You created a photo album with transitions and want to send it to friens

Answers

Answer 1

Answer:

do not cheat in your exam

Answer 2

Answer:

C.All the negative things the other person has said or done to you

Explanation:


Related Questions

Write code that declares variables to represent a user’s hourly rate of pay and the
number of hours worked.
Assign appropriate values to the variables, then calculate and display the user’s gross
pay for a week, the withholding tax (15% of gross pay), and the net pay (gross pay –
withholding). An example output would be:
Gross Pay: 1500
Withholding Tax: 225
Net Pay: 1275

c# language

Answers

The code for the given command is:

hrs = input("Enter Hours:")

h = float(hrs)

ret = input("Enter rate per hour:")

rate = float(ret)

p = computepay(h, rate)

print("Pay", p)

The above code asks the user for input of hourly pay rate and the number of hours worked and prints the output after making the necessary computations.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

The choice database does not have any impact on the relevancy of search results true or false

Answers

True. The search results a user received have no correlation with the choice of database.

How do you optimise search results in a database?

It is recommended that the best way to optimise search results lies in adjusting how the query is been made. This implies that a user can make their search results more relevant by using key phrases or making direct quotations in the search box.

For example, to achieve relevant search results of a  home address in a database, making a direct quotation of the home address in the search box would yield the desired results than simply typing a few phrases.

You can learn more search results here https://brainly.com/question/14024902

#SPJ1

Why do we need to use a VPN service?

Answers

Answer:

VPN creates a private tunnel so hackers, your ISP, and the government can't see what you're doing.

Answer: VPN stands for Virtual Private Network. It is a tool that is used for securing the user's internet journey.

Explanation:

Through encryption, a VPN keep safe the internet traffic of the users. For the best VPN service, you must try CovermeVPN that ensures high speed and the highest security.

If you are an Indian, know why CovermeVPN is best VPN for India.

Source:

https://covermevpn.com/best-vpn-service-in-india-for-pc-mobile-and-other-devices/

Which of the following closely represents the objective of the four dimensions in ITIL?
1. Handling of increased complexity of service management in modern scenarios
2. Holistic approach to Service management covering all key / aspects
3. Simplifying Service management to focus on only most critical aspects
4. Clear segregation of service management activities so that it can be assigned different functions/organizations

Answers

The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.

What are the dimensions of service management ITIL?

They are:

PeopleProcessProducts or technologyPartners and suppliers.

Note that the four dimensions stands for the perspectives that are vital to right delivering value to customers and some stakeholders in the terms of products and services.

Hence, The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.

Learn more about ITIL from

https://brainly.com/question/14098997

#SPJ1

The formula in the cell above would yield the result:

Answers

The result that would be yielded by the formula in the cell given would be 9.

What result would the COUNTA formula yield?

COUNTA is a formula that is used to count the number of cells in a given range of cells that have any values in them.

In the range (A1:I1), the number of cells with values would be 9 because cells A1 to I1 all have values in them.

Find out more on the COUNTA function at https://brainly.com/question/24211266.

#SPJ1

What is the significance of the TCP three-way handshake for applications that utilize TCP as transport protocol?

Answers

The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

What is the benefit about?

TCP's three-way handshake is said to have two vital functions.

It helps to make sure that the 2 sides know that they are in sic or ready to transfer data It gives room for both sides to come to agreement in regards to the initial sequence numbers, that was or is to be sent and acknowledged during the handshake.

Hence, The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ1

Think back to your early days of education—what role did technology play? Now ask a parent/guardian/older family member what role technology played in their education. Discuss the difference between your experience and this older family member’s experience with technology in education. Which do you think created a better learning experience?

Answers

The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Note that schools were said to slowly create a curriculum where the subjects which are seen as most vital were taught.

By the mid-1600s, the invention of the modern library and the pencil were brought up, starting the first et of educational technology.

How has technology played a role in education?

