convolutional neural networks can perform various types of transformation (rotations or scaling) in an input, is this statement ture or false

Answers

Answer 1

This claim is untrue due to information. Because the neural network cannot accomplish it on its own, preprocessing steps (viz. rotation, scaling) are required before you submit the data to the neural network.

What does a computer network mean?

Network is the term for a network of linked devices that may communicate and share services. These linked devices communicate data via radio or physical technologies to use a set of instructions known called internet protocols. Here are some frequently asked concerns about computer networking.

What's a networking what does that do?

The goal of a computer network is to transfer, exchange, or share information and services between two or so more computers connected together by WiFi or wires (wired).

To know more about Networks visit:

https://brainly.com/question/28342757

#SPJ4


Related Questions

python

how do I fix this error I am getting

code:

from tkinter import *
expression = ""

def press(num):
global expression
expression = expression + str(num)
equation.set(expression)

def equalpress():
try:
global expression
total = str(eval(expression))
equation.set(total)
expression = ""

except:
equation.set(" error ")
expression = ""

def clear():
global expression
expression = ""
equation.set("")


equation.set("")

if __name__ == "__main__":
gui = Tk()



gui.geometry("270x150")

equation = StringVar()

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)


buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=l, width=7)
buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button4.grid(row=3, column=0)
button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button5.grid(row=3, column=1)
button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button6.grid(row=3, column=2)
button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button7.grid(row=4, column=0)
button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button8.grid(row=4, column=1)
button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button9.grid(row=4, column=2)
button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button0.grid(row=5, column=0)


Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=l, width=7)
Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=l, width=7)
Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=l, width=7)
Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=l, width=7)
Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=l, width=7)
Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=l, width=7)
buttonl.grid(row=6, column=0)

gui.mainloop()

Answers

Answer:

from tkinter import *

expression = ""

def press(num):

global expression

expression = expression + str(num)

equation.set(expression)

def equalpress():

try:

 global expression

 total = str(eval(expression))

 equation.set(total)

 expression = ""

except:

 equation.set(" error ")

 expression = ""

def clear():

global expression

expression = ""

equation.set("")

if __name__ == "__main__":

gui = Tk()

 

equation = StringVar(gui, "")

equation.set("")

gui.geometry("270x150")

expression_field = Entry(gui, textvariable=equation)

expression_field.grid(columnspan=4, ipadx=70)

buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=1, width=7)

buttonl.grid(row=2, column=0)

button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button2.grid(row=2, column=1)

button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(3), height=1, width=7)

button3.grid(row=2, column=2)

button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(4), height=1, width=7)

button4.grid(row=3, column=0)

button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(5), height=1, width=7)

button5.grid(row=3, column=1)

button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(6), height=1, width=7)

button6.grid(row=3, column=2)

button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(7), height=1, width=7)

button7.grid(row=4, column=0)

button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(8), height=1, width=7)

button8.grid(row=4, column=1)

button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(9), height=1, width=7)

button9.grid(row=4, column=2)

button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=1, width=7)

button0.grid(row=5, column=0)

Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=1, width=7)

Add.grid(row=2, column=3)

Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press("-"), height=1, width=7)

Sub.grid(row=3, column=3)

Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=1, width=7)

Div.grid(row=5, column=3)

Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=1, width=7)

Mul.grid(row=4, column=3)

Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=1, width=7)

Equal.grid(row=5, column=2)

Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=1, width=7)

Clear.grid(row=5, column=1)

Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=1, width=7)

Decimal.grid(row=6, column=0)

gui.mainloop()

Explanation:

I fixed several other typos. Your calculator works like a charm!

pythonhow do I fix this error I am gettingcode:from tkinter import *expression = "" def press(num): global

Which statement describes the word "iterative"?
a) Working in cycles where everyone
is involved in making new
versions of the application each
time, then picking the best one at
the end.
b)Working in cycles and building on
previous versions to build an
application through a process of
prototyping, testing, analyzing
and refining.
c)Working in a way to make sure
that the product is perfect the first
time.
d)Working as a team to correct
mistakes that have been made.

