Yellow and blue light are projected on a white screen. what color will the screen appear to be?

Answers

Answer 1
 On the color wheel, the secondary colors are located between the colors they are made from. The six tertiary colors (red-orange, red-violet, yellow-green, yellow-orange, blue-green and blue-violet) are made by mixing a primary color with an adjacent secondary color
Answer 2

Answer:

Thermal energy will flow from the

⇒ computer  to the

⇒ person .

Explanation:

i just did it


Related Questions

The ____________ method can be used to convert a string to an int.

Answers

parseInt()





----------------------------

Which of the following lines of distribution best describes the diagram?

A: retail distribution
B: direct distribution
C: distribution by agents or brokers
D: wholesale distribution

Answers

A) retail distribution.

Answer

retail distribution

Explanation

Retail distribution is the process or path that a manufactured good takes to reach its intended consumer. Manufacturers employ different retail distribution strategies for the purposes of interacting with customers.Sometimes the distribution channel is direct, such as when a consumer purchases a product directly from company without involving any intermediary.

_____ rows indicate that there is different formatting for odd and even rows.

Answers

Banded rows indicate that there are different formatting for odd and even rows.

What coding scheme is used by most microcomputers?

Answers

The answer to your question is ISYS

The android operating system is used by many popular tablet computers. which tablet does not use the android operating system

Answers

Apple Ipad and Microsoft Tablets.

Which is the largest of the four information technology pathways?

Answers

information support and services

Answer:

Information support and services

Explanation:Apex

You try to enter your name into a cell that accepts a numeric value. What error would you receive

Answers

A. #NAME

B. #VALUE

C. #REF

D. #####

E. #DIV


#VALUE on plato

your answer is B. #VALUE

Which type of encryption is the most popular form of e-mail encryption?

Answers

Public Key Cryptography is the most popular form of encryption in emails. This type of encryption utilizes "keys" only known to the owner of the set of data. 

If your role model is from the same neighborhood as you or has the same ethnic background, _____.

Answers

your role model probably faced some of the same challenges as you will face
during your career

a. True
b. False: the arguments in a module call and the parameters listed in the module header must be of compatible data types.

Answers

True ? They have to be of the same type, comatible isn't absolute enough. But I may be overthinking it.

Which of the following best describes a situation where software should be upgraded or replaced ?

Answers

It should be a 6-year computer that needs a new cPU to run latest video software.  Usually when software can't run, the computer needs an upgrade.  The other three options would be replace.  The first obviously needs to be replaced.  The second would cost too much to upgrade, and would be more logical to replace if you're only needing an extra 25% cost for a brand new computer than an upgrade. The last one needs more RAM upgraded, but it's not a software issue or a software upgrade.  It would be a RAM upgrade

Shoutout to @Dogmama89 

Have an amazing day!

Answer:

d

Explanation:

If using the md5 hashing algorithm, what is the length to which each message is padded?
a. 32 bits
b. 64 bits
c. 128 bits
d. 512 bits

Answers

If using the MD5 hashing algorithm, the length to which each message is padded 512 bits.

Answer: (d.) 512 bits.

MD5 stands for Message Digest 5. It is a hashing algorithm that is case sensitive.  It is a cryptographic hash values.

Lara sees her colleague taking a bribe from a customer. What should she do?

Answers

She should report it to the superviser

She should gather evidence and tell a trusted supervisor.

which type of website would a business selling merchandise on the internet use? A person B information C commercial D social

Answers

I think it's C, commercial.

The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.

Answers

Those are your good ol' peripherals.

The input/output units are the devices that allow a computer system to communicate and interact with the outside world, as well as store information.

What are input-output units?

Equipment that inserts data into or extracts data from communication, computer, automatic data processing, information, or control systems, such as a terminal, channel, port, computer, storage unit, buffer, communications network, front-end processor, link, or loop.

The devices that enable a computer system to interface and communicate with the outside world as well as permanently retain information are known as input/output (i/o) units.

A computer input unit is a piece of hardware used to deliver control and data signals to a data processing system, which may include a computer or other information device.

Therefore, the equipment that enables a computer system to interface and communicates with the outside world, as well as store data, are known as input/output units.

To learn more about input-output units, refer to the link:

https://brainly.com/question/3033646

#SPJ5


Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and then average the digits. You must use a while loop and % to access each of the individual digits. Use / to reduce the number so that you can average all of the digits.
Example: num = 123 can be taken apart with tempNum = 123 % 10 (which will pull off the 3), then tempNum = tempNum / 10 (will result in 12). Do this in a loop while the number is > 0.

Sample Data :
234
10000
111
9005
84645
8547
123456789


 Be sure to include print statements that will format the output as below.

