Answer:
Read the explanation for the answer :D
Explanation:
Temperature - Theremometer
Atmospheric pressure - Barometer
Wind direction - Wind wane
Wind speed - Anemometer
Humidity - Hydrometer
Hope this helped! :D Please mark me brainliest!
WILL CHOOSE BRAINLIEST! in cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multiply the number of shares in column B by the price of the shares in column C.
Answer:
Alice Grant has been saving and investing part of her salary for several years. She decides to keep track of her investments on a worksheet. The file Application 9-7 contains the investments of Alice Grant. She owns several types of investments:
Explanation:
Describe the installation process for printers and scanners identify possible malfunctions relating to this installation process
Answer:
Plug it is in the right slots add as brainlyest please
Explanation:
PYTHON 3
PART 1
Given the following list of the first 20 elements on the periodic table of elements:
elements20 = ['Hydrogen', 'Helium', 'Lithium', 'Beryllium', 'Boron', 'Carbon', 'Nitrogen', 'Oxygen', 'Fluorine', 'Neon', 'Sodium', 'Magnesium', 'Aluminum', 'Silicon', 'Phosphorus', 'Sulfur', 'Chlorine', 'Argon', 'Potassium', 'Calcium']
Print the list
Go through (traverse) the list item by item and do the following:
Print the atomic number - element name for any element that starts with an 'H' or an 'N'. For example 1 - Hydrogen would be printed for the first element.
(Hint: How does the index number compare to the atomic number?)
Print the list in alphabetical order (ascending)
Print the list in reverse alphabetical order (descending)
Go through (traverse) the list item by item and do the following: (HINT: Be careful of the order you go!)
Remove any elements that start with the letter 'C'
Print the resulting list with the 3 'C' elements removed.
PART 2
For this little program you will create a list of numbers and then perform some actions on it.
Ask the user to enter 2 digit positive numbers repeatedly until they enter a -1. Make sure that they only enter positive 2-digit numbers.
Display the list of numbers, count, total, maximum, minimum and average of the numbers after the user enters -1.
Display the sorted list of numbers.
Define and call a function that will display the median of the list of numbers. It will take the list as a parameter and return the median value. (You will need to consider if the number of numbers is odd or even.)
The output should look something like this:
Answer:
c
Explanation:
agree i go with c btw i took test
Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?
A.
Creative Commons
B.
word processing program
C.
Weebly
D.
web-based publishing software
The BEST type of program for Anthony to use to create the items he needs for his business are word processing program.
What is the word processing program?Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.
To learn more about word processing program.
https://brainly.com/question/14718387
#SPJ1
is this a scam pls tell me????????????/
Yes don't trust at all, I've got that so many times
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
A way to store a sequence of letters, numbers or symbols.
This is the most accurate statement, though not entirely true.
Hope this helps.
can someone help me im using python IDLE and im getting this message in the output what does this mean "Error: unindent does not match any outer indentation level"
Answer:
Indent the first line
Explanation:
In many types of coding, the process does not work until you indent the first line. If it is a few rows in programs such as loops many more indentations maybe needed.
Answer:
Indent the first line
Explanation:
In many types of coding, the process does not work until you indent the first line. If it is a few rows in programs such as loops many more indentations maybe needed.
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
Why does my brainliest keep going down when I didn't use any? I had 7 but now I have 4.
Answer:
Explanation:
because ur posting this quastion and the more u post the more ur points go down
Answer:
The questions that you got brainliest on might have been deleted.
Explanation:
Which changes the natural world?
technology
science
prototypes
feedback
(I made this up teehee) what anime is katski bakugo from
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
Objective(s): In your own words, what was the purpose of this lab? Hypothesis: In this section, please include the if/then statements you developed during your lab activity. These statements reflect your predicted outcomes for the experiment. If predators are increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. If pollution is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. If the amount of food available is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years. Procedure: The procedures are listed in your virtual lab. You do not need to repeat them here. Please be sure to identify the test variable (independent variable), outcome variable (dependent variable), and control group for this experiment. Reminder: The test variable is the item that is changing in this investigation. The outcome variable is the item that you are measuring in this investigation. The control group is the group in the experiment where the factors being tested are not applied. It allows scientists to set a baseline to compare the experimental groups that do have factors applied to them. Test variable (independent variable): Outcome variable (dependent variable): Control group: Data: Record your data from each trial in the data chart below: Type of Factor Beginning Frog Count Simulation 1 (Low) Simulation 2 (High) Predators (alligators) Pollution Food (mosquitoes) Graphs Use the graphs you printed from the data chart in the virtual lab and analyze the data. Make a note of any trends that you discover. Predators (alligators): Pollution: Food (mosquitoes): Conclusion: Your conclusion will include a summary and an interpretation of the lab results. Please write in complete sentences. Which limiting factor(s) in this lab simulation are biotic? Which limiting factor(s) in this lab simulation are abiotic? Which limiting factor
Answer:
the amount of food available is increased, then the cricket frog population will (increase/decrease/stay the same) over the span of five years
Explanation:
because it makes sense
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
what are some steps Hector could have taken to ensure that his photographs were not ruined near the end of the shoot?
