Answer:
A.) Seismograph
Explanation:
Scientists use seismographs to predict ground movement, which can cause earthquakes and volcanic eruptions
Hope this helps! Good luck!
Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.
For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.
How to write program in loop ?A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.
A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.
We can write the code in a simple way like this below :
n = int(input("How many numbers do you need to check? "))
divisible = 0
notdivisible = 0
for x in range(n):
num = int(input("Enter number: "))
if num % 3== 0:
divisible += 1
print(str(num)+" is divisible by 3")
else:
notdivisible += 1
print(str(num)+" is not divisible by 3")
print("You entered "+str(divisible )+" even number(s).")
print("You entered "+str(notdivisible )+" odd number(s).")
To learn more about Python refer :
https://brainly.com/question/26497128
#SPJ1
Answer:n = int(input("How many numbers do you need to check? "))
divisible = 0
notdivisible = 0
for x in range(n):
num = int(input("Enter number: "))
if num % 3== 0:
divisible += 1
print(str(num)+" is divisible by 3.")
else:
notdivisible += 1
print(str(num)+" is not divisible by 3.")
print("You entered "+str(divisible )+" number(s) that are divisible by 3.")
print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")
Explanation:
For that one that's I'm on python <3
Elena wrote the following code in scratch to have the sprite move and then turn around. however, the code does not work as expected. what should be done to fix the error?
change "move 20 steps" to "move 10 steps"
change "turn left 180 degrees" to "turn left 90 degrees"
change "turn left 90 degrees" to "turn right 180 degrees"
change "turn right 90 degrees" to "turn left 90 degrees"
The thing that Elena need or should do to fix the error is option Change "turn right 90 degrees" to "turn left 90 degrees".
How is the error going to be fixed?Based on the question, we have the the highlights which are:
The sprite is need to move forward and also turns aroundThe first line of the code segment moves the sprite 20 steps forward;This step is correct, and it does not need to be changed.Based on the sprite turn, it is one that need to rotate 360 degrees in a direction.
Based on the code segment, we have the below rotations:
180 degrees left90 degrees left90 degrees rightWhen the angles of rotation are added, we have:
180 + 90 - 90 = 90.
Therefore, The thing that Elena need or should do to fix the error is option Change "turn right 90 degrees" to "turn left 90 degrees".
Learn more about error from
https://brainly.com/question/26561906
#SPJ1
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?
Answer:
There must be a proxy server that is not allowing access to websites
Explanation:
A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.
How is your day going?Technology affects the learning experience of students by helping them
get into the top colleges.
participate in sports.
communicate with friends.
prepare for a future career.
Answer:
is this technology or
Explanation:
computer
Answer:
communicate with friends.
Explanation:
bc i took it
A(n) ________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. Group of answer choices sustainable information virtualized agile
Information MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.
It includes the hardware, software, and telecommunications equipment that is used to store, process, and transmit information. Information MIS infrastructure is essential for any organization that relies on information to operate.
A strong information MIS infrastructure can help an organization to:
Protect its data from unauthorized access, use, or disclosure.Ensure the availability of information when it is needed.Maintain the integrity of information.Improve the efficiency of information processing.Support decision-making.The components of information MIS infrastructure include:Hardware: This includes computers, servers, storage devices, and telecommunications equipment.
Software: This includes operating systems, applications software, and database management systems.
Telecommunications: This includes the network that connects the hardware and software.
Information MIS infrastructure is a critical component of any organization's IT system. By investing in a strong information MIS infrastructure, organizations can protect their data, improve their efficiency, and make better decisions.
To know more about network click here
brainly.com/question/14276789
#SPJ11
8. (a) Identify two advantages and four limitations of the Speech recognition devices.
Explanation:
Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it
4. 5 Facts about Alternating Current and direct current
Answer:
1. The Alternating current comes from a power plant. The direction of the electricity switches back 60 times every second.
