Do you think should give credit to people who invented viral dances?

Answers

Answer 1

Answer:

michal jackson i think who credit to people invented viral dances.

Answer 2

Answer:

Yes

Explanation:

Well, they added some taste to life.


Related Questions

For questions 1-3, consider the following code: x = int (input ("Enter a number: ")) if (x != 8): print ("A") if (x >= 10): print ("B") if (x < 10): print ("C") if (x % 2 == 1): print ("D") What is output if the user types in 13?

Answers

Answer:

ABD

Explanation:

13 not equal 8, greater than 10 and odd. Ifs will be executed step-by-step

A process that takes plaintext of any length and transforms it into a short code is called Group of answer choices encryption hashing symmetric encryption asymmetric encryption

Answers

Answer:

hashing

Explanation:

A hash can be used in compression which reduces the length of a plaintext sequence

Consider the following code segment, which is intended to store the sum of all multiples of 10 between 10 and 100, inclusive (10 20 ... 100), in the variable total.
int x = 100;int total = 0;while( /* missing code */ ){total = total + x;x = x - 10;}Which of the following can be used as a replacement for /* missing code */ so that the code segment works as intended?A. x < 100.B. x <= 100.C. x > 10.D. x >= 10.E. x != 10.

Answers

The code segment illustrates the use of while loops

Loops are program statements that are used for repetitive and iterative operations

The missing statement in the code is x>= 0

The code is meant to add numbers from 10 to 100 (inclusive) with an increment of 10.

At the beginning of the program, variable x is initialized to 100, and it is reduced by 10 in the iteration until it gets to 10

So, the condition must be set to stop when the value of x is 10 i.e. x >= 0

i.e. the iteration must be repeated while x is greater than or equal to 10

Hence, the missing statement is (d) x >= 0

Read more about loops at:  

brainly.com/question/16397886

what is a common indicator of a phishing attempt cyber awareness 2022

Answers

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

https://brainly.com/question/24069038

In the context of object-oriented programming a(n) is a template for a group of objects with similar characteristics.

Answers

A class is a template for a group of objects with similar characteristics.

An object-oriented programming uses objects, instead of functions and logic to model software designs.

In an object-oriented programming, there are:

ObjectsClassesMethodsEtc

Objects are what make up the object-oriented programming.

Similar objects are grouped together into classes

Hence, the text that completes the blank is class

Read more about object-oriented programming at:

https://brainly.com/question/22530356

1. What is the value of the digit 2 in the number below?

1,243 (a) 2) (b) 200) (c) 2000) (d) 20

Answers

Answer:

200

Explanation:

Let's split the number 1,243 into its values.

1,000 + 200 + 40 + 3.

To check your answer, add all the numbers together.

_2_ _.

Notice that there are "2" spaces after the 2.

This is why there are 2 zeros in 200.

Therefore, 200 is the answer.

-kiniwih426

Which animation category provides custom animations for objects on the slide?

*it's d. motion paths

Answers

Answer:

d. Motion Paths

Explanation: is correct. post protected

Two computer programs that are carefully joined together so that they appear to be a single program with a single user interface

Answers

In Computers and technology, a seamless interface is a technology in which two (2) computer programs are joined together carefully, in order to make them appear as a single software program that has a single interface for end users.

A seamless interface can be defined as a technology in mobile cloud computing (MCC) through which two (2) computer programs are carefully meshed or joined together, so as to make them appear as a single computer program with a single interface for end users.

This ultimately implies that, a seamless interface is used in providing end users a uniform interface for two or more different computer programs.

Consequently, two or more users are able to use and enjoy a two or more different computer programs through the design and development of a seamless interface without any form of obtrusiveness.

In conclusion, a seamless interface carefully joins two (2) computer programs together, so that appear as a single software program that has a single interface for end users.

Read more: https://brainly.com/question/20379777

How can middleware be used in angular.

Answers

Answer:

when a rquest comes in to the application

Do you guys know a unblocked music player because lite tube is blocked?

Answers

A music player is a software or application which is used to playback music so that a user can play, pause, rewind, fast forward or save his favorite playlist and may even contain lyrics to the song.

With this in mind, there are different music players which are used by many users around the world which includes:

D33zerPand0raYT MusicAppl3 music, etc.

These music players contains various functionalities so each user has a unique experience and can easily make his choice on the type of music player he wants to use.

Please note that your question is considered SPAM so I gave you a general overview so that you would get a better understanding of the concept.

Read more about music players here:

https://brainly.com/question/2456743

________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup

Answers

Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.

Definition of Structured Programming Technique.