Answers

Answer:

a) Working in cycles where everyone

is involved in making new

versions of the application each

time, then picking the best one at

the end.

Explanation:

The statement that best describes the word "iterative" is as follows:

Working in cycles where everyone is involved in making new versions of the application each time, then picking the best one at the end.

Thus, the correct option for this question is A.

What is Iterative?

Iterative may be defined as a verb or verb form that significantly indicates that an action is frequently repeated. Also called frequentative, habitual verb, and iterative activity.

In literature, the poet repeats a word or a phrase at the same point within each stanza (meaning that the iteration is part of the verse form rather than incidental repetition), and this repetition of the same word or phrase produces a point of linkage within the stanza.

But in repetition, the sense is different. So, working in a cycle where everyone is involved in making new versions of the application each time, then picking the best one at the end is the statement that best describes the word iterative.

Therefore, the correct option for this question is A.

To learn more about Iterative, refer to the link:

https://brainly.com/question/26995556

#SPJ2

what is the meaning of .net in computer​

Answers

Answer:

.net is a top-level domain, also known as a TLD. Derived from the word network, it was originally developed for companies involved in networking technology. Today .net is one of the most popular domain names used by companies all over the world to launch their business online.

The term __________ means "no object" in Java.

a. empty
b. null
c. blank
d. clear

Answers

Answer:

I think it's: D. Clear

Explanation:

I think this because "blank" and "empty" are referring to not having anything, yes, but "clear" means to remove an object, or "no object".

Hope this helps!

The answer is ‘null’. The full term is ‘null reference’, and means ‘no object’.

The other terms do not exist in Java.

the purpose of using captcha is toto keep the adversary (bot) away.to train the user.to train the admin.to train the developer.router attack.database attacks.phishing.password cracking.

Answers

The purpose of using CAPTCHA is to keep the adversary (bot) away.

What is CAPTCHA?

CAPTCHA is a program that verifies whether a user is human or not. It is a simple test that is used to avoid spamming and automated hacking attempts. CAPTCHA is short for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHA has become one of the most common ways to ensure online security. The purpose of CAPTCHA is to prevent bots from accessing web applications and websites. It is typically used to protect online forms, logins, and registration pages from automated attempts to create multiple accounts or submit spam. The primary goal of CAPTCHA is to confirm that the user is human, and not a bot. This is done by presenting a challenge that can be easily solved by humans but is difficult or impossible for bots to solve. The answer to the given question is - to keep the adversary (bot) away.

Learn more about Captcha: https://brainly.com/question/28213663

#SPJ11

what will you see on the next line after the following lines of code?
>>> aList = [9, 2, 3.5, 2]
>>> aList.remove(2)
>>> aList
[9, 3.5]
[9, 3.5, 2]
[9, 2, 3.5, 2]

Answers

Answer: I think its A [9, 3.5]

Explanation:

Answer:

[ 9, 3.5, 2]

Explanation:

What are large sets of information that can be analyzed for patterns and trends called?
A. Flowcharts of processes
B. Social networks
C. Data from research
D. Online surveys

Answers

Answer:

Data from research

Explanation:

Answer: Data from research

Explanation: When large sets of information are taken and analyzed to find patterns and trends, this is usually an example of data from conducting research.

How do you finish this code for the word game, hundred words in python?

How do you finish this code for the word game, hundred words in python?

Answers

Using knowledge in computational language in python  it is possible to write a code that the word game, hundred words.