2. Alternating current: The same amount of current flows through a circuit regardless of the direction of the current.
3. Direct current: Even when no current is flowing through the wire, the electrons in the wire are moving at speeds up to 600 miles (1000 kilometers) per second but in random directions because the wire has a finite temperature.
4. Direct current: As opposed to alternating current, the direction and amperage of direct currents do not change. It is used in many household electronics and in all devices that use batteries.
5. Alternating current is five times more dangerous than Direct current. The frequency of the alternating current is the main reason for this severe effect on the human body. The frequency of 60 cycles is in an extremely harmful range. At this frequency, even a small voltage of 25 volts can kill a person.
Explanation:
You were conducting a forensic analysis of an iPad backup and discovered that only some of the information is within the backup file. Which of the following best explains why some of the data is missing
The backup being examined in this case is probably a differential backup that contains the data that has changed since the last complete backup.
How does forensic analysis work?
A thorough study to determine the cause, origin, perpetrators, and outcomes of a security event or a breach of company policy or federal law is known as forensic analysis. Particularly in criminal cases, forensic analysis is frequently associated with evidence presented to the court.
What is the work of a forensic analyst?
Forensic science technicians often perform the following tasks in labs: Analyze the forensic evidence you have collected from crime scenes using chemical, biological, and microscopic methods. Investigate potential connections between suspects and criminal conduct using DNA or other scientific analysis findings.
To know more about forensic analysis visit:
https://brainly.com/question/4327079
#SPJ4
How would the grain crusher work
Answer:
Grain crusher is used to crush various kinds of grains, peas, buckwheat, beans, corn, linseed seeds and etc. Crushed grains are usually used to feed ruminant animals. Crushed grain are easier to digest, nutrients are assimilated more easily.
list five function key
list two alphabet key
byEmmanuel okorie
Explanation:
Function keys:F1,F2,F3,F4
Alphabetic keys H,A
2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?
Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.
What is company's website?The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.
Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.
Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.
Learn more about website here:
https://brainly.com/question/19459381
#SPJ2
write a function number of pennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. ex: if you have $5.06 then the input is 5 6, and if you have $4.00 then the input is 4. sample output with inputs: 5 6 4
In the first example, when the input is `5 6`, it means there are $5.06. To calculate the total number of pennies, we convert the dollars to pennies by multiplying it by 100 (since there are 100 pennies in a dollar) and add the remaining pennies. So, in this case, the function would return 506.
In the second example, when the input is `4`, it means there are $4.00. Since no pennies are specified, we assume there are no additional pennies. Thus, the function would return 400.
To summarize, the function `number_of_pennies()` converts the given dollar amount and any additional pennies into the total number of pennies by multiplying the dollars by 100 and adding the remaining pennies, if any.
learn more about pennies here:
brainly.com/question/15602431
#SPJ11
virtual conections with science and technology. Explain , what are being revealed and what are being concealed
Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.
What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.
To learn more about technology
https://brainly.com/question/25110079
#SPJ13
What do “phone-copying” systems allow investigators to do?
(Forensic Science class, digital forensic science)
20 points will give brainliest
Answer:
it allows them to be able to look at the recent things people done on it . i believe
It allows them to be able to look at the recent things people done on it . i believe.
What is Phone copying?You can backup your iOS device using iCloud, or you may backup your Android device using system backup or Android backup tools.
In order to make sure nothing important is lost, you should additionally back up any particular data you're worried about losing, like family photos, on a different server.
You can use them to transfer your data to a new device if all you want to do is keep a complete copy of the info on your phone. You might need to request a new SIM card from your provider, though. To learn more about their policy, get in touch with their customer support team.
Therefore, It allows them to be able to look at the recent things people done on it . i believe.
To learn more about phone copying, refer to the link:
https://brainly.com/question/30284610
#SPJ3
What does this mean?
Answer:
The network that the platform is running on is down. Wait about 30min, and then try again. You can also restart your device.
Explanation:
This used to happen to me all the time during school, but when I restarted my computer it always fixed it!
