How would you create a loop that never ends?

a
Use the "repeat" block

b
Use the "infinite" block

c
Use the "repeat until" block

d
Use the "forever" block

Answers

Answer 1

Answer:

the answer is d use the forever block

Explanation:

I took the test and I got it right but sometimes it is different for others


Related Questions

________ generally processes the largest quantities of data. Group of answer choices Operational databases Transaction processing Big data Data marts

Answers

transaction processing

generally processes the largest quantities of data. Big data Data marts Operational databases Transaction processing QUESTION 2 According to your text, NoSQL stands for: Numeric Only SQL Not Only SQL Numbered SQL No SQL QUESTION 3 Big data includes: Targe volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. large volumes of data with many different data types that are processed at very high speeds.

What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians

Answers

The best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is; As detailed below.

What is a machine algorithm?

Machine learning algorithms are mathematical model mapping methods used to learn or uncover underlying patterns embedded in the data.

Now, Machine learning comprises a group of computational algorithms that can carry out pattern recognition, classification, and prediction on data by learning from existing data set.

In this question, the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available).

Read more about Machine Learning Algorithm at; https://brainly.com/question/21928505

What is RAM?

Contained on a chip on the motherboard that does the computing to execute commands

Circuit boards that attach to the motherboard so you can connect components outside the case, such as a mouse, keyboard, speakers, or microphone

Random access memory, which are chips where information is stored temporarily while processing is taking place

Answers

Answer:

Random-access memory.

Explanation:

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.

Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic security settings that should apply to all systems. What type of document should she create

Answers

The type of document should she create is  baseline document. Check more about the term Baseline below.

What is a Baseline document?

A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.

Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is  baseline document.

Learn more about Windows servers  from

https://brainly.com/question/14526761

#SJ1

_____ collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, non-classified internet protocol router network (NIPRnet).

Answers

Signal intelligence is intelligence gathered by the interception of signals. The blank space will be filled with "SIGINT".

What is SIGINT?

SIGINT is also known as Signal intelligence is intelligence gathered by the interception of signals, whether they be human conversations or technological signals that are not directly utilised in communication. It is a subpart of Intelligence gathering management.

SIGINT collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, and a non-classified internet protocol router network (NIPRnet).

Learn more about SIGINT:

https://brainly.com/question/15710402

#SPJ1

100 points asap and brainly if right
Type the correct answer in the box. Spell all words correctly.
What term describes the site-to-site VPN used by Kevin’s company?
Kevin’s company has offices located in different states. All the offices are connected to the head office through a site-to-site VPN connection. Kevin’s company is using a(n) (blank) VPN.

Answers

Kevin’s company is using an “extranet” VPN

Answer:

extranet

Explanation:

VPN stands for virtual private networkVPN is used by companies for privacyIt also helps in keeping important data safe from hackers

A network configuration in which connected devices are located in close proximity is called a _____________

Answers

LAN
Local Area Network
A network of devices connected close together over a small geographical are (locally)

Size of a request header field exceeds server limit.

Answers

Try to Increase the value for the directive LimitRequestFieldSize in the httpd.conf:


Reason: This is normally caused by having a very large Cookie, so a request header field exceeded the limit set for Web Server.
For IBM® HTTP Server, this limit is set by LimitRequestFieldSize directive (default 8K). The LimitRequestFieldSize directive allows the Web server administrator to reduce or increase the limit on the allowed size of an HTTP request header field.
SPNEGO authentication headers can be up to 12392 bytes. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data acquisition Data entry Data mining Data encryption

Answers

Answer:

_______ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A Data acquisition B Data mining C Data encryption D Data scrubbing E Data entry

✓ A Data Acquisition

Explanation:

A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need

Answers

The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

What is F-connector?

The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.

A technician is installing RG6 cable.

The RG6 cable is a coax cable.This cable is used in satellite signal transmission, generally for TV and setup box.

Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.

Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

Learn more about the connector cable here

https://brainly.com/question/9082842

#SPJ1

A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.

Answers

A disc stripping system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails.

What is a stripping system?

Disk striping has been around for a long time. To improve disk performance, data can be "striped" across multiple disks.

Instead of using a single disk read/write head to write data, multiple heads from multiple disk drives can be used to improve performance.

Thus, the correct option is a disc stripping system.