Writting the code:

import random

def get_a_clue():

  clues = ['-a-e', 'y-ll-w', 's-mm-r', 'wi-t-r','s-n-y', 'l-v-','-i-e']

  position = random.randint(0, len(clues)-1)

  clue = clues[position]

  return clue

def check_word_match(clue, guess):

  if len(clue) != len(guess):

           return False

  for i in range (len(clue)):

      if clue[i] != '-' and clue[i ]!= guess[i]:

          return False

  return True

# start the game

word_clue = get_a_clue()

print('Your word clue:', word_clue)

answer = input('What would be the word: ')

is_matched = check_word_match(word_clue, answer)

if is_matched is True:

   print('WOW!!! You win')

else:

   print('Opps! you missed it.')

nums = [12, 56, 34, 71, 23, 17]

len(nums)

len(nums) +1

len(nums) - 1

The answer is: 3

See more about python at brainly.com/question/30427047

#SPJ1

How do you finish this code for the word game, hundred words in python?

A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

Answers

Answer:

See explanation section

Explanation:

See the program at the end of this solution

The program can be sabotaged if the source file is altered before running the program.

Take for instance,

Someone changes

for(int i =k;i<=n;i++)

to

for(int i =3;i<=20;i++)

This implies that no matter the user input, the program will only calculate the sum of 3 to 20

It is also possible that the program is altered by an external process.

Take for instance;

n = 10

k = 1

And the sum has been calculated for the range of k = 1 to 5.

Then the program is altered by an external process.

15 (sum of 1 to 5) will be displayed instead of 55 (sum of 1 to 10)

Program written in C++

#include<iostream>

using namespace std;

int main() {

int k.n,total=0;

cin>>k;

cin>>n;

//Assume k will always be less than n

for(int i =k;i<=n;i++) {

total+=i;

}

System.out.print(total);

return 0;

}

MSW LOGO Screen element which contains
the name of Program.

Answers

MSW LOGO Screen element that contains  the name of Program are:

Main ScreenCommander Window

What is the screen about?

The main screen is known to be called  a Graphic Screen as it is the place to make images or illustrations.

Note that A Commander Window is the place where one can send the turtle commands.

Therefore, MSW LOGO Screen element that contains  the name of Program are:

Main ScreenCommander Window

Learn more about Program from

https://brainly.com/question/1538272

#SPJ1

Deep-Learning vs Machine Learning, differences?

Answers

Answer:

one is in bricks and mortar and the other is on a machine

Explanation:

jk its one is learning threw trial and error and the other is through one set of code that tells it how to to the task one way that makes it have one path

An air purifier manufacturer is looking for ideas on using edge computing to enhance its products and services. which approach would make use of edge computing technologies?

Answers

The approach would make use of edge computing technology is we will be able to provide information on the weather as well if we are aware of the rate and how much it is.

Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Technologies include real things like machinery or utensils as well as intangible ones like software.

Society has changed as a result of numerous technological advances. The earliest known technology is the stone tool, which was employed in the prehistoric era. Next came the use of fire, which aided in the Ice Age development of language and the expansion of the human brain. In the Bronze Age, the wheel was created, allowing for greater travel and the development of more advanced machinery.

To know more about technology click here:

https://brainly.com/question/15059972

#SPJ4

¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en los comentarios ponen "svd". ¿Qué significa?

Answers

Answer:Valor singular de descomposición

Explanation:

How touse the provided registry files to determine the ipv4 address of the system

Answers

The IPv4 address of the system. Please note that modifying the Windows Registry requires caution, as making incorrect changes can adversely affect the system's functionality.

To use the provided registry files to determine the IPv4 address of the system, you can follow these steps:

1. **Accessing the Registry**: Press the Windows key + R on your keyboard to open the "Run" dialog box. Type "regedit" (without quotes) and press Enter. This will open the Windows Registry Editor.

2. **Navigate to the Registry Key**: In the Registry Editor, navigate to the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces

3. **Finding the IPv4 Address**: Under the "Interfaces" key, you will find several subkeys, each representing a network adapter on your system. Expand each subkey and look for the one with values related to IPv4 settings, such as "IPAddress" or "DhcpIPAddress". The corresponding values will display the IPv4 address associated with that network adapter.