This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.

Configurations of Structured Programming Technique.

Structured Programming Techniques generally takes three structures body which include the following:

IF THEN ELSE DO WHILESequence

Hence, in this case, it is concluded that the correct answer is option B. "Structured."

Learn more about programming techniques here: https://brainly.com/question/17180300

​A(n) ________ is an excellent tool for representing a​ system's component processes and the flow of data among them.

Answers

A(n) DFD is an excellent tool for representing a system's component processes and the flow of data among them.

with which type of satellite is there a propagation delay?

Answers

Geostationary satellites have a high propagation delay.

John works as an associate at a construction company. His job is to draft contracts for suppliers. Before he prints the contract, he sends it to his manager so that he can suggest any required changes. Which feature should John’s manager use to make the suggestions?
A.
Spell Check
B.
Track Changes
C.
Comments
D.
Edit

Answers

Answer: D

Hope that helped :)

Identify the link element that accesses a style sheet file named output. Css only when the device is a printer or a projection device.

Answers

There are different types of link element. The link element that accesses a style sheet file named output is:

<link href="output.css" media="print, projection" />

Style sheets often shows a key growth for Web page designers, widening their ability to boast the appearance of their pages.

In the web environments, people are very concerned with the content of their documents than the way it was presented.

There are techniques that often work for some of the people but not for all of the people and there is need therefore to make new techniques.

Learn more about link element from

https://brainly.com/question/25608430

TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.

Answers

Answer:

True

Explanation:

"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."

The ____ design is the process of selecting the data storage and data access characteristics of the database.

Answers

Answer:

The Physical database design is the process of selecting the data storage and data access characteristics of the database.

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q?
a. (NOT P) AND (NOT Q).
b. (NOT P) AND Q.c. NOT (P AND Q).d. NOT (P OR Q).

Answers

A NAND gate combines the NOT gate and the AND gate.

For inputs P and Q, the boolean expression for the NAND gate is c. NOT (P AND Q)

The NAND gate means:

NOT AND

Assume the inputs are x and y, then the formula would be:

NOT (x AND y)

In this case, the input variables are P and Q.

So, we replace x and y with P and Q, respectively.

The formula becomes NOT (P AND Q)

Hence, the correct expression is (c)

Read more about NAND gates at:

https://brainly.com/question/11178154

independence day in school long passage plss​

Answers

Answer:

Independence Day Celebration in My School

Fifteen August, is a red letter day in the history of India. On this day in 1947, our country become free form the long imprisonment of the British rule. Since 1947, fifteenth August is celebrated every year with great joy and pride. It reminds us for the great struggle of our freedom from the British rule. The great sacrifice for our freedom fighters is remembered, which serves as a beacon light for the development of this great country. The main function is held at Red Fort in Delhi where the Prime Minister unfurls the National flag. It is an occasion of celebration for every Indian and the whole nation celebrate a holiday from all work and take a pledge to work whole heatedly for the development of this country and preservation of Independence. All those who have stood out exclusively in their respective field of work are honored in public meetings. The whole nation pays homage to the security forces who have laid down their lives for the honor and security of the country.

We also celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform. Markings were made on the ground with white lines. The flower pots were kept all along the path.

There was great enthusiasm among students. The school band of students took its position half an hour before the actual function was to began. The members of the band were wearing a beautiful uniform. They began to play sweet tunes. The students had taken their places well before the time. They were all in school uniform, the white paint and white shirt.

The function began exactly at 8 a.m. all who were present stood in attention. The principal unfurled the flag. The petals of rose fell on us. Five boys sang a song in honor of the national flag. It was “Vijayee Vishwa Trianga Payara”. Them by the school band. The principal look the salute. He made an impressive speech and invited the Education Minster to impressive speech and invited the Education Minster to address us. In his address he asked us to take pledge to safeguard the freedom of nation. He also reminded us of great sons of India, Mahatma Gandhi, Pt. Nehru, Subhash Chandra Bose, Lala Lajpat Roy and Chander Shekar Azad and their sacrifices to the nation. After that different groups of students presented a programme of mass drill and pyramid formation. Ever one liked the programme.

In the end, all stood in attention. All the students, teachers and guardians sang the National Anthem in chorus. With this the function was over. Today the memories of this function are as alive to me, as it was on that day.

Write a function ComputeVal that takes two integer parameters and returns the product of the two parameters plus 9. Ex: ComputeVal(4, 6) returns 33.

