i can't find my grandson someone help

Answers

Answer 1

Answer:

i'm right here

Explanation:

grandma

Answer 2

Answer:

were did u lose him.

Explanation:


Related Questions

A short circuit can cause _______ because there is nothing in the circuit to limit the current and absorb the electrical energy. Heat builds up quickly in the wire and power supply.

Answers

Answer:

Fire

Explanation:

You'll get a giant spark. The electricity will flow freely causing over-heating or fire.

A .cache is made up of _____ , each of which stores a block along with a tag and possibly a valid/dirty bit

Answers

Answer:

Blocks

Explanation:

A .cache is made up of blocks, each of which stores a block along with a tag and possibly a valid/dirty bit.

Basically, each blocks that makes up the cache stores additional block and sometimes a bit.

Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D. malicious and software Answer: ________

Answers

Answer:

D. Malicious and software

g 'write a function that takes as input a list and outs a new list containing all elements from the input

Answers

Answer:

def mylist(*args):

   return args

new_list = mylist(2,3,4,5)

Explanation:

The simple python code above defines a function called mylist that receives multiple length of element as a list and returns the list a new list. The "*args" allows the function to receive any number of item and converts them to a list that is returned in the next statement.

The can also be achieved by simply assigning a squared bracket enclosed list to the variable or with the list() constructor.

You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP address. What form of NAT is being used?
A. Registered NAT.B. Static NAT.C. Dynamic NAT.D. Advanced NAT.

Answers

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address. Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

Answers

Answer:

application demand model

Explanation:

ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.

Answers

Answer:

Umm just go what your gut tells you to do

Explanation:

Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the size of offset, block, and tag

Answers

Answer:

Tag          Block             Offset

 7               6                   3

Explanation:

Using direct mapping hashing:

Memory address size = 16 bits

Number of cache blocks = 64

Size of each block = 8 bytes

Thus;

Offest field = size of each block = 2^{3} = 3 bits

Number of blocks = 64 = 2

Thus, the index field is = 2^{6} = 6 bits of block

Tag filed is of size = 16 - (3+6) = 7 bits of tag

____________are the video images provided for editor to cut to and from instead of making viewers watch talking heads
Blank 1:

Answers

Answer:

The Scripts

Explanation:

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Answers

Explanation:

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.

A strategy for concealing critical information as well as ensuring its secure communication everything in non-hidden storage is steganography.

Advantage:

Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.

Disadvantage:

This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.

Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.

Advantage:

One such approach is superior to steganography throughout the level of protection.

Disadvantage:

Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.

Thus the approach above is correct.

Learn more about steganography here:

https://brainly.com/question/15187715

While your hands are on home row, both of your thumbs are on _____.

Answers

Answer:

While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️

There are many different LAN technologies (Wifi, Ethernet, etc) that can be incompatible with each other in terms of how they exchange data. How is it possible then, that any source host can still send information to any destination host when connected in an internet? Explain the two important components of this process.

Answers

Answer:

Explanation:

The two most important parts of this process are simply sending and receiving the data. When a network sends data, the system breaks the data into smaller pieces called Packets. The system then checks if the network that the packets are being sent to exists, if so the packets are sent to that network. When the receiving network's router receives these packets it reconstructs all of the packets received into the final data in the format that the final LAN system can read and sends it to the appropriate device.

Write a method that reverses the sequence of elements in an array. For example, if you call the method with the array 1, 4, 9, 16, 9, 7, 4, 9, 11, then the array is changed to 11, 9, 4, 7, 9, 16, 9, 4, 1. Use one or more loops in your solution (do not use the Array Reverse method).

Answers

Answer:

The method written in Java is as follows:

   public static void ArrayReverse(int myarray[]){

       for(int index = myarray.length-1; index>=0;index--)

           System.out.print(myarray[index]+" ");

}

Explanation:

This line defines the method

   public static void ArrayReverse(int myarray[]){

This line iterates through the array from highest to least index

       for(int index = myarray.length-1; index>=0;index--)

This prints the array elements in reverse

           System.out.print(myarray[index]+" ");

}

To call the method from the main, use the following:

ArrayReverse(myarr);

However, myarr must be declared and populated as an integer array before the method is called

See attachment for illustration of the complete program (the main and the array reverse method)

Write a test program that prompts the user to enter a two dimensional array and displays the location of the smallest element in the array.

