Answer:
(Hope this helps can I pls have brainlist (crown)☺️)
Explanation:
Parallel processing may be done on any system with more than one CPU, including multi-core processors, which are prevalent in today's computers. Multi-core processors are integrated circuit chips with two or more processors for improved performance, lower power consumption, and more efficient multitasking.
We take in numerous distinct types of information at the same time in parallel processing. This is especially true when it comes to vision. When you see a bus approaching, for example, you can perceive its colour, form, depth, and velocity all at once. It would take far too long if you were to evaluate each item individually.
how many levels of heading tags are allowed in html?
Answer:
six levels
Explanation:
HTML defines six levels of headings. A heading element implies all the font changes, paragraph breaks before and after, and any white space necessary to render the heading. The heading elements are H1, H2, H3, H4, H5, and H6 with H1 being the highest (or most important) level and H6 the least.
Answer:
six levels
Explanation:
Working with text in presentation programs is very ____
using text in other applications.
a) similar to
b)different from
Answer:
a) similar to
Explanation:
Answer: it is A
Explanation: Your inquiry states that "Working with text in presentation programs is very ____ using text in other applications." Working in presentation software such as Microsoft PowerPoint and Microsoft Word, is very different. Microsoft PowerPoint allows you to do so much more on the visuals, Microsoft PowerPoint and other presentation software also has capabilities to present information than displaying it in a text-editor.
pls make me branliest
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
A DNS attack which would only impact a single user is: DNS poisoning attack.
DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.
In Cybersecurity, there are different types of DNS attacks and these include:
DNS flood attack.DNS tunneling.DNS poisoning attack.DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.
Read more: https://brainly.com/question/17273205
The _____________________ search is a very simple algorithm. Sometimes called the ________________________ search, it compares each element with the value being searched for, and stops when either the value is found or the end of the array is encountered. Group of answer choices
Answer:
linear search
sequential
Explanation:
The slogan "You deserve a break today" is an example of a
Answer:
c trademark
Explanation:
who developed the first personal computer called the altair
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.
No food or drinks near the computers. NO EXCEPTIONS.
Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.
Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.
Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.
Do not change computer settings or backgrounds.
Ask permission before you print.
SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.
If you are the last class of the day, please POWER DOWN all computers and monitors.
Keep your files organized
Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.
Log off
Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.
Each person may only use one computer at a time
Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.
Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.
Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.
.Explanation:
sorry about only 9 rules
when must a breach be reported to the us computer emergency readiness team
Please please help I don’t understand thus
Answer:
I am pretty sure the answer is path.
Explanation:
Each section in the user/juanita/etc thing makes up a path.
How graphic designing
changed in years? Write in 300 words.
Answer:
Graphic design has a rich and varied history. The word “graphic design” didn’t appear on the scene until 1922, when William Dwiggins created the word to describe the art of designing with graphics. In the earliest days of graphic design, professionals drew by hand. However, in the last 60 years graphic design has forged ahead, advancing rapidly since the addition of today’s digital art tools.
Earliest Graphic Design
Even though the term wasn’t yet coined, some of the earliest designs included typography for books and newspapers. One could also argue drawings on cave walls represent a form of ancient graphics.
Fast forward to the 1900s when posters became a form of expression. During the 1940s, graphic design appeared in propaganda posters of the era, such as the “We Can Do It” poster with Rosie the Riveter. Slogans were short, to the point, and added to a graphic that set the tone.
As technology began to change and become available to more people, the entire industry that would become known as graphic design began to emerge.
The 1990s
In 1990, Photoshop 1.0 arrived on the scene. Back then, you could only use Photoshop with Macintosh computers. The birth of this new tool again changed designers’ ability to experiment with new techniques, including overlapping text, faded elements, and digital overlays.
Grunge was also born in the ’90s, which showed up in movie poster designs, book covers, and album covers with dark looking images and simple colour palettes, such as white on black, perhaps with a pop of red. A few grunge typefaces even came about—gritty and raw-looking text.
The 2000s
The 2000s began an entirely new frontier for graphic designers. In addition to tools becoming even more powerful, people were suddenly designing on portable devices, such as smartphones. On top of that, designers began to realize the importance of designing in a way that looked good across all device types.
Movement became more of a focus, with designers looking for ways to make even static logos look like they’re in motion.
One example of a logo that appears to almost be in motion is the AT&T logo of a globe. Because of the mix of blue and white along with the angles of the logo, one can imagine that the image is spinning slowly just as the earth does. They debuted the logo in 2005.
Recent Changes
There isn’t one method that dominates graphic design today, but a mix of design techniques and styles. Trends emerge from year to year—and sometimes month to month. In 2017, the use of cutout text that meshed with strong images allowed designers to create unique looks for websites and logos.
Other trends included flat icons and the addition of videos across marketing channels. Websites need to be mobile responsive more than ever before, so simplicity is the order of the day, along with speeding up overall rendering. Print advertising meshes with mobile devices, bringing a new experience to users that is more immersive.