Answer:
make several extra copies of the pictures and frame them right away if they're printed out.
Explanation:
Answer:
make several extra copies of the pictures and frame them right away if they're printed out.
Explanation:
3. What elements related to the release and success of the NES console do you see in modern console releases? What elements are no longer relevant to modern console gaming?
Answer:
the main thing that made the NES console amazing was the detication. For example Mario has 20+ games with his name in the title. This shows how focused a company was on their main character.
Explanation:
The pre-built JavaScript function that provides the date and time is called:
A.
Now.
B.
Date.
C.
Time.
D.
DateTime.
Answer: The answer is B.
Explanation: Acording to the JS documentation that's the class where you can get that information as well as invoke other methods such as `now()` and `getTime()` on.
reasons phone doesnt charge
Here are 5 reasons possibly why:
1.) Faulty lightning or micro USB port
2.) The lightning or USB port could be dirty
3.) Damaged charging port or cable
4.) Water Damage
5.) Software problems
The "c" key and the "e" key are struck by
1. left middle finger
2. left index finger
3. right index finger
4. right middle finger
Do you guys know the once social media app Six Degrees? If so, was it only in the US?
Answer:
Six Degrees, (created by Andrew Weinrein) wasn't used outside of the United States. It was shut down in July 2009 because it was unsuccessful.
What does a loop statement do?
It causes a section of code to be repeated a certain number of times.
It causes a section of code to be executed one time only.
It causes a section of code to end.
It causes a section of code to be repeated infinitely.
Answer:
It causes a section of code to be repeated infinitely
Answer:
It causes a section of code to be repeated a certain number of times.
Explanation:
Can anybody give me any suggestions to what my pfp should be
Answer:
— Your profile picture can be one of the most important elements of ... but your photo should give candidates a clear idea of what you'd ... They might also help to direct you a bit, like telling you to tilt your head slightly or tuck your ...
Explanation:
Answer: here are my suggestions
1.wolves
2.cars
3.anime
4.water
5.fire
Who plays Poliblicy?
Answer:
it a game that i don't play
Explanation:
btw i just search it up
In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
In 1 to 2 sentences, describe how to create a list with bullets
Answer:
To create a bulleted list:
Select the text you want to format as a list.
On the Home tab, click the drop-down arrow next to the Bullets command. A menu of bullet styles will appear.
Move the mouse over the various bullet styles. ...
The text will be formatted as a bulleted list.
Explanation:
~Hope this helps
Answer:
the person above is correct i got 100% give him brainly Est
Explanation:
What will be the value of number after this code is finished executing?
for i in range(100):
number = 0
A.
100
B.
0
C.
1
D.
i
The value of number given after this code is finished executing for i in range(100) will be B. 0.
What is coding?Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.
Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.
In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.
Learn more about code on:
https://brainly.com/question/26134656
#SPJ1
The value of number given after this code is finished executing for i in range(100) will be B. 0.
What is coding?
Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.
Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.
In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
ANSWER ASAP GIVING BRAINLIEST!
A mathematical calculation based upon the data in a spreadsheet is called a
A: Factor
B: Formula
C: Function
D: Factor
E; Equation
Answer:
B: Formula
Explanation:
Formula. An equation that performs mathematical calculations on values in a worksheet. Number values. Constant values consisting of only numbers. Cell address.
A mathematical calculation based upon the data in a spreadsheet is called a B: Formula.
What is the formula?In Microsoft Excel, a component is an expression that operates on values in quite a number of cells. These formulations go back a result, even if it's miles an error. Excel formulation allows you to carry out calculations along with addition, subtraction, multiplication, and division.
A spreadsheet is a software program software you operate to without problems carry out mathematical calculations on statistical facts and totaling lengthy columns of numbers or figure out probabilities and averages.
Read more about the formula:
https://brainly.com/question/657646
#SPJ2