Sample Output :
234 has a digit average of 3.0

10000 has a digit average of 0.2

111 has a digit average of 1.0

9005 has a digit average of 3.5

84645 has a digit average of 5.4

8547 has a digit average of 6.0

123456789 has a digit average of 5.0

Answers

For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
Here is my solution:

import java.lang.System.*;

public class DigiMath {   

private static int countDigits(int number)
{
       int sum = 0;
       while(number > 0)
       {
           sum ++;
           number /= 10;
       }       return sum;   
}

private static int sumDigits(int number)   
{       
      int sum = 0;       
      while(number > 0) {
           sum += number % 10;
           number /= 10;
       }
       return sum;
}
   
   public static double averageDigits( int number )
   {
       int count = countDigits(number);
       if (count > 0) {
           return (double)sumDigits(number) / (double)count;      
       } else { 
            return 0; 
       } 
   }
   
   public static void PrintDigitAverage(int number)
   {
       System.out.printf("%d has a digit average of %1.1f\n", number, averageDigits(number));
   }
   
   public static void main(String[] args) 
   {
       // Method tests (run with java -ea)
       assert countDigits(12345) == 5 : "countDigits returns wrong count";
       assert sumDigits(12345) == 15 : "sumDigits returns wrong sum";
       assert averageDigits(12345) == 3.0: "averageDigits returns wrong average";

        PrintDigitAverage(234);
        PrintDigitAverage(10000); 
        PrintDigitAverage(111); 
        PrintDigitAverage(9005); 
        PrintDigitAverage(84645); 
        PrintDigitAverage(8547); 
        PrintDigitAverage(123456789);
   }
}


You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice that the board has four dimm slots

Answers

The three yellow slots probably indicate triple channeling, which means the board uses DDR3 DIMMs. To know for sure, remove a DIMM and look for the position of the notch on the DIMM.

In normal view, powerpoint's ________ contains buttons such as notes, comments, and view.

Answers

In normal view, powerpoint's status bar contains buttons such as notes, comments, and view. Status bar is located at the bottom of the PowerPoint application window, and it is needed to show both all the information about the document and user's ability to change the settings of a presentation. Status bar includes such specific items as : zoom control, slide number, comments and note pane buttons and view control.

A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.

Answers

local






----------------------------------------------------

You have a new web app and the host for it is going to provide storage for your data on their server. what is this called

Answers

The answer is Cloud storage. When a host provides storage space for your data on their servers it is called Cloud storage. Cloud storage is known as a cloud computing model wherein thousands of data is stored on different remote servers, which can be accessed from the internet itself.

_____ memory uses the hard drive to substitute for ram.

Answers

Virtual memory uses...

Answer:

Virtual memory

Explanation:

The RAM is the main/primary memory of the computer because its data is easily accessible when needed by the computer while the hard drive/hard disk is the secondary memory/permanent memory of the system.

The Virtual memory is a memory management capability of a system that allows the transfer of data from the main memory which is the Ram to a secondary memory like the hard drive. this is mostly done when the Ram is running low on space and probably slowing the system down.

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?

Answers

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield? A coaxial cable.

Final answer:

A coaxial cable is described, featuring a center core surrounded by an insulating spacer and a braided metal shield to reduce electronic noise, commonly used in audiovisual connections.

Explanation:

The type of cable described is known as a coaxial cable. It consists of a center core inner conductor typically made of copper, which is surrounded by a dielectric insulating spacer material. This assembly is then protected by a braided metal shield or outer conductor, which can help guard against electromagnetic interference (EMI). The entire cable is often encased in an insulating jacket. Coaxial cables, such as the RG-59, are popular in applications requiring the reduction of electronic noise like cable TV or audiovisual connections in homes and businesses.

The default dfs namespace mode is windows server 2008, which supports up to 50,000 folders. how many folders does using non-windows server 2008 provide?

Answers

35 millions folders windows servers

Which does an icon on the desktop signify?

A.a program

B.a file

C.a folder

D.all of these

Answers

I believe that the answer is D. 
On a desktop the icons for files, programs and folders can all be present.

Which tool captures the passwords that pass through a network adapter, displays them on the screen instantly, and is used to recover lost web/ftp/e-mail passwords?

Answers

Asterisk Logger would be one of the tools

Simon is trying to figure out how much it will cost to buy 30 cases of water for a school picnic. How much will Simon pay for 30 cases of water?

Answers

it depends on price, brand, number of bottles per case, and number of fluid ounces per bottle.

(price per bottle x number of bottles per case) x 30

Answer:

answer is d

Explanation:

If a business wanted to play an artist’s song in the background of their website, it must first consider the _____ of the music to ensure no laws are being broken.

Answers

no copyright laws being broken. the answer is copy right.

Answer:

copyright

Explanation:

Copyright is the set of national and international legal principles and norms that protect the creation of intellectual works by human beings.

There are two traditional legal conceptions of intellectual property: disseminated in the area of ​​influence of Anglo-American law and copyright, prevailing in the area of ​​influence of Latin law. In addition, there is now another conception, of a universal nature, free licenses, which some call "copyleft". And there is also the public domain. The first two have their origin in the monopolies that the monarchs granted to the authors to stimulate intellectual creation, and coincide in protecting the rights of the authors by granting them the power to exclude all other people from the use of the works, except the simple and individual reading, visualization, listening.

