No - it was a rumour that started when the film was having its 50th anniversary in 1989
helppppppppppp pleaseee
Answer:
3. Multimedia Projectors
Explanation:
Ive had this quiz before lol
Answer:
c
Explanation:
its c
Why do we collect feedback on the code we write?
Answer:
to improve our code
Explanation:
"To improve our code" we collect feedback on the code we write.
Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.
Thus the above answer i.e., "option a" is correct.
Learn more about feedback here:
https://brainly.com/question/1603365
Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False
Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.
Automated deploymentAutomated deployment provides the ability to move your software between testing and production environments by using automated processes.
In other words, it allows organizations to release new features faster and more frequently.
Automated deployment allows faster approach to development, production and deployment.
learn more on automated deployment: https://brainly.com/question/17052494
#SPJ2
Why is the Game Design Document called a ""living"" document AND why is this important?
Answer:
documentation
Explanation:
Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important
a _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
Answer:
(WAN) a wide area network
why is a fragmented disk slower than one that is defragmented?
Answer:
Explanation:
The fragmented program has parts stored all over the hard driven. The computer has to keep on checking for where the next fragment is. All if this takes time especially if the program that you are trying to load is very large.
If the sectors for a program are consecutive, that makes loading a whole lot easier.
computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
cui documents must be reviewed to which procedures before destruction?
Answer:
Documents containing CUI must be destroyed by shredding..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
The procedure before the destruction of the CUI document will be Records Management.
What is the CUI documents procedure?Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.
Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.
To acquire regulatory advice for records management and destruction processes, go to the course resources.
The CUI document must be reviewed to which procedures before destruction by Records Management.
More about the CUI documents procedure link is given below.
https://brainly.com/question/29871876
#SPJ12
An advantage of a private home network is that is typically more secure than public Wi-Fi.
Answer:
yes it's true
Explanation:
please mark brainiest
Answer:
I agree on that.
Explanation:
Of course you can use a vpn to encrypt your data being sent to router but it is easier to just connect to a private network.
Hope this help please give the brainliest award would be much appreciated.
Which device do you think is the most important in the development of human civilization
Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.
Explanation:
Your welcome :)
what guidance identifies federal information security controls?
Answer:
FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.
What is Personally Identifiable statistics?Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.
The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.
Read more about the security :
https://brainly.com/question/26260220
#SPJ2
figures and tables are always accompanied by legends or captions located ________ figures and ________ tables.
Captions are texts that provide the description of a figure or a table.
Complete the blanks using: below and above
When adding captions to an object, the location of the caption is as important as the caption itself.
The location of the caption for the objects of word documents are:
Images - Caption are placed below imagesFigures- Caption are placed below figuresTables- Caption are placed above tablesHence, the complete text is:
figures and tables are always accompanied by legends or captions located ____below____ figures and ___above_____ tables.
Read more about captions of figures and tables at:
https://brainly.com/question/18710734
are special characters usually found on the keyboard?
Answer:
No
Explanation:
When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.
Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capacity are required?​
Answer:
You could use three 1 GB modules.
only cool people answer this question.
are you cool?
Answer:
Yes
Explanation:
I like frogs
Answer:
always been coolswag
an error occurred while loading a higher quality version of this video
Answer:?
Explanation:?
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
1. A means of giving credit to a source when their information is used.
A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi
3. A device that translates analog carrier signals to encode and decode digital information.
A) USB
B) Computer Virus
C) Intranet
D) Modem
4. A virus or Trojan horse designed to cause harm to computer or device.
A) Hardware
B) Malware
C) Modem
D) Antivirus Application
5. Software that is used to detect and eliminate computer viruses.
A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser
6. Transmits data through a cable television network as a means to connect a computer to the internet.
A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB
7. An application used to access websites on the internet.
A) Malware
B) Internet
C) Proprietary
D) Browser
8. Communication that does not happen in real time.
A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware
9. A network of computers that provides access to information on the web.
A) Phishing
B) Internet
C) Antivirus Application
D) Modem
10. The cable used to connect computers in a network.
A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware
Easy Peasy Lemon Squeezy
1. A means of giving credit to a source when their information is used.
A.) Citation
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
B.) Phishing
3. A device that translates analog carrier signals to encode and decode digital information.
D.) Modem
4. A virus or Trojan horse designed to cause harm to computer or device
B.) Malware
5. Software that is used to detect and eliminate computer viruses.
C.) Antivirus Application
6. Transmits data through a cable television network as a means to connect a computer to the internet.
B.) Cable Internet
7. An application used to access websites on the internet.
D.) Browser
8. Communication that does not happen in real time.
A.) Asynchronous Communication
9. A network of computers that provides access to information on the web.
B.) Internet
10. The cable used to connect computers in a network.
B) Ethernet Cable
Answer:
your mom
Explanation:
____ is the state of not sharing information with or being observed by others.
Answer:
Privacy(guessed ,not really sure about it).
based on mla guidelines, what is the correct margin width?