4. **Record the IPv4 Address**: Once you have found the appropriate subkey with the IPv4 address values, note down the IP address listed in the "IPAddress" or "DhcpIPAddress" value. This value represents the IPv4 address of the system.

By following these steps, you can use the provided registry files to locate the IPv4 address of the system. Please note that modifying the Windows Registry requires caution, as making incorrect changes can adversely affect the system's functionality.

Learn more about Windows Registry here

https://brainly.com/question/17200113

#SPJ11

write 3 different functions in c to create an array of 10 integers on the heap without causing a memory leak. hint: you will need to assign the address to a pointer that was created outside the function. remember, you can return an address or change what a pointer points to (the contents of a pointer) in a function by passing the pointer by reference or by passing the address of the pointer.

Answers

In order to prevent memory leaks, it is a good idea to write the free() statement right after the malloc() or calloc() method.

What procedure can be applied to prevent a memory leak? In order to prevent memory leaks, it is a good idea to write the free() statement right after the malloc() or calloc() method.To prevent dangling pointers, the free() statement should be followed by assigning NULL to the pointer variable.There are a few causes of memory leaks in C/C++:When the pointer loses its initial allocated value in C/C++ programming, a memory leak typically happens.Due to the allocated object's unavailability and inability to be deallocated, it becomes the source of the memory leak.Memory Leakage Factors.Using Unwanted Object Reference: These are object references that are no longer required.The garbage collector was unable to free up the memory because another object was still making references to the undesired object.Using long-lived static objects causes a memory leak as well.

To learn more about  memory leaks refer

https://brainly.com/question/30052440

#SPJ4

Give five examples of physical networking.

Answers

Answer:

Fully connected Network Topolgy, Common Bus Topolgy, Mesh Network Topolgy, Star Network Topolgy, and Ring Network Topolgy.

Explanation:

Describe the command structure of Cisco IOS software, 

Answers

Cisco IOS software uses a hierarchical command structure. Commands are organized into different modes, and each mode has a set of commands associated with it. Modes are typically accessed by entering a command at the router prompt. For example, the enable mode can be accessed by entering the enable command at the router prompt.

What is Cisco IOS?

The Internetworking Operating System (IOS) is a series of proprietary network operating systems used on numerous Cisco Systems router and network switch models. The system consists of a collection of routing, switching, internetworking, and telephony capabilities that are incorporated into a multitasking operating system. Although the IOS code base includes a cooperative multitasking kernel, most IOS capabilities have been ported to other kernels for usage in Cisco products, such as Linux and QNX. IOS is not supported by all Cisco networking products. Some Cisco Catalyst switches that run IOS XE and Cisco ASR routers that run IOS XE or IOS XR, both of which are Linux-based operating systems, are exceptions. Cisco Nexus switches and Cisco MDS switches both run NX-OS, a Linux-based operating system, in data centre environments.

To learn more about Cisco IOS

https://brainly.com/question/28270325

#SPJ13


Explain in brief why it is important for us to
understand a specific place early society's technology
?

Answers

Understanding a specific place in early society's technology is crucial because it offers insights into human ingenuity, historical development, and cultural evolution.

Early society's technology represents the foundation of human progress. By comprehending how our ancestors adapted to their environment and developed tools, we gain valuable knowledge about their intellectual capabilities and problem-solving skills. This understanding sheds light on the challenges they faced and how they overcame them, shaping their social structures and ways of life.

Furthermore, studying early technology allows us to trace the roots of modern inventions and innovations. Many contemporary technologies have deep historical origins, and recognizing these connections provides context and appreciation for today's advancements.

In conclusion, delving into a specific place in early society's technology enriches our understanding of human history and cultural heritage. It fosters a sense of connection to our past and enables us to learn from the experiences of our ancestors, ultimately influencing our present and guiding our future endeavors

To know more about cultural evolution ,visit:
https://brainly.com/question/32312595
#SPJ11

What is the relationship between a condition and an action?

