A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers
The term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly is:
B. A peripheralAccording to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly
As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.
Therefore, the correct answer is option B
Read more here:
https://brainly.com/question/20488785
(50 POINTS) A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.
Answer:
B
Explanation:
the _____tool is used to move the selected text to the right of the page ( align text right. / Align text left)
Answer:
align text right
Explanation:
Which line of code converts 3 to 3.0?
int(3)
type(3)
float(3)
single(3)
Answer:
float
Explanation:
Which of the following are causes of a run-time error. Choose all that apply.
A user enters a numeric value when a text value was expected.
A user enters text and numeric values.
A user enters a text value when a numeric value was expected.
A user enters a negative number when a positive number was expected.
Answer:
A C D
Explanation:
just did it
Answer:
A. A user enters a numeric value when a text value was expected.
C. A user enters a text value when a numeric value was expected.
D. A user enters a negative number when a positive number was expected.
Explanation:
How is the OR (||) logical operator used?
PLS HURRY
Answer:
The answer is below
Explanation:
A logical operator is a symbol or word used to connect two or more expressions such that the value of the compound expression produced depends only on that of the original expressions and on the meaning of the operator. Common logical operators include AND, OR, and NOT.
Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc. You're in charge of writing the safety rules and regulations for the company. Provide at least four discrete rules you would implement
Answer: maybe not put cheats no secret or easter eggs or hard challenges im not sure
Explanation:
The four discrete rules one would implement can be
Provide no confidential company information to anyone who is not an employee of the company.Acknowledge sources obtained from other people's games or anything else with a copyright claim.Avoid abusing your power by cheating or abusing the games to benefit yourself or your associates.Maintain a positive workplace culture and show the utmost respect to everyone to increase productivity.What is a manager?A manager refers to a person who is responsible head of any project and helps in arranging the resources, checking the progress, and timely completion of it in order to achieve the vision and goal of the organization.
Preventing workplace diseases and injuries, as well as the suffering and financial burden they can bring on employees, their families, and employers are the fundamental objective of safety and health initiatives.
Learn more about managers, here:
brainly.com/question/29023210
#SPJ5
Stages of reverse engineering
Answer:
Capture Data, Refine the Model, and then Manufacture it.
Explanation:
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: managers, A teams, an individuals
Options for the second box are:internal, specific, external
Answer:
First, A teams, Second ,Specific
Explanation:
What form of infrastructure improved trade and communication among Roman cities?
aqueducts
canals
reservoirs
roads
Answer:
aqueducts
Explanation:
Answer:
c
Explanation:
Why does a compiled-language program need more memory than an equivalent interpreted-language program during program execution
OA to store source code
O B. to store object code
Ос. to store machine code
D. to debug the program
Answer:
The answer is B
Explanation:
what is computer assisted translation
Answer:
the use of software to assist a human translator in the translation process.
Explanation:
You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company, but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use
Answer:
Infrastructure as a Service (IaaS)
Explanation:
Infrastructure as a Service, are services based online that provide a client with required server infrastructures including networking services, storage services, virtual environment services, security, processing services based, and scaling by using high-level API's that redirects the low-level data of the underlying network on a leasing or rent arrangement, such that the operation and maintenance cost of the servers are taken care of by the service provider.
You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5
Answer:
Explanation:
The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.
import java.util.Scanner;
class Brainly
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int[] person = new int[5];
System.out.println("Enter age of individual 1: ");
person[0] = in.nextInt();
System.out.println("Enter age of individual 2: ");
person[1] = in.nextInt();
System.out.println("Enter age of individual 3: ");
person[2] = in.nextInt();
System.out.println("Enter age of individual 4: ");
person[3] = in.nextInt();
System.out.println("Enter age of individual 5: ");
person[4] = in.nextInt();
int youngest = person[0];
for (int x = 0; x < person.length; x++) {
if (person[x] < youngest) {
youngest = person[x];
}
}
double discount = 1 - (((double)youngest) / 100);
double output = 50 * discount;
System.out.println("Total Price: " + output + " the youngest is " + youngest);
}
}
Who has gotten a random file link from someone? What file does it contain?
Answer:
those are bots , just report those
Explanation:
Lorann sends messages to Aiden that always go into Aiden’s Junk E-mail folder. Which process would best correct this problem so that Lorann’s messages no longer go into Aiden’s Junk E-mail folder?