A 'sharp' is any object that can puncture a plastic bag. What is the recommended strategy for handling sharps (such as broken or chipped glassware) in lab
To reduce the risk of injury, always pick up shattered glass with a brush and dustpan, tongs, or forceps and drop it into a container intended for disposing of broken glass.
What is the suggested procedure for handling cracked or broken glass in a laboratory?Glass that has broken should be cleaned up right away. A tiny brush and dustpan should already be present in a laboratory to clear up any minor spills. To pick up the smaller fragments of shattered glass, use forceps or duct tape.
How should broken glass be cleaned in a lab?Use forceps, tongs, scoops, or other mechanical tools to remove or retrieve broken glass from a work area or a fume hood.
To know more about disposing visit:-
https://brainly.com/question/28234440
#SPJ4
The Remove Duplicates tool locates and deletes records that are duplicated across more than one field. Question 5 options: True False
The given statement "The Remove Duplicates tool locates and deletes records that are duplicated across more than one field" is true.
What is meant by Remove Duplicates?
Remove Duplicates option enables to easily delete duplicates from a data table. It is a common and often needed action that can be performed on a data table. One can locate and remove duplicates by following some simple steps.
Steps to remove duplicates:
Select the range of cells from which you want to remove duplicates and Click Remove Duplicates.
The dialogue box appears on the screen, click OK, and the duplicates will be removed.
The Remove Duplicates tool locates and deletes records that are duplicated across more than one field, which is true.
To know more about Remove Duplicates visit:
https://brainly.com/question/30245037
#SPJ11
Consider the following code segment. Int a = 10; int b = 5 * 2; System. Out. Print(a == b); What is printed as a result of executing the code segment?
The code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.
What is code?Code is defined as a phrase used to describe text that a computer programmer has created utilizing the rules of a specific language. Computers can obey a set of instructions created through coding. Programmers can create programs, including websites and apps, by coding.
The piece of a program in an object file or in that contains executable instructions is referred to as a text segment, sometimes known as a code segment or simply as text.
Thus, the code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.
To learn more about code, refer to the link below:
https://brainly.com/question/497311
#SPJ1
When the supervisor-to-subordinate ratio exceeds a manageable span of control, additional Teams, Divisions, Groups, Branches, or Sections can be established. Which NIMS Management characteristic does this describe? Possible Answers:
a.Management by Objectives
b.Comprehensive Resource Management
c.Formal Communication
d. Modular Organization
This describes the Modular Organization characteristic of the National Incident Management System (NIMS). Modular Organization refers to the structure of an incident management organization that is divided into functional or geographical units, with each unit having defined responsibilities, resources, and reporting relationships.
Modular Organization is a structure used in incident management that divides the organization into functional or geographical units. Each unit has defined responsibilities, resources, and reporting relationships. This structure allows for efficient and effective response by managing the span of control within manageable limits and providing a clear chain of command and unity of effort. It is a key characteristic of the National Incident Management System (NIMS).
Learn more about Modular Organization: https://brainly.com/question/12774819
#SPJ4
If somebody is using a laptop at a coffee shop, how are they likely connected to a network?
If someone is using a laptop at a coffee shop, they probably have a snooping network connection.
What is the snooping?The snooping refers to illegal access to someone else's or a company's data. Similar to eavesdropping, the method does not always involve intercepting data while it is being transmitted.
Snooping attacks include a hacker listening in on network communication between two workstations. Passing unencrypted passwords in traffic increases the risk of unwanted access to the network and data reading.
Snooping occurs for a variety of reasons. They might be curious or they might have been harmed in the past. But it's crucial to keep in mind that having a dialogue is always preferable to invading someone's privacy, and the moment you look through your partner's belongings, you lose credibility.
Therefore, it is snooping.
