A _____ is a search engine that combines internet technology with traditional library methods of cataloguing and assessing data.
Anti-bullying laws in most states are designed to provide
A. guidelines for appropriate online behavior.
B. reasons for why people bully others online.
C. schools with ways to punish online bullying.
D. advice for preventing online bullying.
Installing an operating system onto a hard drive with no previous os installed is known as
The motherboard is considered the "brain” of a computer because it controls
a computer’s speed.
performs specific tasks.
connects a system’s components.
processes stored information.
Answer:Its connect a system’s components .
Explanation:
took test on edge 2020
Which type of software is created and updated by a worldwide community of programmers and is available for free?
Is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. enterprise network wide area network campus area network local area network value-added network?
Your computer is configured to obtain an ipv4 address and dns server address automatically. you are concerned that the ipv4 routing table is incorrect. what utility will display the ipv4 routing table
Assigning ____ to a field means that no other classes can access the field’s values.
What does API stand for
API stands for "Application programming interface". API (Application Programming Interface) is defined as a computing interface that defines the interaction between multiple software intermediaries.
What is API?API stands for "Application programming interface".
API in computer helps computer technology interact with each other
API (Application Programming Interface) is defined as a computing interface that defines the interaction between multiple software intermediaries.
API key is the specific identifier use authenticate the developer user and call programs for the API.
The API keys often serve as a specific identifier and a secret token for authentication and which usually have a set of access rights to the API associated with it.
It is used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.
Learn more about API here;
https://brainly.com/question/17257153
#SPJ2
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. true or false
Your crt monitor flickers. what should you do
What feature sets Macs apart from other operating systems?
desktop
Finder
mouse
GUI
import java.util.Scanner;
public class Grade
{
public static void main (String[] args)
{
// Declare constants
final double IN_WEIGHT = 0.6; // in-class weight is 60%
final double OUT_WEIGHT = 0.4; // out-of-class weight is 40%
// Declare variables
int preLabPts; //number of points earned on the pre-lab assignment
int preLabMax; //maximum number of points possible for pre-lab
int labPts; //number of poitns earned on the lab
int labMax; //maximum number of points possible for lab
int postLabPts; //number of points earned on the post-lab assignment
int postLabMax; //maximum number of points possible for the post-lab
int outClassAvg; //average on the out of class (pre and post) work
int inClassAvg; //average on the in-class work
double labGrade; //final lab grade
Scanner scan = new Scanner(System.in);
// Get the input
System.out.println("\nWelcome to the Grade Calculator\n");
System.out.print("Enter the number of points you earned on the pre-lab: ");
preLabPts = scan.nextInt();
System.out.print("What was the maximum number of points you could have earned? ");
preLabMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the lab: ");
labPts = scan.nextInt();
System.out.print("What was the maximum number of points for the lab? ");
labMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the post-lab: ");
postLabPts = scan.nextInt();
System.out.print("What was the maximum number of points for the post-lab? ");
postLabMax = scan.nextInt();
System.out.println();
// Calculate the average for the out of class work
outClassAvg = (preLabPts + postLabPts) / (preLabMax + postLabMax) * 100;
// Calculate the average for the in-class work
inClassAvg = labPts / labMax * 100;
// Calculate the weighted average taking 40% of the out-of-class average
// plus 60% of the in-class
labGrade = OUT_WEIGHT * outClassAvg + IN_WEIGHT * inClassAvg;
// Print the results
System.out.println("Your average on out-of-class work is " + outClassAvg + "%");
System.out.println("Your average on in-class work is " + inClassAvg + "%");
System.out.println("Your lab grade is " + labGrade + "%");
System.out.println();
}
}
can anyone help fix this code?
package Hello;
import java.util.Scanner;
public class NewClass1 {
public static void main (String[] args)
{
// Declare constants
final double IN_WEIGHT = 0.6; // in-class weight is 60%
final double OUT_WEIGHT = 0.4; // out-of-class weight is 40%
// Declare variables
int preLabPts; //number of points earned on the pre-lab assignment
int preLabMax; //maximum number of points possible for pre-lab
int labPts; //number of poitns earned on the lab
int labMax; //maximum number of points possible for lab
int postLabPts; //number of points earned on the post-lab assignment
int postLabMax; //maximum number of points possible for the post-lab
int outClassAvg; //average on the out of class (pre and post) work
int inClassAvg; //average on the in-class work
double labGrade; //final lab grade
Scanner scan = new Scanner(System.in);
// Get the input
System.out.println("\nWelcome to the Grade Calculator\n");
System.out.print("Enter the number of points you earned on the pre-lab: ");
preLabPts = scan.nextInt();
System.out.print("What was the maximum number of points you could have earned? ");
preLabMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the lab: ");
labPts = scan.nextInt();
System.out.print("What was the maximum number of points for the lab? ");
labMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the post-lab: ");
postLabPts = scan.nextInt();
System.out.print("What was the maximum number of points for the post-lab? ");
postLabMax = scan.nextInt();
System.out.println();
// Calculate the average for the out of class work
outClassAvg = (preLabPts + postLabPts) / (preLabMax + postLabMax) * 100;
// Calculate the average for the in-class work
inClassAvg = labPts / labMax * 100;
// Calculate the weighted average taking 40% of the out-of-class average
// plus 60% of the in-class
labGrade = OUT_WEIGHT * outClassAvg + IN_WEIGHT * inClassAvg;
// Print the results
System.out.println("Your average on out-of-class work is " + outClassAvg + "%");
System.out.println("Your average on in-class work is " + inClassAvg + "%");
System.out.println("Your lab grade is " + labGrade + "%");
System.out.println();
}
}
What color typically indicates the speaker port on a sound card?