A. adding Aiden to the Safe Senders list
B. adding Aiden to the Safe Recipients list
C. adding Lorann to the Safe Senders list
D. adding Lorann to the Safe Recipients list
Answer:
b
Explanation:
Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is she?
A. planning
B. design
C. development
D. testing
Answer:
The Answer Is B: Design
Explanation:
I took the test on edmentum and it was correct your welcome m8 :)
In today's e - commerce world, 'Disintermediation' may only affect intermediaries who are not performing value added services to customers. Do you agree with this statement? Explain why?
Answer:
No
Explanation:
Although 'Disintermediation' does affect these intermediaries I believe it also affects those that 'are' providing valuable services. This is because many other factors come into play when deciding to reduce intermediaries. Sometimes when a company has various intermediaries, a single one can provide the same value as two, therefore, for the company, it is more valuable to reduce the number of intermediaries that they have and provide more resources to fewer intermediaries so that they perform better for less pay. This is one of a few reasons why it can affect any intermediary, not just the ones that do not provide value.
i really want to know the best way to deal as much heart as possible plz tell me
Answer:
Set aside time every day for doing something that feels positive, whether that’s journaling, meeting up with a close friend, or watching a show that makes you laugh. Scheduling in moments that bring you joy is vital for healing a broken heart. It’s important to talk about your feelings with others and not numb yourself out.
Explanation:
subscribe to twomad or you are cringe for the rest of your life kid
Answer:
What if I don't want to?..........
What is the check digit for the following original product number: 140501941 ? *
a)10
b)7
c)5
d)2
Explanation:
I think it is 7, but I could be wrong..... sorry
Examples of hardware that computes on a network can share are the operating system and the web browsers
Answer:
False.
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.
Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers
I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
I'm better then u in brawhlla
click on the _____button to move the selected text in the centre of the page (justify /centre)
Answer:
centre
Explanation:
Which of the following images illustrates safe driving?
Answer:
bottom left
Explanation:
Answer:
keep your eyes on the road!!!!
Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine
Answer: D. Scan the images with 600 DPI
Explanation:
Answer: D. Scan the images with 600 DPI
Explanation: Correct for Plato/Edmentum
The cell is intersection of column and row. true or false
Answer:
True
Explanation:
where a row and column meet. Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3). Each cell has its own name—or cell address—based on its column and row
~Hope this helps
Answer:
True
Explanation:
what's wrong with this python code i don't know what's wrong with both of them
Answer:
Keep it in the format
first one:
def swapping_stars():
line_str = ""
for line in range(6, 8):
for char in range(0, 6):
if line % 2 == char % 2:
line_str = line_str + "*"
else:
line_str = line_str + "-"
print(str(line_str))
swapping_stars()
second one:
if you want it to go:
23456
def print_numbers(list):
for i in range(1, len(list)):
print(str(list[i]))
num_list = [1, 2, 3, 4, 5, 6]
print_numbers(num_list)
if you want it to go
123456
def print_numbers(list):
doneONE = False
for i in range(1, len(list)):
if not doneONE:
print(str(list[i] - 1))
doneONE = True
print(str(list[i]))
num_list = [1, 2, 3, 4, 5, 6]
print_numbers(num_list)
Explanation:
A(n) ________ HTML tag is used to mark information about the page.
Metadata
Mead
img
Hyperlink
An Metadata HTML tag is used to mark information about the page.
What are HTML element?An HTML element are known to be a kind of HTML document parts, one of plenty types of HTML nodes.
Note that an HTML document is made up of a tree of some specific HTML nodes, example is text nodes, and HTML elements, that are said to add semantics and formatting to some areas of document. And so, Metadata HTML tag is used to mark information about the page.
Learn more about HTML tag from
https://brainly.com/question/9069928
Answer: metadata
Explanation: got it right on edgen
Need help:(!!!! I’ll mark brainliest if correct
Select the correct answer.
Which software development team member would make the most use of the tool, Load Runner?
A.
software engineer
OB.
programmer
OC.
business analyst
OD
tester
Answer:
software engineer is the answer
Explanation:
g
How do we know if we can believe the things on the internet?
Answer:
you have to check for reliability
Explanation:
Answer:
you can't always believe the internet some stuff is false are bended
Explanation:
yea