Learn more about the snooping, refer to:
https://brainly.com/question/27493229
#SPJ6
Early computing crash course computer science #1 paragraph
Answer:
But before we get into all that, we should start at computing’s origins, because although electronic computers are relatively new, the need for computation is not.So each bead on the bottom row represents a single unit, in the next row they represent 10, the row above 100, and so on.But if we were to add 5 more after the first 3 we would run out of beads, so we would slide everything back to the left, slide one bead on the second row to the right, representing ten, and then add the final 2 beads on the bottom row for a total of 12.So if we were to add 1,251 we would just add 1 to the bottom row, 5 to the second row, 2 to the third row, and 1 to the fourth row - we don’t have to add in our head and the abacus stores the total for us.Over the next 4000 years, humans developed all sorts of clever computing devices, like the astrolabe, which enabled ships to calculate their latitude at sea.As early computer pioneer Charles Babbage said: “At each increase of knowledge, as well as on the contrivance of every new tool, human labour becomes abridged.”
A10:A20 Refer to values in
Cell A10 and cell A20
The cell in column A and row 10
The range of cells in column A and rows 10 through 20
The range of cells in row 15 and columns B through #
A10:A20 Refer to values in The range of cells in column A and rows 10 through 20. Thus the correct option is C.
The rectangles that make up an Excel worksheet's grid are called cells. A worksheet's references, the column letter, and the row number that intersect at the cell's location serve as a means of identifying each cell.
A, B, and C serve as column numbers, whereas digits serve as row identifiers (1, 2, 3). Depending on the column and row, each cell has a unique name or cell address.
In the given case, the values of A10:A20 is being asked which indicates that In column A the range of cell 10 to 20 is written as A10: A20.In other words, the cell is written as intersection Column D to Row 5 the cells will be D5.
Therefore, option C is appropriate.
Learn more about Excel, here:
https://brainly.com/question/1380185
#SPJ6
you are troubleshooting a windows 10 laptop that is infected with malware. you have already identified the type of malware on the laptop. what should you do next? (select three)
: The use of multifactor authentication is regarded an enterprise pleasant practice for both computer systems and smartphones.
Which is a common method used to specify the sources a consumer is allowed to access?Authorization is a procedure through which a server determines if the purchaser has permission to use a resource or get admission to a file. Authorization is commonly coupled with authentication so that the server has some thought of who the client is that is inquiring for access.
How can you mitigate or minimize the danger of data loss inclusive of controls on the data?How to forestall information loss
Regularly time table "fire drills" to restore statistics from backup. ...
Keep computer systems in safe, dry and dust-free areas. ...
Back up data regularly. ...
Have a generator or battery back-up system. ...
Protect gear from static electricity that can erase statistics or injury components.
Learn more about troubleshooting here;
https://brainly.com/question/14394407
#SPJ4
In 2-5 paragraphs, compare and contrast paraphrasing and summarizing.
Answer:
Paraphrasing
Explanation:
Although the two are often confused, there is actually quite a big difference between them. When you summarize the text you are reading, you are simply giving a general outline of the story or article, briefly touching on main events or main points. Little in-depth information should be given. A summary should be 1/3 the length of the original.
A paraphrase, on the other hand, can be more detailed. But you do have to be cautious of plagiarism with this one. In your own words and your own sentence structure, you are retelling the text as if recounting a story you heard from someone else. But it is your own writing. When possible, unless using necessary proper nouns, use completely different wording. Using synonyms of the same words will still be considered plagiarism. Similar sentence structure can also be plagiarism. If the original text uses many compound sentences, find a way to use simple sentences, complex sentences, and compound-complex sentences sparingly.
Answer:
Although the two are often confused, there is actually quite a big difference between them. When you summarize the text you are reading, you are simply giving a general outline of the story or article, briefly touching on main events or main points. Little in-depth information should be given. A summary should be 1/3 the length of the original.
A paraphrase, on the other hand, can be more detailed. But you do have to be cautious of plagiarism with this one. In your own words and your own sentence structure, you are retelling the text as if recounting a story you heard from someone else. But it is your own writing. When possible, unless using necessary proper nouns, use completely different wording. Using synonyms of the same words will still be considered plagiarism. Similar sentence structure can also be plagiarism. If the original text uses many compound sentences, find a way to use simple sentences, complex sentences, and compound-complex sentences sparingly.