What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?
A(n) ________ device facilitates file sharing and data backup.
Which of the following is important when using technology? A) Governance B) Credentialing C) Ethical conduct D) Preparation
Important factors while using technology are:
A) Governance
B) Credentialing
C) Ethical conduct
D) Preparation
Briefly,
A)
Governance: Governance refers to the establishment of rules, regulations, and policies that guide the appropriate and responsible use of technology.
It involves creating structures and processes to ensure that technology is used in a fair and equitable manner, and that any potential risks or issues are properly managed.
B)
Credentialing: Credentialing involves obtaining and maintaining the necessary qualifications and certifications to use specific technologies or perform certain tasks.
It can include obtaining degrees, certifications, or licenses that demonstrate a person's expertise and competence in using technology effectively and safely.
C)
Ethical conduct: Ethical conduct is crucial when using technology. It involves behaving in a responsible and moral manner, respecting the privacy and rights of others, and using technology for positive purposes.
Ethical conduct includes things like avoiding plagiarism, respecting intellectual property rights, and being mindful of the impact of technology on individuals and society.
D)
Preparation: Preparation is indeed important when using technology. It involves acquiring the necessary knowledge and skills to effectively utilize technology. This can include learning how to operate specific devices, understanding software applications, and staying updated with the latest technological advancements.
Know more about technology,
https://brainly.com/question/9171028
#SPJ6
What does a linear bus topology used to connect all network devices?
Final answer:
A linear bus topology connects all network devices to a single cable backbone. Device B shows a linear, ohmic relationship, meaning it follows Ohm's Law. High voltage is used in power lines to reduce current and therefore minimize line losses over long distances.
Explanation:
A linear bus topology is a network design in which all network devices are connected to a single continuous length of cable, often referred to as the backbone. Each device is directly connected to this backbone through a branching cable. In a scenario where device B displays a linear relationship and is ohmic, it means that the device obeys Ohm's Law, where voltage is directly proportional to the current across a conductor at a constant temperature, resulting in a straight-line graph when voltage is plotted against current.
Furthermore, in electrical power transmission, it is beneficial to use high voltage to reduce currents over long distances due to resistance in the lines. Although the conductors have low resistance, long distance lines can accumulate significant losses. Higher voltage leads to lower current and therefore, reduces line losses, making for more efficient transmission of power over kilometers long distances from the power company.
The internet connects millions of computers connected through millions of ____ worldwide.
The internet connects millions of computers using millions of network links worldwide, which can be either physical or wireless. Devices communicate through agreed protocols, facilitating efficient information sharing. This vast network includes a diverse range of devices and is integral to global communication.
The Internet :.
These network links can be either physical cables, such as undersea cables connecting continents, or wireless connections like Wi-Fi and satellite links.
Devices such as servers, personal computers, and even cars and domestic appliances are part of this vast network, communicating with each other using protocols such as TCP/IP to efficiently share information.
Therefore,
The internet connects millions of computers through millions of network links worldwide.
Powerpoint increased the weight of a line in ____ increments.
What is the name of a popular high-level computer programming and scripting language that is the name of a snake?
When you save a file to the cloud, it means your file was stored _____. Question 1 options: on the internet on your hard drive on your computer's RAM on a flash drive
Answer:
Option a. On the internet
When you save a file to the cloud, it means your file was stored on the internet.
Explanation:
Cloud storage can be defined as the remotely working service model that manages, maintains, backups all the data and make it available to the users over the network all the time.
This means all the data is accessed and modified when needed, without the availability of some specific hardware device. Moreover cloud computing expels the problem of low space on the drive.
Storage on cloud computing is much easier and secure now-a-days and has many advantages including mobility and all time access and fear free environment regarding loosing of data.
i hope it will help you!
What is the main scientific weakness in watson and crick's paper?
Which of the following statements is the least abstraction of the World Wide Web?
A. a bunch of Web pages
B.documents, images, and other data you can access by providing a URL (Web address)
C.the Internet
D.Wikipedia, Facebook, and other cool sites
To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a?
Answer:
Theme
Explanation:
To change the overall design of an entire document to include colors, fonts, and effects, you should apply a theme. Theme comprise of color, fonts and effects.
Cheers.
Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?
a personal naratiation is like a autobiography in that it
A tells your whole life story, from birth to present
B is a story about something in the author life written by the author
C is written in third person
D is a story about a person written by another person
A group of eight bits is called a _______. a. numeric data b. byte c. megabit d. binary
You can block logical ports from invaders and make your computer invisible to others on the internet by installing ________. a firewall a packet sniffer antivirus software a packet filter
Can't expand stack segment by 8 bytes to 524288 bytes.
Final answer:
The message “Can’t expand stack segment by 8 bytes to 524288 bytes” suggests a stack overflow issue in a program that has reached the maximum size limit for the stack memory allocated by the operating system.
Explanation:
In the context of programming and software development, encountering an error message such as “Can’t expand stack segment by 8 bytes to 524288 bytes” usually indicates that the program is attempting to use more stack memory than is allowed. The stack is a region of memory used for the temporary storage of variables, return addresses, and for managing function calls. This type of error is often termed a stack overflow, which occurs when there is an attempt to push more onto the stack than it can handle. This could be due to excessive or infinite recursion, allocating too much space for variables on the stack, or a lack of proper memory management in the code. To resolve this issue, a programmer would need to review the code for functions that may be using excessive stack space, and modify the code to use the stack more efficiently or allocate memory on the heap instead.