A. The program creates its own conditions, and lets you choose which action to take.

B. The program performs an action, which changes all conditions.

C. The program checks to see if a condition is met, and if so, it performs an action.

D. The program checks to see if any actions are occurring, then randomly sets a condition.

Answers

The answer is C , The program checks to see if a condition is met and if so it performs an action!

favorite rappers22???​

Answers

There are so many rappers that I love and I can't choose.

And there are K-pop singers who are also good at rap.

___ refers to data stored somewhere other than a computer the person is using.

The options for the blank are:

-internet access
-cloud computing
-deduping
-routing

Answers

Answer:

B: cloud computing

Explanation:

Cloud computing refers to data stored somewhere other than a computer the person is using.

a Python program to process a set of integers, using functions, including a main function. The main function will be set up to take care of the following bulleted items inside a loop:

The integers are entered by the user at the keyboard, one integer at a time

Make a call to a function that checks if the current integer is positive or negative

Make a call to another function that checks if the current integer to see if it's divisible by 2 or not

The above steps are to be repeated, and once an integer equal to 0 is entered, then exit the loop and report each of the counts and sums, one per line, and each along with an appropriate message

NOTE 1: Determining whether the number is positive or negative will be done within a function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if an integer is positive, add that integer to the Positive_sum increment the Positive_count by one If the integer is negative add that integer to the Negative_sum increment the Negative_count by one

NOTE 2: Determining whether the number is divisible by 2 or not will be done within a second function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if the integer is divisible by 2 increment the Divby2_count by one if the integer is not divisible by 2 increment the Not_Divby2_count by on

NOTE 3: It's your responsibility to decide how to set up the bold-faced items under NOTE 1 and NOTE 2. That is, you will decide to set them up as function arguments, or as global variables, etc.

Answers

Here's an example Python program that processes a set of integers entered by the user and determines if each integer is positive/negative and divisible by 2 or not, using functions:

The Python Program

def check_positive_negative(number, positive_sum, positive_count, negative_sum, negative_count):

   if number > 0:

       positive_sum += number

       positive_count += 1

   elif number < 0:

       negative_sum += number

       negative_count += 1

   return positive_sum, positive_count, negative_sum, negative_count

def check_divisible_by_2(number, divby2_count, not_divby2_count):

   if number % 2 == 0:

       divby2_count += 1

   else:

       not_divby2_count += 1

   return divby2_count, not_divby2_count

def main():

   positive_sum = 0

   positive_count = 0

   negative_sum = 0

   negative_count = 0

   divby2_count = 0

   not_divby2_count = 0

   

   while True:

       number = int(input("Enter an integer: "))

       

       positive_sum, positive_count, negative_sum, negative_count = check_positive_negative(

           number, positive_sum, positive_count, negative_sum, negative_count)

       

       divby2_count, not_divby2_count = check_divisible_by_2(number, divby2_count, not_divby2_count)

       

       if number == 0:

           break

   

  print("Positive count:", positive_count)

   print("Positive sum:", positive_sum)

   print("Negative count:", negative_count)

   print("Negative sum:", negative_sum)

   print("Divisible by 2 count:", divby2_count)

   print("Not divisible by 2 count:", not_divby2_count)

if __name__ == "__main__":

   main()

The check_positive_negative() function takes the current integer, and the sum and count of positive and negative integers seen so far, and returns updated values of the positive and negative sums and counts based on whether the current integer is positive or negative.

The check_divisible_by_2() function takes the current integer and the count of numbers seen so far that are divisible by 2 or not, and returns updated counts of numbers divisible by 2 and not divisible by 2.

The main() function initializes the counters for positive and negative integers and for numbers divisible by 2 or not, and then loops indefinitely, prompting the user for integers until a 0 is entered. For each integer entered, it calls the check_positive_negative() and check_divisible_by_2() functions to update the counters appropriately. Once a 0 is entered, it prints out the final counts and sums for positive and negative integers, and for numbers divisible by 2 or not.