Evolution of Graphic Design
Where graphic design will go in the future is anyone’s guess, but the user experience is sure to remain at the forefront. Designs will become more personalized and more interactive over time. One example of this type of technology and personalization appears at Walt Disney World in Orlando. As riders stroll past digital posters, a sensor picks up the signal from a magic pass armband, and the guest’s name comes up on the poster, welcoming them.
Regardless of where design goes next, expect to see increasingly more personalized designs that enhance user experience in your daily life.
The working of the computer on the input according to the program is called_______.
Answer:
input program
Explanation:
Need help Plz i have only 20 min
Answer:
1. tripod
2.srry i don't know
3. true
4. sorry i don't know
5. prob true
Answer:
Tripod
2. The pixel
3. True
4. Goo_____gle Slides
5. True
HOW TO CHANGE GRADE IN SKYWARD!!
This is a way to change your grades in skyward to show your parents that you have straight A's!!
Firs go to your gradebook, then tap with two fingers on the grade you want to change then locate where it says the grade and click it until you can delete in, put in the grade you want and BOOM
Answer:
Thank you!
Explanation:
TYTYTY!
private void finishMap()
{
move();
turnLeft();
move();
move();
move();
takeBall();
takeBall();
turnLeft();
turnLeft();
move();
move();
move();
turnLeft();
}
}
for codeHS 1.5.5 mario karel what am i doing wrong?
Answer:
Where can I find Codehs answers?
You can view the solution for an assignment in multiple ways: Through the Assignments page.
...
To view solutions from the Assignments page:
Navigate to the Assignments page.
Click the '...' next to the assignment you wish to view the solution for.
Choose Solution and another page will open with the solution reference.
What are megapixels?
A. the size of an image captured by a camera
B. giant pixels inside the camera
C. a computer store
D. a video game played in a camera
Answer:
A.
Explanation:
A. It's the total number of pixels in an image obtained by multiplying the dimensions (height times width). For large images, this multiplication can be in the millions (=mega), hence the term mega pixels.
Which type of basic building blocks (constructs) is the following algorithm?
Answer:
Sequence
Explanation:
___________ can only be used to create parts that are axisymmetrical.
a.casting
b.turning
c.milling
d.drilling
Explanation:
drilling can only be used to create parts that are axisymmetrical.
please tell me the answer a.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.pleaseeeeeee
Answer:
c.111*1011
Explanation:
because this is the perform fissionable or the binary calculations
mark me brainliest please
Answer:
[tex]11010[/tex]
Explanation:
Number 1 in the decimal system
[tex]1111^2 = 1510[/tex]
Number 2 in the decimal system
[tex]1011^2 = 1110[/tex]
Their sum
[tex]15 + 11 = 26[/tex]
Result in binary form
[tex]26 {}^{10} = {1101}^{2} [/tex]
what is the general term for programs used to operate a computer
Answer: SOFTWARE
Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.
The general term for programs used to operate a computer is "operating system" (OS). An operating system is a software that manages computer hardware and software resources and provides services for computer programs.
It acts as an intermediary between the computer hardware and the user, facilitating the execution of various applications and providing a user-friendly interface. Some popular examples of operating systems include Microsoft Windows, macOS, Linux, and Android.
Android is an open-source operating system designed primarily for mobile devices such as smartphones and tablets. It was developed by the Open Handset Alliance, a consortium of various technology companies. Android is based on the Linux kernel and has become the most widely used mobile operating system globally.
Learn more about software on:
https://brainly.com/question/985406
#SPJ6
How does the internet help you to improve your:
mental health
self esteem
Help you stay mentally active
Help you stay in contact with family
Like why is the internet useful and a good thing
Answer:
Help you mentally active
Explanation:
bcoz we can use internet in good ways
Which type of basic building blocks (constructs) is the following algorithm?
A.Sequence
B.Selection
C.Iteration
D.Iteration and Sequence
The type of basic building blocks (constructs) used in the above algorithm is: A. Sequence.
An algorithm can be defined as a standard formula (procedures) which comprises a set of finite steps or instructions, that is typically used for solving a problem on a computer.
Basically, there are three (3) basic building blocks (constructs) used in an algorithm and these include:
I. Iteration.
II. Sequence.
III. Selection.
Selection is a building block (construct) that is used to determine the set of instruction or step to execute in a program based on a Boolean expression such as:
True or False.Yes or NO.If the conditional test (grade > 50) is True (Yes), a part of the program is executed, which is to output a "Pass."
Otherwise, the program would execute and output a "Fail" i.e the conditional test (grade > 50) is False (No).
Read more: https://brainly.com/question/21172316
pls help me with this coding/computer science question !!
Answer:
what is the question? I don't see it
which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
Answer:
device drivers
Explanation:
Why do reviewers consider the context of a work?
A. To analyze whether or not the public will like the work
B. To pick chart all the content presented in the work
C. To research its original purpose and historical background
D. To take notice of one's physical reaction to a media piece
Answer:
I think the answer is C.