Explanation:
What is the full form of UNIVAC, QBASIC?
UNIVersal Automatic Computer (UNIVAC)
Quick Beginner's All-Purpose Symbolic Instruction Code (QBasic)
Explanation:
UNIVAC:Universal Automatic Computer
QBASIC:Quick Beginner's All-Purpose Symbolic
Instruction Code
Keep smiling and hope u r satisfied with my answer.Have a great day :)
which statement is true of domain-specific self-esteem in adolescents? group of answer choices the best domain-specific predictor of global self-esteem in adolescents is their athleticism. the best domain-specific predictor of global self-esteem in adolescents is their ability to be outgoing. the best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness. the best domain-specific predictor of global self-esteem in adolescents is their perception of their agreeableness.
The best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness.
What is global self-esteem?Global self-esteem is the individual’s overall evaluation of their own worth and capabilities. It is the ability to recognize one’s own value and accept that value as a positive attribute. Self-esteem is connected to how one views themselves and their place in the world.
Research has shown that physical appearance is a major factor in adolescents' global self-esteem, with a greater emphasis on physical attractiveness leading to higher self-esteem. Other factors such as athleticism, agreeableness, and being outgoing may influence self-esteem, but physical attractiveness is the strongest predictor of global self-esteem in adolescents.
To learn more about physical appearance
https://brainly.com/question/30473252
#SPJ1
An AttributeError occurs if a function does not exist in an imported module. Fill in the missing code to handle AttributeErrors gracefully and generate an error if other types of exceptions occur.
import my_lib
try:
result = my_lib.magic()
SOLUTION:
print('No magic() function in my_lib.')
Since An AttributeError occurs if a function does not exist in an imported module, the missing code to handle is except AttributeError.
How may AttributeError be fixed?When an attribute reference or assignment fails, the Python AttributeError exception is thrown. When an attribute reference attempt is made on a value that does not support the attribute, this can happen.
Therefore, in using a try-except block, the AttributeError can be fixed. The try block should contain the lines of code that potentially throw the AttributeError, and the except block can catch and handle the problem.
Hence the use of except AttributeError is the mising code.
Learn more about AttributeError from
https://brainly.com/question/29431784
#SPJ1
How are “cells” in a spreadsheet formed?
Answer:
Mitosis
Explanation:
New cells are created from a process called cell division. The new cells are produced when a cell, called the mother cell, divides into new cells called daughter cells. When two daughter cells have the same number of chromosomes as the original cell, the process is called mitosis.
the ratio of length, breadth and height of a room is 4:3:1. If 12m^3 air is contained in a room, find the length , breadth and height of the room
Explanation:
The ratio of length, breadth and height of a room is 4:3:1
Let length = 4x
Breadth = 3x
Height = x
Volume of air contained in the room, V = 12 m³
We need to find the length, breadth and height of the room. The room is in the shape of a cubiod. The volume of a cuboid is given by :
V = lbh
\(4x\times 3x\times x=12\\\\12x^3=12\\\\x=1\)
Height of the room = 1 m
Breadth of the room = 3x = 3 m
Length of the room = 4x = 4 m
Absolute cell adressing
When copying a formula from one cell to another in Excel, an absolute reference is a cell reference where the column and row coordinates remain constant.
What is excel?Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.
Data analysts and other users can make information easier to view as data is added or changed by organising data using software like Excel.
Cell references come in two flavours: absolute and relative. When copied and filled into other cells, relative and absolute references behave in different ways.
A formula's relative references are altered when it is copied to another cell. Contrarily, regardless of where they are duplicated, absolute references hold true.
When a specific cell reference needs to be constant, an absolute cell reference can be used. Formulas, charts, functions, and other instructions frequently use references to cells in their syntax.
Thus, this can be concluded regarding absolute cell addressing.
For more details regarding absolute cell addressing, visit:
https://brainly.com/question/30443246
#SPJ1