstalled on Apple computers and devices. As a default web browser, Safari is included in macOS and iOS operating systems for easy and seamless internet browsing for Apple users.
To know more about Safari browser visit:-
https://brainly.com/question/31319260
#SPJ11
What is the definition of a nested function?
O a cell that is used in two different functions
O arguments defined inside of two functions
O arguments defined inside of arguments inside of a function
O a function defined inside of another function
Answer:
d
Explanation:
Answer:
D. a function defined inside of another function
Explanation:
hope this helps :)
does applying creativity to your product or service important?
Explanation:
Applying creativity to your product or services will serve as your edge in attracting customers or consumers. When you are able to deliver a sevice or product that has a strong appeal brought about by creativity, you are able to hold the market's attention and make them want to try whatever you're selling or offering.
The processor can decide what to do next based on the results of earlier computations and (blank) from the outside world. What is the missing word?
Answer:
Input
Explanation:
Information the computer receives from the outside world is called input. Input can be a number of different things: the weather, which buttons are pressed, and so forth. It can come from any place the processor is able to receive information from, such as the user or a web search. The processor makes its decisions based on input.
Check the peripherals that are needed to hear music on your computer.
Answer:
speaker and sound card
edge 2021
Within a major students can choose to study a specific area within major. For example a journalism student may study military journalism or business journalism the specific area is called
Answer:
Specialization
Hope this helps!
Answer:
Specialization
Explanation:
an organization routinely communicates directly to a partner company via a domain name. the domain name now leads to a fraudulent site for all users. systems administrators find incorrect host records in dns. what do the administrators believe to be the root cause?
The administrators believe that an attacker masquerades as an authoritative name server is the root cause to find incorrect host records in dns.
Security was not a top priority when Domain name system (DNS) was created in the 1980s, when the Internet was considerably smaller. The resolver has no mechanism to confirm the veracity of the answer when a recursive resolver makes a query to an authoritative name server as a result.Only the appearance that a response came from the same IP address as the resolver's initial query may be verified by the resolver. However, as the originating IP address of a DNS response packet can be readily falsified or spoofed, depending only on it is not a reliable authentication method. A resolver cannot quickly identify a faked answer to one of its requests due to the way DNS was initially intended. By faking a response that seems to originate from the authoritative server that a resolver initially contacted, an attacker may simply pose as that server. In other words, a user may be unknowingly sent to a potentially harmful website by an attacker.Learn more about the Domain name system with the help of the given link:
https://brainly.com/question/17163861
#SPJ4
Fill in the blank with the correct response.
One way Go.ogle makes money is to charge a person for using certain
_______.
Answer:
Go.ogle Apps
Explanation:
Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1
Help now please
Answer:
2,3,4
Explanation:
Starts at two, goes to four. Thus it prints 2,3,4