It is one that has helped a lot of students to be able to look out or search for new subjects and broaden their understanding of a lot of hard concepts, such as STEM.

Note that The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Learn more about technology from

https://brainly.com/question/25110079

#SPJ1

I am trying to make a flowgorithm chart for a dogs name, age, weight and when their weight is less than 50 OR more than 100 its output is the dogs name. I also need to include a sentinel value to end the program. For some reason I cannot share my screen or upload a file of what I completed. I really want to get past this assignment as I have already been working on it for several days. PLEASE HELP

Answers

Answer:

i think it helps

Explanation:

sorry there was someone else rude as heck messaging and responding I couldn't see their screen name

what isig naame

oh okay

I have sent dm

i dont know your name there

How serious are the risks to your computer security?

Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?

Answers

Explanation:

classify the types of digital computer with short description

Protecting your identity is essential, even on your personal or home computer. You should consider doing all of following except:

Answers

Should not respond to emails asking you to verify your personal infoinformation.

Protecting identity

Because of the prevalence of phishing emails. Such emails may look legitimate as though from someone or an organization you know, but most often they are designed to steal your personal information. Hence, it is often recommended by cyber security experts to avoid responding to emails asking you to provide your personal information.

You can learn more about protecting your identity here https://brainly.com/question/15252417

#SPJ1

84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!

Answers

The question is about identifying the various ways of manipulating numbers. One of such is using following pair:

Input Format: Decimal ASCIITransformed Output String.

Using the above process, the result given is 50.

What is ASCII?

ASCII is the acronym for American Standard Code for Information Interchange.

Another way of approaching the above problem is by bucketizing.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem solving.

Similarly, bucketizing is a data organizing technique that decomposes the space from which geographic data is gathered into areas.

Some criteria for selecting area borders include the amount of things contained inside them or their physical arrangement (e.g. minimizing overlap or coverage).

A bucket data structure utilizes key values as bucket indices and stores things with the same key value in the appropriate bucket.

As a result, the job necessary to address the problem is completed.

Learn more bout Decimal ASCII:
https://brainly.com/question/26307436
#SPJ1

Explain how advanced analytics (e.g., Machine learning) helps the threat life cycle management. State the stage of the threat life cycle management where advanced analytics is mostly needed in your explanation.

Answers

Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

What is Advanced analytics?

Advanced analytics refers to the computation strategies that are able to manage a huge number of parameters to model a situation.

Advanced analytics is very useful in epidemiology because this approach allows for predicting the transmissible behavior of infectious diseases caused by pathogenic microorganisms (e.g., bacteria) and viruses.

In conclusion, Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

Learn more about Advanced analytics here:

https://brainly.com/question/15007647

#SPJ1

def rectangle_area(base,height):
area =base * height
return area


print("The area is ", rectanle_area(5,6))

ive been typing theabove in my answer but it still say "NOT QUITE"

Answers

Using the computer language in python to write a function code that calculates the area of ​​a rectangle.

Writting the code in python:

def rectangle_area(base, height):

z = base*height  # the area is base*height

print("The area is " + str(z))

rectangle_area(5,6)

See more about python at brainly.com/question/18502436

#SPJ1

If given program is executed, what will be output?

Create Stack<Integer>

Queue<Integer> queue = new LinkedList<Integer>;

Create LinkedList<Integer> ll;

int[] array = { 16, 22, 399, 214, 351 };



for (i = 0; i < array.length; i++) {

int x = array[i];

if (i % 2 == 0)

addLast(x) in ll;

else

push(x) on stack;

}

while (“stack is not empty” || “linked list is not empty”) {

if (stack is not empty)

queue.enqueue(stack.pop());

if (“linked list is not empty”)

queue.enqueue(ll.removeLast());

if “queue is not empty”)

print("I am " + queue.getFront();}

Answers

Answer:

16 22 399 214 351

Explanation:

es 1 .22 399 480

Using the knowledge in computational language in JAVA it is possible to write a code that joins the data placed in the code and outputs a value.