Answers

Answer:

def element_loc():

   is_end = 'n'

   dimen2 = []

   while is_end == 'n':

       par1 = input("Enter rows and columns: ").split(",")

       part = [int(i) for i in par1]

       dimen2. append(part)

       is_end = input("Do you want to add more rows? y/n: ")

   mini = list()

   for i in dimen2:

       mini. append(min(i))

   result = min(mini)

   row_index = mini. index(result)

   col_index = dimen2[row_index]. index(result)

   print("Row: ", row_index, "Col_index: ", col_index)

element_loc()

Explanation:

The python program solution above prompts users for the two-dimensional array and then the rows of the array are compared with the minimum value stored in another list or array. The row index and the column index are gotten from the mini and dimen2 arrays respectively and are displayed as the position of the minimum value in the two-dimensional array.

What single awk command can be used to display all the login names and their associated numerical user IDs

Answers

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

What is closed soruce nonproprietary hardware and software based on publicly known standards that allow third parties to create

Answers

Answer:

open system

Explanation:

An open system is a system that sets open-source standards and promotes the interoperability and portability standards between systems developing and running open-source programs.

An open-source application is a program in which its source code is readily available and free for public use and upgrade. Unlike closed-source, its users can add or update the features of the source code.

which two pieces of information must be provided when saving a file for the first time in wordpad​

Answers

The name and the saving location.

Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable.
Public class Employee
{
Private String empID;
Private boolean hourly;
) . .
_______
{
Hourly = isHourly;
}
}
A) public void setHourly(String isHourly)
B) public void getHourly()
C) public boolean getHourly()
D) public boolean setHourly(boolean isHourly)

Answers

Answer:

A)

Explanation:

In this code example the missing piece of code would be...

public void setHourly(String isHourly)

This piece of code is creating a function called setHourly which takes in one String variable as it's parameter. Based on the rest of the code, the function takes that parameter variable and places it into an instance variable called Hourly which can be used when the function is called.

A backup can be installed that costs​ $100. What is the minimum allowable reliability for the backup that would make installing it​ worthwhile? The minimum allowable reliabilit​ = nothing​%

Answers

Answer:

0.95

Explanation:

Reliability is a assurance that a machine would have an efficiency of one or close to one.

The minimum allowable reliability R;

(1 - R) x 2000 = 100

Make R the subject of the formula;

R = 1 - (100/ 2000)

R = 1 - 0.05

= 0.95

JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
CODE BELOW
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
}
public static void main (String [] args) {
char startingLetter;
startingLetter = 'z';
/* Your solution goes here */
}
}

Answers

Answer:

RecursiveCalls.backwardsAlphabet(startingLetter);

Explanation:

The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.

       RecursiveCalls.backwardsAlphabet(startingLetter);

how does a digital computer process data?

as a string of binary digits called bits
as number written in the decimal number system
as a sequence of instructions given by a programmer
as a software program generated by the computer

Answers

Answer:

as a string of binary digits called bits

pls help will give brainlest​

Answers

Answer:

C

Explanation:

Answer:using a louder voice

Source:trust me bro

To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

please help add header file
/**
* TODO add header file
*/
public static boolean comp(int[][] b, int z, Random rand) {
int x = findWinningMove(b, z);
if(x != -1) {
dropToken(x, b, z);
return true;
}
x = findWinningMove(b, (z + 1) % 2);
if(x != -1) {
dropToken(x, b, z);
return false;
}
do {
x = rand.nextInt(BOARD_WIDTH);
} while(b[BOARD_HEIGHT - 1][x] != -1);
dropToken(x, b, z);
return false;
}

Answers

Answer:

jhgfycgxbhyjuufdxxcgbhjkml;,,,,,,,,,,,,,dfxcg,m .u9cgfbv nmkojihuygfc bvnjmkouhytfgvhbjfjfhngouuhjfcjbhbgfbjghbhjigjkijfbjfjigfijgfg

Explanation:

Learning Target: Students will work on final project.
You have leamed about video game industry and acquired basic skills to make basic
video games in this class so far. It is time to update your resume and cover letter.
Re-visit your assignments from 9/28-9/29 in this class. You can find that at your
submission in google classroom for this class for the dates mentioned. Type your
resume and cover letter using google docs or MS word professionally. First do
research to find a job opening in a real company. Craft your resume and cover letter
as if you are applying for the job listed. List game projects, coding skills etc. that
could benefit you in finding his job.
1. Check-in/Exit Ticket
2. Resume and Cover Letter

Answers

Answer:

I don't get this question

FELLING GENEROUS GIVING AWAY POINTS:)


Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)

Answers

Answer:

thanksssssssss

A pre-design document you can use to create a new project quickly

Answers

Answer:

13) B - Landscape and Portrait

14) C - Template

Explanation:

The two print options are known as landscape and portrait and a template is a pre-designed document.