Learn more about stripping system

https://brainly.com/question/14924341

#SPJ1

Michael is doing research to find information about a pet fish. He finds a website that says fish do not make good pets. Michael should not use this information because it is

a belief
a fact
an opinion
informative

Answers

Answer:

It is a opinion not a fact so it should not be used

Explanation:

Why have Social Security numbers traditionally been used as primary keys for database tables that store personal data on individual people

Answers

Each person has a unique Social Security number. Therefore each Social Security number is not shared, and thus each number represents one person only.
We can use the number to identify a person in a database

what is not an example of ai

Answers

Answer:

human

Explanation:

because it is not a machine

GlobalMan Tech purchased raw material from NewBizTr Co. When the sales team at NewBizTr Co checked the system, there was no payment
detall in the system, though the order-delivery details were present. Also, it seemed that someone had tampered with the details of the previous
order. Which Important data-management features were compromised?

Answers

The Important data-management features were compromised is maintaining Data Security.

What does data management made up of?

Data management is known to be a kind of administrative method that is often used in acquiring, validating, storing, etc., of data for system users.

Note that Maintaining Data Security is one key feature of data-management  and it is the one that has been tempered with.

Learn more about data-management features  from

https://brainly.com/question/24027204

#SPJ1

Answer:

1 security 2 accuracy

Explanation:

Which type of cell references are automatically updated when copied?.

Answers

Answer:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

Explanation:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

Why shouldn’t you add taxes to schools to keep technology in classrooms?

Answers

Answer:

Technology is becoming more expensive and more unhealthy over time, so adding taxes is adding extra funds that don't need to be added. Studies also show that technology in classrooms can cause students' social skills to deficit.

Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automobile classes override this method. Which class defines the method that is called when the second statement in the code that follows is executed

Answers

The class that defines the method that is called when the second statement in the code that follows is executed is: Automobile.

Automobile class

In a situation where the statement " Automobile car = new Automobile ( )" is executed. The process called instantiation has taken place.

When instantiation occur this indicate or means that object of the automobile class has been created.

An object can tend to be created based on the definition of the class  and the created object can be used to perform or carryout tasks.

Therefore the class that defines the method is: Automobile.

Learn more about automobile class here:https://brainly.com/question/15697747

#SPJ1

Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False

Answers

Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement.

What are  formal reports?

Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:

Inspection Report.Safety and Health Report.

Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement because  they are all examples of informal reports.

Learn more about formal reports from

https://brainly.com/question/11599232

You are a game designer and are going to give a presentation to a group of high school students to try to get them interested in a career in the video game industry. You decide you will use a PowerPoint presentation to guide you through your discussion. Your PowerPoint presentation must include:


an explanation of what a video game is;

some history of video games and the video game industry;

why a career in the video game industry is a good choice; and

some examples of what students could do to begin to prepare themselves for an application to college and a career in gaming

Answers

Answer:

Pick a concept. Generate a few game concepts to see what kind of game you want to make. ...

Gather information. Game creation involves extensive research. ...

Start building. ...

Refine your concept. ...

Test your game. ...

Market the finished product.

Explanation:

A video game immerses players in a virtual environment and is an interactive form of electronic entertainment. It involves story-telling, user experience, aesthetics, sound design, and gaming mechanics.

The earliest arcade machines and home consoles like the Atari may be found in the history of video games. As technology developed over time, 3D graphics, virtual reality, and augmented reality experiences were introduced.

For those who are passionate, a career in the video game industry offers fascinating options. The sector is renowned for its quick expansion, with new platforms and technologies appearing on a regular basis.

Technical expertise and the creation of a solid portfolio are prerequisites for pursuing a career in the video game industry.

For the creation of games, learning programming languages like C++, Java, or Python is useful. Additionally, learning 3D modelling, animation, and game design fundamentals can be helpful.

For people who love games and creativity, a career in the video game industry provides intriguing opportunities.

Thus, you can contribute to the creation of engaging and innovative games that engage gamers all over the world if you have the necessary abilities, portfolio, and commitment.

For more details regarding gamers, visit:

https://brainly.com/question/25829996

#SPJ5

List a future Internet and a future network technology that interests you. Explain what it is and how it works. Comment on another's post. You must post before you can see other's posts. Internet tech

Answers

LiFi
Data is transmitted via light
You could have streetlights transmit data to cars.
Since you just need the light to be on or off, you can transmit binary bits.
The rate at which lights can flicker is so fast, that the human eye can’t perceive it!
However LiFi technology is an idea that gained popularity I think about four or five years ago. It might be a bit before it becomes a new breakthrough technology!