Explanation:
Please helpp:)
To save your HTML document you should save it as
.html
Or
.txt
Answer:
.html
Explanation:
How can I use HTML to express a personal value
Answer: Order list
Explanation:
We can use HTML to express a personal value as a order list of some of our personal feelings.
What is HTML?HTML stands for Hyper Text Markup Language. It is defined as the preferred markup language for texts intended for web browser display. HTML is the name of the language that describes how Web pages are organized. HTML allows authors to publish documents with headings, text, tables, lists, graphics, etc. online. Utilizing hypertext links, you can instantly access internet content by clicking a button.
You must assess the major facets of life, including the environment, job, enjoyment, romance, personal development, money, health, friends, and family, in order to develop a strong personal value system. Consider the significance of each area of your life, and then consider how fulfilled you currently feel in each area.
Thus, we can use HTML to express a personal value as a order list of some of our personal feelings.
To learn more about HTML, refer to the link below:
https://brainly.com/question/24065854
#SPJ2
y aren't nobody helping me out
AND GIVE ME A GOOD EXPLANATION PLEASE I REALLY NEED THIS I DONT WANT ZERO IT DUE TOMORROW
Explanation:
So choose a software. Let's say you choose some sort of browser. What is required do install it? And then for the second part, you specify the operating system. then you show images, logos and the user interface of the software (like what it looks like).
hope this helps!
(sorry, i wrote a lot more but for some reason it wouldnt let me upload it, i hope this works)
Answer + Explanation:
Software 1: Python
Python is a high - level programming language, in which many programmers use to build apps, databases and programs. This piece of software is free, and it only needs a small capacity of RAM (Random Access Memory), about 2GB. This programming language is one of the best, and it will run on any operating system, whether it be MacOS, Android or even Linux (Chrome OS)!
Software 2: Kodu Game Lab
Kodu Game Lab is a 3D game building environment that was designed for students of all ages to use. Although this software is the best that you could get, you need a huge amount RAM, about 4GB, if you want the program to run smoothly. Also, you cannot run or install this software in any other operating system other that Windows 10+ or possible MacOS.
Software 3: Davinci Resolve
Davinci Resolve is a professional video editor, and while professional video producers or photographers use it, it is not compatible with ChromeOS or Windows. It is only available on MacOS. Also, in addition to that, you need a large amount of VRAM, 10-20GB for the best, 6 - 8K.
Software 4: Unity
Unity is by far the best game maker. This is easily usable to professionals as there are a variety of different tools you can use. However, such a good software doesn't come free. If you want the pro version, your looking at about $150 / £109 every month. Also, you can only operate this software on MacOS and Windows.
Software 5: Maya
This is the best 3D editing software you could install, with a costly price. You are looking at £246 every month. You could insure a car for less than that! Also, this will only run on MacOS, and if you do want to operate this, you want your system to have an AMD64 and 9GB RAM. That is a lot for just one software to run!
Types of Hazards Mitigation Measures
A. Biological
1. Wear disposable clean gloves in
handling body substances.
2.
3.
B. Physical
1.
2.
3.
C. Chemical
1.
2.
3.
D. Ergonomic
1.
2.
3.
E. Psychological
1.
2.
3.
Answer:
auto mechanics
Explanation:
keeps dirt and grease off hands
Help please! i don’t know how to do this.
H2 should be:
-Blue
-Times New Roman or Arial
-Align to the right
2. Strong should be:
-Teal
-32pt
-Boldness of 700
3. P should be:
-All in uppercase
-Overlined
-Word space of 10em
Answer:
Make sure to create and link a css file with the following:
<link rel="stylesheet" href="./styles.css">
In your css file, enter these styles:
h2 {
color: blue;
font-family: 'Times New Roman', Times, serif;
text-align: right;
}
strong {
color: teal;
font-size: 32pt;
font-weight: 700;
}
p {
text-transform: uppercase;
text-decoration: overline;
word-spacing: 10em;
}
Explanation:
In order for the html file to know where your styles are located, you have to link it to the css file with the code given above. In this file, you will enter some css to change the styles of the elements you have created in your html file.
To alter the style of an element, you first have to enter the name of the element itself, its class or its id. In this case, we have used the element itself, meaning that all the same elements in the html file will have the same style. The styles you wish to use are entered in between the curly brackets.
In your specific problem, we are trying to change the h2, strong and p elements, so that is what we have done. For the h2, you wanted it blue, therefore we use the color property to change the color. For the font, we use the font-family and finally we use text-align to align it to the right. The same pretty much applies for the other two elements. Your strong element needs to be teal,32pt and 700 bold. Therefore we use the color, font-size and font-weight properties respectively. And finally for the p element, we will use the text-transform, text-decoration and word-spacing properties respectively.
When you dont know the name of the property you want to change, I suggest googling it. You will definitely find the property name you are looking for. W3schools.com is a good source to use.
what to do if you forgot your locked notes password
Answer:
what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.
i hope this helps :D