Writting the code in JAVA:

import java.util.LinkedList;

import java.util.Queue;

import java.util.Stack;

public class ReversingTheFirstKElementsOfAQueue{

static Queue<Integer> queue;

static void reverseQueueFirstKElements(int k)

{

if (queue.isEmpty() == true

|| k > queue.size())

return;

if (k <= 0)

return;

Stack<Integer> stack = new Stack<Integer>();

for (int i = 0; i < k; i++) {

stack.push(queue.peek());

queue.remove();

}

while (!stack.empty()) {

queue.add(stack.peek());

stack.pop();

}

for (int i = 0; i < queue.size() - k; i++) {

queue.add(queue.peek());

queue.remove();

}

}

static void Print()

{

while (!queue.isEmpty()) {

System.out.print(queue.peek() + " ");

queue.remove();

}

}

public static void main(String args[])

{

queue = new LinkedList<Integer>();

queue.add(1);

queue.add(2);

queue.add(3);

queue.add(4);

queue.add(5);

int k = 3;

reverseQueueFirstKElements(k);

Print();

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Why should we learn Ethereum? Explain.

Answers

Answer:

Ethereum BenefitsIt has a large and committed global community and the largest ecosystem in blockchain and cryptocurrency. Wide range of functions. Besides being used as a digital currency, Ethereum can also process other financial transactions, execute smart contracts and store data for third-party applications.

Explanation:

Hope this helps and mark as a brianliest

You are building a Music Player app.
You need to implement the MusicPlayer class, which should hold the track names as Strings in an array. The array is already defined in the given code.
The player should support the following functions:
add: add the given argument track to the tracks array.
show: output all track names in the player on separate lines.
play: start playing the first track by outputting "Playing name" where name is the first track name.

You can add a new item to an array using +=, for example: tracks += track

make sure the answer or the language code is in kotlin


answer it asap

Answers

Using the computational knowledge in JAVA it is possible to write a code that uses the functions to make a Music player app.

Writting the code in JAVA

import React, { Component,useRef, setStatus, status } from 'react';

import ‘./Song.css';

import song1 from "./music/song1.mp3";

import song2 from "./music/song2.mp3"

import song3 from "./music/song3.mp3"

import song4 from "./music/song4.mp3"

export default function MusicPlayer() {

   const data = [

           />

       </li>

   );

};

See more about JAVA at brainly.com/question/12975450

#SPJ1

* Describe the five components of a
computer

Answers

Answer:screen, keyboard, cpu, mouse, processor, mother board, power box. Ports

Explanation:

* Describe the five components of a
computer

Answers

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

Answer:

I don't know mad ask to your mother or father mad

dentify the benefits of workplace diversity. Select all that apply.

The Americans with Disabilities Act (ADA) is a federal law that states employers must do which of the following for workers with disabilities?
right: provide reasonable job accommodations
wrong: hire disabled workers
wrong: make job accommodations no matter the cost

Im asking a question cuz i couldnt find the answer in brainly. for anyone who needs it

Answers

Answer:

A is the answer

Explanation:

Because I just did it.

Have a good day.

Differentiate between CD-R and CD RW

Answers

After writing to a CD-R, it becomes a CD-ROM. A Compact Disc Re-Writable (CD-RW) is an erasable disc that can be reused. The data on a CD-RW disc can be erased and recorded over numerous times. NOTE: CD-RW media may not be readable outside of the drive it was created in.

Explanation:

hope it will help you

what is the key differentiator of conversational Artificial Inelligence?

Answers

The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

What is Natural Language Understanding?

This is known to be the key differentiator in terms of conversational AI from traditional ones and it is one that is often  to help or bring about natural conversations.