Think about the activities that you do online. What are three ways you can use a web browser to make your experience easier and more enjoyable?

Answers

Answer:

Copy and paste

Keywords

Bookmark tabs

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server

Answers

Answer:

✓ A. Telnet

Explanation:

6.Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?

A. Telnet B. Remote Desktop C. FTP D. SSH

✓ A. Telnet

To make slides in a powerpoint online application presentation have the same transition effect, select __________ on the transition tab. apply to all existing fade none

Answers

Answer: Animations

Explanation:

Transitions, such as fade, can be applied to all using the command Ctrl+A.

Transitions are found under the animations Tab. Sorry about the bots.

Hope This Helped!

Answer:

Apply to all

Explanation:

When reconciling your bank statement with your checkbook, what should you
do first?
O A. Compare deposits.

B. Compare balances.
• C. Compare dates.
• D. Compare checks and withdrawals.

Answers

b All your transactions for the month may not be on your bank statement. Some transactions might have occurred too close to the statement date. Those transactions will appear on the next statement, but are already recorded in your check register.

13,Which hardware device is used in decoding the machine language version of an instruction in the Instruction Decode stage of the Fetch Execution Cycle

Answers

It should be the control unit

_____ means collecting vast amounts of data from a host of websites.
A. Relating
B. Visualizing
C. Querying
D. Web scraping

Answers

Answer:

D

Explanation:

D. Web Scraping is the answer

D. Web scraping
Explanation: definition “a term for various methods used to collect information from across the internet”

If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is executed

Answers

  The value of result of the  code segment is executed is known to be 4.

Why is the value of the code segment so?

  When the result of  is not  executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true

  Therefore,   result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the  code segment is executed is known to be 4.

Learn more about scores from

https://brainly.com/question/19492935

#SJ1

Answer:

its 5

Explanation:

I put 4 and got it wrong and checked the test

14 AP Computer Science Principles


3. Consider the following code segment.

first 100

second 200

temp first

second + temp

first second

What are the values of first and second as a result of executing the code segment?

(A) first = 100, second

= 100

(B) first = 100, second = 200

(C) first = 200, second

=

100

(D) first = 200, second =

200

Answers

The values of first and second as a result of executing the code segment are (c) first = 200 and second = 100

How to determine the value of the variables?

From the code segments, we have the following assignment operations

first = 100 and second = 200

The variable first is assigned to variable temp.

So, we have:

temp = first = 100

The variable temp is assigned to variable second

So, we have:

second = temp =  100

Lastly, the variable second is assigned to variable first

first = 200

Hence, the values of first and second as a result of executing the code segment are (c) first = 200 and second = 100

Read more about code segments at:

https://brainly.com/question/14284157

#SPJ1

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.







B.






C.






D.


newstyle.css

Answers

Answer:

D

Explanation:

It is D

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.