Networks and the interconnectivity of media have affected our society in that:
A. information is hard to get and has not been democratized.
B. countries have shifted away from a global economy.
C. ideas and information are shared quickly and easily.
O
D. the quantity of media now loses out to quality.

Answers

Ideas and information are shared quickly and easily

Answer:

C. Ideas and information are shared quickly and easily

Explanation:

Which feature is being used when connecting a device to the network using an electrical outlet?

Answers

Answer:

In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.

Suppose that you have the following declaration:
stack Type stack(50); double num; and the input is
25 64-3 6.25 36-4.5 86 14 -129
Write a C++ code that processes this input as follows: If the number is non-negative, it pushes the square root of the number onto the stack; otherwise it pushes the square of the number onto the stack. After processing these numbers write a C++ code that outputs the elements of the stack.

Answers

Answer:

Explanation:

The code is written in C++:

#include <iostream>

#include <stack>

#include <math.h>

#include <iomanip>

using namespace std;

/*

* Supporting method to print contents of a stack.

*/

void print(stack<double> &s)

{

if(s.empty())

{

cout << endl;

return;

}

double x= s.top();

s.pop();

print(s);

s.push(x);

cout << x << " ";

}

int main(){

// Declaration of the stack variable

stack<double> stack;

//rray with input values

double inputs[] = {25,64,-3,6.25,36,-4.5,86,14,-12,9};

/*

* For each element in the input, if it is positive push the square root into stack

* otherwise push the square into the stack

*/

for(int i=0;i<10;i++){

if(inputs[i]>=0){

stack.push(sqrt(inputs[i]));

}else{

stack.push(pow(inputs[i],2));

}

}

//Print thye content of the stack

print(stack);

}

OUTPUT:

5     8     9     2.5     6     20.25     9.27362     3.74166     144     3

-------------------------------------------------------------------------

Process exited after 0.01643 seconds with return value 0

Press any key to continue . . . -

Other Questions
lowest common multiple of 90 and 63 plz help i need it :) will mark brainliest :D The ratio of solid beads to clear beads in a vase is 820. Select all the correct statements that tell if the operations will give an equivalent ratio.A) Add 2 solid and 2 clear beads.B) Subtract 8 solid and 6 clear beads.C) Multiply the number of solid and clear beads by 2.D) Divide the number of solid and clear beads by 4.E) Multiply the number of solid and clear beads by 18. Sylvia bikes home along a straight road from her friend's house, a distance of 8 miles,The graph shows her journey I dont know the answer please help Which of these parents is following a safety guideline? . York always puts his kids in a car seat unless it is a short trip within the nelghborhood. OB Sondra has gone through her house and baby-proofed it. Heidi always makes sure that when her kids are in the tub that she can hear them even if she cannot see them. . OD. All of the above Which sentence should be added to the introductory paragraph at the point indicated to best provide background information about the topic? Which theory is supported by scientists gathering the additional evidence of seafloor spreading and magnetism?O Continental Drift TheoryO Mid-Atlantic Ridge TheoryO Pangea TheoryTheory of Plate Tectonics what happens when you quit vaping? like do you feel better or worse and how long will i have intense cravings bc im not exactly sure if ill be able to quit... What are the differences between the graphs of y = 2x and y = 2 one more, i promise lm`aoRead the following statement: Line segment CD is congruent to line segment XY.Which of the following is an equivalent statement?A) CD overbar is similar to XY overbar B) CD overbar is congruent to XY overbarC) CD overbar equals XY overbar D) CD overbar is an element of XY overbar what is the equation of the line in slope intercept form. All of the angles of Triangle ABC measure 60 o. AB = 3x 4, BC = 4x 12 and CA = 5x 20.Solve for x and find the length of AB. what is the role of the sentry in the play antigone ? in paragraphs 3, the word maxiumum means Find the area, in square units, of ABC Who invented the telegraph in 1844? Samuel Morse Thomas Edison Granville Woods Alexander Graham Bell Based on what you know about Greek and Latin roots, which of the following words refers to the heart?A. biotechnicsB. cardiologyC. cosmotologyD. asterisk The cost of one pound of bananas is greater than $0.41 and less than $0.50. Sarah pays $3.40 for x pounds of bananas. Which inequality represents the range of possible pounds purchased? 0.41 < 0.41 less than StartFraction 3.40 over x EndFraction less than 0.50. < 0.50 0.41 < 0.41 less than StartFraction x over 3.40 EndFraction less than 0.50. < 0.50 0.41 < 3.40x < 0.50 0.41 < 3.40 + x < 0.50 4200 with a 35%markdown