Read more about python programs here:

https://brainly.com/question/26497128

#SPJ1

Which of the following protocols will best protect the Confidentiality and Integrity of network communications

Answers

The protocol that will best protect the Confidentiality and Integrity of network communications is Transport Layer Security (TLS).

What is Transport Layer Security (TLS) and how does it ensure the Confidentiality and Integrity of network communications?

Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over a network. It ensures the Confidentiality and Integrity of network communications through the following mechanisms:

Encryption: TLS uses symmetric and asymmetric encryption algorithms to encrypt data transmitted between a client and a server. This ensures that the data remains confidential and cannot be read by unauthorized parties.

Authentication: TLS includes mechanisms for server authentication, where the server presents a digital certificate to the client to prove its identity. This prevents man-in-the-middle attacks and ensures that the client is communicating with the intended server.

Integrity Check: TLS uses message integrity checks, such as the use of hash functions, to ensure that the data has not been tampered with during transmission. This guarantees the integrity of the data and detects any modifications.

Perfect Forward Secrecy: TLS supports Perfect Forward Secrecy (PFS), which ensures that even if a server's private key is compromised, past communications remain secure. PFS generates a unique session key for each session, protecting the confidentiality of the data.

Learn more about Transport Layer Security

brainly.com/question/33340773

#SPJ11

People in which computer science career design and supervise the manufacture and installation of computer systems? Pls, I have till tomorrow.

a
Programmer

b
Hardware engineer

c
User interface designer

d
Cybersecurity analyst

Answers

the answer to this question is b.

Answer:

A) Programmer

Explanation:

People in which computer science career design and supervise the manufacture and installation of computer

Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one from a lesser-known brand. Which questions should she consider before she buys the jacket? Check all that apply. Is advertising influencing her? What are her motivations? Has she compared prices? Is she buying at the right time? Will her sister like the jacket too?

Answers

Is advertising influencing her?
What are her motivations?
Has she compared prices?
Is she buying at the right time?

The questions that she should consider before she buys the jacket are:

Is advertising influencing her?What are her motivations?Has she compared prices?Is she buying at the right time?

What  is buying?

The act of buying an item is known to be acquiring a specific possession, or ownership/ rights to the use that thing or services. This can only be done through payment that is mostly based on the use of money :

Note that before getting something, one must consider other things such as  prices and the reasons for buying the item before one can go ahead to purchase that thing.

Learn more about buying from

https://brainly.com/question/25745683

Which of the following would be the best variable name to store the value of your English letter grade? Python coding
letter_Grade
g
1grade
LG

Answers

Answer:

The answer is "letter_Grade".

Explanation:

In the given question, the first choice "letter_Grade" is correct because it is a descriptive variable, which is used for holding the string value, and the wrong choice can be defined as follows:

In the second and third choice, it is wrong because it is not descriptive.In the fourth choice, it is wrong because it uses a number that is not allowed.

what hyphae connect groups of rhizoids and sporangiophores into a fungal network?

Answers

The hyphae that connect groups of rhizoids and sporangiophores into a fungal network are called mycelium.

What are mycelium ?

Mycelium refers to the dense network of hyphae, which are filamentous structures that make up the body of a fungus. These hyphae extend and branch out, intertwining with one another to form a complex network.

The mycelium acts as the main vegetative body of the fungus and serves various functions, including nutrient absorption, resource distribution, and structural support.

Within the mycelium, specific hyphae connect groups of rhizoids, which are root-like structures responsible for anchoring the fungus and aiding in nutrient absorption from the environment.

Find out more on mycelium at https://brainly.com/question/31797403


#SPJ4

An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?

Answers

The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.

How document be protected?

There are many ways a computer file can be protected. The ways to protect the document are,

Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.

Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.