Note that The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

Learn more about Artificial Intelligence from

https://brainly.com/question/25523571

#SPJ1

Fill in the blanks to help write this professional e-mail:



✔ Hello Design Team,

You may have heard, I am meeting with the VP (Vice-President) of Finance to highlight our team’s work on the Big Project.
✔ I’d like to show our best work to the VP, which is why I am asking for your help now.

I want to have a slideshow of our best designs to present.
✔ Please send me final versions of your best work so I can create the presentation.


✔ Thanks for your support!

Jan, Team Lead

Answers

The Fill in the blanks of this professional e-mail is given below:

What is the email about?

The Team Lead,

Dangete group.

To Design Team,

                    Email on project presentation

You may have heard, I am meeting with the VP (Vice-President) of Finance to highlight our team’s work on the Big Project. There we are going to talk about all the work that the team members can do and have done.

I’d like to show our best work to the VP, which is why I am asking for your help now. I want to have a slideshow of our best designs to present.

This will be presented when he comes to visit and as such, Please send me final versions of your best work so I can create the presentation. I trust you all and i know you are have been giving your best for the company's growth.

Thanks for your support.

Yours faithfully,

Jan Gith,

Team Lead

Learn more about  Design Team from

https://brainly.com/question/25886641

#SPJ1

what is cpu?
please give me right answer ​

Answers

Answer:

Explanation:

processor such as intel/amd processors

given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_value > 0: total_product = total_product * user_value user_value = int(input()) print('Product:', total_product, end='')

Answers

The python program for any of the given values is as written below.

How to run a Program in Python?

We are told to use input for the python program as;

2, 4, 3, -1

Now, the python program using 2 as user value and 1 as total product gives us the program as;

total_product = 1

user_value = (input(1)) #while user_value > 0:

total_product = total_product * user_value

user_value = (input(2))

print('Product:2', total_product, end='2')

Read more about Python Program at; https://brainly.com/question/26497128

#SPJ1

when you use the predict step in the IPDE process you

Answers

If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Why using the IPDE process?

This is known to be Identify, Predict, Decide, and Execute.

The IPDE is regarded as a strategy that a person can make use of in off-road driving and as such, If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Learn more about IPDE from

https://brainly.com/question/2497669

#SPJ1

Record the issue of 4,000 shares of $5 par value common stock for $35000 cash

Answers

The outcome are:

Cash =  $35,000Common Stock $ 5 Par Value = $20,000Paid-in Capital in exc of par val CS =  $15,000

What is the shares about?

Shares are known to be the units of measurement for any equity ownership that is found in a corporation.

Note that in the case above, since the Corporation were said to have issued 4000 shares. the cash they have is $35,000.

To get the Paid-in Capital in exc of par val CS =  

Cash ($35,000) - Common Stock $ 5 Par Value ($20,000)

=   $15,000

Therefore, The outcome are:

Cash =  $35,000Common Stock $ 5 Par Value = $20,000Paid-in Capital in exc of par val CS =  $15,000

See the question below

A Corporation issued 4000 shares of $5 par value common stock for $35,000

Learn more about shares  from

https://brainly.com/question/25818989

#SPJ1

ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the staff suggested to install CHROME OS Flex and use android app for different purposes. Please state and explain 3 kinds of threats for the above suggestions

Answers

First threat

It's malwareBecause chrome OS is not much secure as compare to windows 11 (Prime opponent)

2nd threat

It's speedChrome OS is litreally very slow .On comparing to windows edition it lacks in multiple factor so you work per unit tike decreases

Third threat

You may be able to use Android apps but windows is made for ComputersIn several factors like ads,cleanness chrome OS will create problems

write a program to calculate the average of all even integers between 1 and 10000

Answers

We can calculate average by adding each even numbers till n and then dividing sum by count.

The Python program to calculate the average of all even integers between 1 and 10000 is given below.