Answer:
Leave 1 inch margins on each side.
What is the difference between a filter and a Search Folder?
*manually & *on demand
Answer:
manually and on demand is correct
Explanation:
How would you rate your prior knowledge or comfort level with the topic of technology applications?
A.
I am a technology application expert.
B.
I know a lot, but not everything about technology applications.
C.
I know a few things about technology applications.
D.
I am not familiar at all with technology applications.
Answer:
A
Explanation:
I know cyber security and Javascript and also a framework called svelte to create websites.
Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly
Answer:
it already has an answer and it's right so i don't see the point to needing to answer this
2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.
Answer:
ok.... ..............
it refers to the kind of activity that you are going to perform or methods of training to used
A.type
B.frequency
C.intensity
D.time
please help
in two to three sentences describe how you would divide a page into two columns.
Follow the steps outlined:-
Highlight the text you wish to split into columns.
Select the “Page Layout” tab.
Choose “Columns” then select the type of columns you wish to apply. One. Two. Three. Left. Right.
what must you ensure if your work involves the use of different types of smart card security tokens
Answer:
Avoid a potential security violation by using the appropriate token for each system.
what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
Answer:
Proprietary Software
Explanation:
Does anyone know how to write this right? This is for a coding class and I’m super confused on it.
First activity:
1. Declare three variables: firstSnack,
second Snack, and thirdSnack.
Assign the name of a snack (as a string)
to each variable.
2. Declare another variable and call it
bestSnack.
Assign a value to bestSnack USING THE
NAME OF ONE OF THE ABOVE VARIABLES.
Do not use a string directly.
3. Now, change your mind! Reassign the value
of bestSnack, again using the variable name,
not the string. (THIS SHOULD BE DONE ON
A NEW LINE)
Second activity:
4. Declare three variables and give them the names of three common grocery items. Assign to each variable a NUMBER value approximately its price. Don’t use $ sign, just the actual number.
5. Declare another variable, name it total, and assign to it the SUM of the three other variables, contain. Hint - you’ll need to use an arithmetic operator to do this.
Answer:
This is using c++ syntax, you might need to make slight adjustment for other languages.
First activity:
string firstSnack = "chips";
string secondSnack = "pizza";
string thirdSnack = "apples";
string bestSnack = firstSnack;
bestSnack = secondSnack;
Second activity:
double apple = 0.5;
double banana = 0.75;
double orange = 1.43;
double total = apple + banana + orange;
Explanation:
When first declaring a variable, you want to specify the type (such as int, double, string, bool, etc.) and then the name. You can set the variable value in the declaration, or you can set it to a value later in the program by not having the equals sign and whatever comes next.
coding word scramble
ICOAIPAPLTSN- a software program for end users
AADT- processed information
RAAEHWRD- physical parts of computer system
MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible
The decoded words for the coding word are:
ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - ProgrammingWhat is coding words?In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.
Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.
Read more about coding here:
https://brainly.com/question/26134656
#SPJ3
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2
Answer:
import java.io.*;
public class Main {
public static void main(String[] args) throws IOException {
BufferedReader in = new BufferedReader(new InputStreamReader(System.in));
String s;
while ((s = in.readLine()) != null) {
int total = 0;
for (char character : s.toCharArray()) {
if (s.charAt(0) == character) {
total++;
}
}
System.out.println(total - 1);
}
}
}
Explanation:
We start the program by using the BufferedReader which will allow input from the user.
Then, we create a variable String that will take the input from the user.
Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.
For this, I initialized an integer variable total, that takes count every time the character is found.
Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.
If the condition is true, then the total will increment by one.
But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.
Without specifying total - 1, "n Monday" will output 2 since there are two total "n".
There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.
For that, before the for each statement, simply add s = s.toLowerCase();