Learn more about the data protection here;

https://brainly.com/question/4219149

#SPJ2

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

Kent needs to clean his computer keyboard because he was snacking and potato chip crumbs got under the keys. what's the first thing he should do? question 3 options: a. unplug it b. spray it with compressed air c. clean the keys with a vacuum wipe d. the keyboard with rubbing alcohol

Answers

The first thing Kent should do is unplug the keyboard. The first step in cleaning a computer keyboard is to unplug it from its power source.

This is a safety measure to prevent any electrical shock or damage to the keyboard while cleaning it. The next step would be to use a tool, such as compressed air or a vacuum, to remove any debris or crumbs that may have gotten trapped under the keys. After removing any loose debris, a microfiber cloth or wipe dampened with rubbing alcohol can be used to clean the keys and surfaces of the keyboard. It is important to use a gentle touch and not apply too much pressure to avoid damaging the keys or the internal components of the keyboard. Proper cleaning techniques will help maintain the functionality and longevity of the keyboard.

Learn more about keyboard: https://brainly.com/question/24921064

#SPJ4

Other Questions
a. was inspired by irish-american musical traditions b. became immensely popular with old people c. was a foundation of 12-tone music d. was dance music with rhythmic syncopation If current assets are $103,000, property and equipment is $130,000, current liabilities are $61,000, and long-term liabilities are $105,000, the current ratio is A 1.0-cm-diameter pipe widens to 2.0 cm, then narrows to 0.5 cm. liquid flows through the first segment at a speed of 4.0m/s.a. What is the speed in the second segment?b. What is the speed in the third segment?c. What is the volume flow rate through the pipe? a decrease in the average level of prices is called the total market value of all final goods and services produced anually in an economy is called divided there is little we can do; united there is little we cannot do is an example of what is the effect on net income if a company fails to record a purchase in transit (fob shipping point) and also fails to include the purchase in physical inventory? To celebrate the firt day of winter, Lin wa putting ticker on ome of the locker. There are 100 locker along one ide of her middle chool' hallway. She put a nowflake ticker on every 5th locker and a nowman ticker on every 7th locker. What locker number will both ticker be on? the cordova rebellion and the council house fight are both examples of conflicts during the lamar administration that involved how did the design of the articles of confederation reflect american unhappiness with british rule? Whos know stuff about child development? on january 1, year 1, weller company issued bonds with a $415,000 face value, a stated rate of interest of 8%, and a 10-year term to maturity. weller uses the effective interest method to amortize bond discounts and premiums. the market rate of interest on the date of issuance was 6%. interest is paid annually on december 31. assuming weller issued the bond for $450,940, what is the amount of interest expense that will be recognized during year 3? (round your intermediate calculations and final answer to the nearest whole dollar amount.) The congress shall have power_____________ to make all laws which shall be necessary and proper for carrying into execution the foregoing powers, and all other powers vested by this constitution in the government of the united states, or in any department or officer thereof. how did the enzyme amylase affect the digestion of the cracker in part 1? how do these results correlate with where this enzyme occurs in the human body? A firm's marginal cost has a minimum value of $80, its average variable cost has a minimum value of $90, and its average total cost has a minimum value of $100. Then the firm will shut down in the short run once the price of its product falls belowA. $80B. $90C. $100D. $40 true or false? in an access control system, authentication is the process of maintaining records of the actions performed by authorized users. price packs are goods offered either free or at low cost as an incentive to buy a product, such as toys included with disney dvds.o Trueo False Which branch of the us health and human services department focuses on the health and safety of employees? which holiday spirit is incorrectly paired with the country in which it is popular? which of the following is true about a lump-sum tariff? multiple choice foreign firms' marginal cost curves are shifted up by the amount of the lump-sum tariff. foreign firms' average cost curves are shifted up by the amount of the lump-sum tariff. domestic firms' marginal cost curves are shifted up by the amount of the lump-sum tariff. domestic firms' average cost curves are shifted up by the amount of the lump-sum tariff. Triangle ABC ha vertice A(-2, 5), B(1, 0), and C(6,-2). What are the coordinate of the vertice ofAA'B'C' for Ry-axi?