Other Questions
Given the reaction, how many moles of Z will be produced from 4.85 mol A, assuming excess B?2 A +3B = 4Y + 5 Z explain why you think you would prefer to rent or buy? When you think about being 22 years old, do you think your answer will be the same or different? Explain. The rectangles are similar Find X. Can someone please help. The Chronicle sells a local neighborhood group running an all block yard sale a quarter-page ad for $180. There are 18,000 subscribers, so the cost per thousand (CPM) is Draw, label, and shade a distribution for each problem. Round probabilities to the nearest ten thousandth.25. About 12.5% of people in the United States do not wear a seat belt. Suppose we plan to select a random sample of 220 U.S. residents. Let p = the proportion of people in the sample who do not wear a seat belt. Calculate the mean and standard deviation of the sampling distribution of p. What does einsteins theory of relativity, which posits that movement in space and time is relative to the person measuring them, mean? select two answers. each persons perception is ones own truth. reality is unique to each individual. space and time are constructs that do not exist. each person perceives space and time differently. what people perceive is not necessarily accurate or true. Which technology has most lowered inventory costs in industry? tablet computers robotics satellite communications just-in-time manufacturing What is forensic entomology? What are the different areas of forensic entomology? The Wolves Among Us".Beagles, greyhounds, German shepherds, and even tiny toy poodles are all related to the same majestic wild animal, the wolf. In fact, all domestic dogs are descended from wolves. There are several species of wolf, including the gray wolf, the arctic wolf, the red wolf, the white wolf, and the Mexican wolf. Wolves are some of the most widespread mammals. Populations of wolves exist in almost as many places around the globe as humans do.Wolves are exceptional pack hunters. This is why they are able to take down large prey such as moose or deer by working together as a seamless team. Wolf pups as young as eight months old begin helping on the hunt. Wolves can reach speeds of up to 40 miles per hour when chasing prey, and their thick, double-coated fur enables them to keep warm in even the coldest arctic temperatures. Their large, powerful paws can reach up to 5 inches across and help to propel them quickly across the snow.Next time you're playing fetch with your furry friend, think about its ancestor, the wolf. That terrier or pug might only be able to take down a ball or a bone, but it gained its instincts to chase and hunt from those greatest of hunters, the wolves.Read the article "The Necessity of Hybrids".What do you get if you cross two different species? Depending upon the species, you might end up with a grolar bear, a wolfdog, or a Savannah cat, among many others. What do these animals have in common? They're hybrids. Sometimes hybrids happen naturally in the wild, but usually, hybrids are the result of humans selectively breeding animals.Grolar bears and pizzlies are the result of crossing polar bears and grizzly bears. These hybrids were first seen in zoos, as the bears' natural habitats did not normally overlap. Recently, these hybrids have started appearing in the wild. Due to climate change, the bears' once-separate habitats are beginning to overlap. Bigger and more aggressive than their parents, grolar bears and pizzlies could pose a risk to natural habitats and humans.Wolfdogs are, as their name suggests, the result of crossing a wolf with a domestic dog. Bred for the pet trade, these hybrids do not often happen in the wild. Wolfdogs do not make good pets, however, as they can be destructive and aggressive. Many states have outlawed keeping wolfdogs because they can pose a danger to people.Savannah cats are another example of human-made hybrids that were developed to be pets. Savannahs are the result of crossing a small wildcat called a serval with a domestic housecat. They look like miniature versions of the wildcat, which is why many people like keeping them as pets. Like the wolfdog, however, Savannahs do not make ideal house pets. They can be destructive, and usually, they keep the wild nature of the serval.There are many more examples of human-made hybrid animals. Some hybrids, such as the mule, have been helpful to humans. Unfortunately, others, like the wolfdog or Savannah cat, should not have been made in the first place.How is the overall structure of "The Wolves Among Us" similar to the structure of "The Necessity of Hybrids"? A)Both articles use the cause and effect text structure.B)Both articles use the chronological text structure.C)Both articles use the compare and contrast text structure.D)Both articles use the problem and solution text structure. By the year 2000, approximately what percentage of the world's population was engaged in full-time farming please answer this quickly and correctly, spam will be reported.what did hermia have to be aware of about her plan? please help !!! im so lost with this Solve u^2= -25, where u is a real number.Simplify your answer as much as possible.If there is more than one colution Find the area using the given image. In the hotly competitive auto industry, Geely faces high pressure for cost reductions. The company also sells its Volvo brand to the same high-income, safety-conscious buyer the world over. The best strategy for Geely is a(n) __________ strategy. Which of the following had the lowest social hierarchy in Japanese culture during this time period?A. MerchantsB. PeasantsC. SamuraiD. Emperor HELP ANYONE? Now you will put what you learned into practice. Remember, some ways to improve word choice include: Use a thesaurus to find synonyms Use words that are specific, not vague Stay away from using verbs like: is, was, were, & are Rewrite the paragraph below to include more descriptive and colorful language that suggests a mood of exuberance or excitement. Specifically, edit this paragraph for word choice. Feel free to use a thesaurus, but try to maintain your own personal voice. For example, dont use words you wouldnt normally use. Make sure to edit for errors in conventions before turning it in. Paragraph to rewrite: "I had the best day ever. First, I woke up. Then, I got a package in the mail. I opened it. It was the best gift ever. Then, my aunt came over with a birthday cake and presents for the party. All my friends arrived and we had a good time. Ill always remember this day." For Gundy Company, units to be produced are 5,000 in quarter 1 and 7,000 in quarter 2. It takes 1.6 hours to make a finished unit, and the expected hourly wage rate is $15 per hour. Prepare a direct labor budget by quarters for the 6 months ending June 30, 2022. Hello, may you stay here for a bit and help me?The first answer gets brainliest!~Lilo1was1Lost~