We have,

The Python program to calculate the average of all even integers between 1 and 10000:

def main():

   even_sum = 0

   count = 0

   for num in range(2, 10001, 2):  # Starting from 2 and incrementing by 2 (only even numbers)

       even_sum += num

       count += 1

   if count > 0:

       average = even_sum / count

       print("Average of even integers between 1 and 10000:", average)

   else:

       print("No even integers between 1 and 10000.")

if __name__ == "__main__":

   main()

In this program, we define a function main() that runs the main logic.

We initialize even_sum to store the sum of even numbers and count to keep track of how many even numbers we encounter.

The for loop iterates through even numbers between 2 and 10000 (using the range() function with a step of 2).

Inside the loop, it adds each even number to even_sum and increments the count.

Thus,

The Python program to calculate the average of all even integers between 1 and 10000 is given above.

Learn more about Python programs here:

brainly.com/question/32674011

#SPJ3

I need help with my solution

Answers

Answer: B. a = 14 and b = 3

Explanation:

Let's work through the expressions one-by-one:

The first 2 lines create 2 varaibles, a and b, with values of 2 and 7, respectively.

The next line assigns a to the product of a and b.

a * b = 2 * 7 = 14, so the new value of a is 14.

The last line assigns the remainder of b divided by the difference of a and 10.

a - 10 is 14 - 10 which is 4.

The value of b is 7 due to the second expression. 7 % 4 is 3 as 4 goes into 7 once with 3 left over. This value of three is assigned to b.

After all the expressions, the values of the variables are as follows: a = 14 and b = 3.

Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted to log in using their username. What should you do to fix the problem and retain scalability and why?

Answers

The right thing to do is that  you need to Set the cluster affinity to Single.

What is single affinity?

Single affinity is known to be a term that connote the act of load balancing that uses the source IP address that pertains to the incoming connection.

Note that It is said to automatically redirects all requests and as such, The right thing to do in the case about is that  you need to Set the cluster affinity to Single.

Learn more about scalability from

https://brainly.com/question/14301721

#SPJ1

Other Questions
to what extent was albert edward foremans inability to read and write a handicap Acute gastroenteritis that occurs after an incubation period of two to three days, persists for about a week, and commonly affects children is probably caused by_______. how did the treaty of versailles contribute to world war II How should I solve this? Which of these statements is true for f(x) = 2.3*?OA. The y-intercept is (0, 1).OB. The domain is x > 0.OC. The y-intercept is (0, 2).OD. It is always decreasing. Translate the following sentence into Spanish. Make sure to include correct punctuation. My brother is living in Chile. Am what Im writing is correct? I put 2+-2=0 Please help asap!!!!!!!!!!!! 2/y = 4/2 find yAnswer is y=1 but how? Why did Kennedy give his Civil Rights Address speech After writing a draft of an information essay , a student should The _______________ finned fish have strong fleshy limbs supported by strong bones that are attached to the body. What can happen if the framework you choose as a foundation does not fit your organizations business objectives? A government buys `x`fighter planes at `z` dollars each, and `y` tons of wheat at w dollars each. It spends a total of `B`dollars, where `B=xz+yw`. Write an equation whose solution is the given quantity:2. The price of a ton of wheat, given that a fighter plane costs 100,000 times as much as a ton of wheat, and that the government bought 20 fighter planes and 15,000 tons of wheat for a total cost of $90 million. What is the correct classification for each given angle?Drag and drop the answer into the box to match each angle. The decisions of the us and soviet union to build nuclear weapons is much like the prisoners dilemma. a. true b. false Which of the following functions are solutions of the differential equation y'' + y = sin(x)? (Select all that apply.) y = 1 2 x cos(x) The correct answer is a right? A child with diabetes insipidus will be receiving injectable vasopressin when discharged from the hospital. What is the most important step when teaching injection techniques Jimmy has completed the headline section of his text ad and is now writing the description section. What are three factors that Jimmy should include in the description section of his text ads? (Choose three.)