Answers

Answer:

#include <iostream>

using namespace std;

/* Your code goes here */

int main() {

  int input1, input2;

  int result;

 

  cin >> input1;

  cin >> input2;

 

  result = ComputeNum(input1, input2);

 

  cout << result << endl;

  return 0;

Explanation:

How to translate a word file with goole translator.

Answers

Answer:

Use the translation websiteClick "Browse your computer". A file selection dialog will pop up. Select the file. Select the translation languagePress 'translate'!

Note: The document translation option will only show on medium and large screens

Question 10 of 10
Your company emphasizes the important of conserving (not wasting)
resources. How can you support that value when you print an 8-page report
you were asked to bring to your department's monthly meeting?
O A. Use the Print option for two-sided printing.
OB. Use the Print option to create extra copies.
C. Post the report online before printing it.
O D. Use the Save option to choose a format readers can open.

Answers

D, because it will save paper and not go to waste

Distributions of links in most networks follow a(n) __________ rule. radio_button_unchecked 60/40 radio_button_unchecked 90/10 radio_button_unchecked 50/50 radio_button_unchecked 80/20 SUBMIT

Answers

In most computer networks, the distribution of links follow an: 80/20 rule.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

An 80/20 rule is also referred to as the Pareto Principle and it can be defined as a concept in cybersecurity, which states that there exist an unequal relationship between outputs and inputs, in the ratio of 80 percent to 20 percent respectively.

In most computer networks, the distribution of links follow an 80/20 rule by rationalizing the amount of traffic that must enter into a network (20 percent) with respect to the amount of traffic that must exit the network (80 percent).

Read more: https://brainly.com/question/22365112

Type the correct answer in the box. Spell all words correctly. Define the term loop rule. The loop rule tells us that if we sum the across all the components in a single closed path of an electrical network, the result is 0.

Answers

Answer:

91

Explanation:

How to emit from jquery in angular 8.

Answers

Answer:

idek what you just said

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

I need help with this question.

Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____

Answers

The answer is persona

Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attached. Which setting must molly change?.

Answers

A computer is made up of different network. The setting that molly must change is network type.

A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.

A computer network can be classified based on their sizes. A computer network is of four types. They are:

LAN(Local Area Network)

PAN(Personal Area Network)

MAN(Metropolitan Area Network)

WAN(Wide Area Network)

Learn more from

https://brainly.com/question/14200752

text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?

Answers

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

What genre of games involves gameplay that is designed to simulate real-world or fictionalized activites such as flying a plane or managing a city and often requires resource management?

Simulation games
Puzzle games
Adventure games
Strategy games

Answers

Answer:

simulation games

Explanation:

Simulation games are a broad category of games where gameplay is designed to simulate real-world or fictionalized activities and often require resource management skills.

Answer:

Simulation games

Explanation:

Other Questions
The Puritans in England disliked the lack of rituals in the Church of England.TrueFalse One year, professional sports players salaries averaged $1.6 million with a standard deviation of $0.9 million. Suppose a sample of 400 major league players was taken. Find the approximate probability that the average salary of the 400 players exceeded $1.1 million. EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions. Three problems of large cities which pair of elements would most likely form a covalent bond Complete the missing factors6a^2 + 11b - 35b^2 = ( 3a _______)(2a______)please help me, thank you. What is the relative minor of C major? What are differences between the structures ofDNA and RNA? Erin finds 5% sales tax for a shirt that costs $21. She calculates the tax as0.05 * 21 = 1.05 or $1.05.Erin notices that she can add 21 + 1.05 = 22.05 to find the total cost, $22.05.She uses the Distributive Property to write (1 * 21) + (0.05 * 21) = 1.05 * 21.For each item, write the total cost ofthe item as the product of twonumbers.Tax1.05 x 21a.b.c.d.Item Name Price Tax Rateshirt$21.00 5%bicycle $45.90 7%shoes$67.50 6%laptop $299.99 8%$39.95 4%Credit Debit SubtotalCheck CashTaxOrder totalPrint Receipt Cashvideo game$474.34 Two architects bid for a small government project, bothcharging a flat fee added to an hourly rate. AmazingDesigns bids $250 plus $45 per hour, while Super Structuresbids $100 plus $60 per hour. At what point in time will thetwo companies charge exactly the same amount? What is the legal definition of postnuptial agreement. Which of the following is a perfect square trinomial? A. x-6x+9B. 4x-20x-25C. 4x+20xy+9y2D. 9a-6abc+abc A cry went up from the pack running after him when he fell. There was tension and hysteria in that concerted cry. And other things too, but he scarcely thought about it at all. Three women fell out of the race and clutched their sides and laughed; one of them fell on the sidewalk laughing like that, her belly puffing up huge with laughter, and subsiding again, letting it go.5 He scrambled up to his feet, their cries in his ears, spurring him on; he must run, run until he dropped, going God knows where. He scrambled to his feet, his fingers clawing the asphalt, stumbled on, sounds filling his ears... shriek of a locomotive whistle...coming up, rising to a pitch, and going away...he turned the corner into the street that was at right angles to the one he had come down from the Slaughter House gates...he was running blind before, reacting to the compulsion of his fear...but now he saw his objective and it lent his effort purpose...a long line of freight cars was coming down from the railway yard along the lines that ran across the street, going towards No. 1 Pier. The gates were lowered across the street stopping traffic; all he had to do was to get across the lines before that string of freight cars. They would cut off his pursuit for the time it would take that long train to cross the street. Trains always slowed down going into the dockyard; sometimes stopped, straddling the street. All he had to do was to get across. The man operating the gate yelled at him. He paid no heed. He had balanced it in his mind to a nicety, figured he'd just have time to get across. He went under the gate. Voices shouted in his ears...the scream of the locomotive whistle rising to a crescendo...he paid no heed. The train was hurtling towards him, but he had time, he could make it.Hi, Syll-Sheena. When you submit this form, the owner will see your name and email address.Required1.The word "pack" in line 1 of the passage best suggests that:(1 Point)the man was being chasedhis pursuers were like houndsthere were others racing with himhe was leading his competitors2.The vivid description of the women in lines 2 to 3 is significant primarily because(1 Point)it lends relief to the tension of the sceneit makes the writing more picturesqueit appeals to the reader's sense of humourit shows the absurdity of the incident3.The phrase "concerted cry" (lines 1 to 2) most nearly means(1 Point)a rythmic soundall shouting at the same timean outburst at a stage performancea cry of defeat4.The expression "God knows where" (lines 5 to 6) best indicates(1 Point)that the man had nowhere to gothere was confusion in the runner's mindthat he was fleeing from the lawthat he needed God's guidance5.The repetition of the word "run" in line 5 of the passage best suggests(1 Point)the earnestness of the runneran exaggerated picturethe urgency of the runningthe futility of the running6.The words "scrambled" and "stumbled" (paragraph 2) show best that the victim was (1 Point)in a confused state of mindtired and worn outexperiencing difficulty in runningclutching at straws for safety7.By the frequent use of the triple dots in paragraphs 2 and 4 of the passage, the writer intends to achieve(1 Point)better communication with his audiencea detailed description of the scenegaps in rendering the experiencingthe mounting excitement and tension of the scene8.The paragraph in which the runner experiences the most tension is (1 Point)21349.The word shriek used in paragraph 3 appeals to which of the following senses:(1 Point)sighthearingsmelltouch10.What do you think is the runner's objective?(1 Point)Reaching the railway yardGoing to No 1 PierGetting into the trainCrossing the train line11.The expression "cut off his pursuit for the time" (line 13) means(1 Point)he would stop running for a whilethey would stop chasing him temporarilyhe would have time to escapethere would be no need to run12.The expression "balanced it in his mind to a nicety" (line 16) means most nearly(1 Point)considered it carefullycame to a favourable conclusionkept pondering in a optimistic waywas in a state of uncertainty13.The words "straddling" and "hurtling" in the passage convey most nearly(2 Points)an unhurried and leisurely paceaccelerated movementopposite speedsthe temper of the man running14.The style of writing in this extract can best be described as:(1 Point)descriptiveargumentativeexpositorynarrative On the weekends the Burns family, who have two sons and two daughters, do their assigned chores. The sons mow the lawn, operate the barbecue, and help their father with car maintenance, while the daughters help clean the house and fold the laundry. This distribution of chores reflects A farm lets you pick 3 pints of raspberries for $12.00. How many pints do you get per dollar? We've got fifteen kind of kale for sale today! What is the error? Mississippi RiverThis country imported masive numbers of enslaved Africans to work on large sugarplantations in Brazil. 1 2 3 4 01 6 7 8 00 9 A laptop has a listed price of $590.99 before tax. If the sales tax rate is 6.25%, find the total cost of the laptop with sales tax included Round your answer to the nearest cent, as necessary. help me with math!!!! Molly drew a map of her town. She graphed the point L(1.75, 3) for the library. The ice cream shop is located at L, a reflection of L across the x-axis. The fire station is located at L, a reflection of L across the y-axis. Identify the ordered pair that describes the location of the fire station. Express your answer using decimal notation. (__,__)