How to change the indent of the list item "regular" on slide 2 to .5 inches in powerpoint?

Answers

Final answer:

To change the indent of a list item in PowerPoint, select the item, go to the Paragraph section under the Home tab, open the Paragraph settings, and adjust the indentation to 0.5 inches.

Explanation:

To change the indent of the list item "regular" on slide 2 to .5 inches in PowerPoint, follow these steps:

Navigate to slide 2 in your PowerPoint presentation.Click on the text box containing the list item "regular".Select the list item or items you want to change.Under the Home tab, find the Paragraph group.Click on the dialog box launcher (small arrow in the bottom-right corner) in the Paragraph group to open the Paragraph settings.In the Indentation section, find the 'Left' or 'Before text' option.Enter 0.5 inches in the field or use the up and down arrows to adjust the setting.If you want a hanging indent (where the first line starts at the left margin and subsequent lines are indented), under 'Special', select 'Hanging' and ensure the setting is 0.5 inches.Click 'OK' to apply the changes.

This will set the indent of the list item "regular" to 0.5 inches from the left margin on the selected slide.

Final answer:

To change the indent of a list item to 0.5 inches in PowerPoint, select the desired list item, use the ruler to drag the indent marker or access the paragraph settings to manually adjust the left indentation.

Explanation:

To change the indent of a list item to 0.5 inches in PowerPoint on slide 2, go to the slide where your list is located. Select the list item labeled "regular" that you want to change. Then, on the ruler at the top of the slide, drag the appropriate indent marker to the 0.5-inch mark on the ruler. If the ruler is not visible, you can enable it through the 'View' tab by clicking on 'Ruler'. Alternatively, you can right-click on the selected list item, choose 'Paragraph' from the context menu, and then adjust the indentation settings in the dialog box that appears by setting the 'Left' indentation to 0.5 inches.

What is the name of a coding scheme that assigns a specific numeric code to each character on your keyboard?

Answers

python is the answer to your question

In the dns naming convention, what character(s) separate(s) a domain name from its subdomains?

Answers

In the dns naming convention, the domain name separates the sub-domains by "DOT" (.) character.

DNS or Domain Name System is written in a conventional method as Host. Domain. Root. This system allows only 255 characters while naming a domain that also includes the spaces in between. Sub-domain is the part of a large domain.
Other Questions
Imagine you are a student in a colonial town. Write three journal entries that describe a typical day in school. Is "the box of toys has been tipped over, but the children will pick it up" a compound sentence Identify the macronutrient that adds flavor and satisfies the appetite. In a flock of black and white sheep, 2 out of 5 sheep are white. If there are 8 more black sheep than white sheep, how many sheep are in the flock? Precision testing does fluid testing for several local hospitals. consider their urine testing process. each sample requires 12 seconds to test, but after 300 samples, the equipment must be recalibrated. no samples can be tested during the recalibration process and that process takes 30 minutes. what is the maximum capacity (samples/hour) of the process to test urine samples? A woman arrives at the prenatal clinic and is accompanied by her partner. which behaviors would be suggestive of intimate partner violence (ipv) 4/5(2x+5)4=1x = 1 1/4x = 1 2/5x = 5/8x = 3 1/5 People are discouraged from taking amino acid supplements but are not often told to watch the level of protein that they take in from foods. this is due to the phenomenon that Which of the following would be considered a disadvantage of using newer technology instead of using traditional graphic design tools?A. Completing a project much fasterB. Expense of the specialized programs used to complete the processC. Fewer people need to finish the designD. Large number of design option to choose fromWill pick Brainliest for help!! During which stage of the listening process would you research a speakers topic?A: taking notesB: preparationC: active involvementD: evaluation Why did 20th-century psychologists study the subconscious? A.Because they had learned everything that studies of consciousness could teach B.Because they thought the subconscious could explain human behavior C.Because they often made forays into literature and literary criticism D.Because new ideas from Asia highlighted the importance of the subconscious how many atoms of oxygen are contained in 47.6g of Al2(CO3)3? The molar mass of Al2(CO3)3 is 233.99g/mol. The word "blanket" has _____ phoneme(s) and _____ morpheme(s). A sales representative earns a 2.5% commission on sales. Find the commission earned when the total sales are $80,700. A one compartment vertical file is to be constructed by bending the long side of an 8 in 8in. by 10 10 in. sheet of plastic along two lines to form a U shape. How tall should the file be to maximize the volume that it can hold? Choose the word or phrase that best matches the word in italics. 1. The trumpet player was rebuked for missing the band rehearsal. (rebuked is in italics) a. praised b. scolded c. insulted d. discharged What is the value of the expression?5/6(1/83/4)Enter your answer, as a fraction in simplest form, in the box The main reason why the constitution was eventually ratified by the states was Complete the sentence: Necesito ________ qu har maana.select one:comerpensarcocinarcreer In a study of education in the united states, __________ would look at the role the schools play in maintaining the social system as a whole; how education provides the young with skills they need later in life; and how education transmits cultural values from one generation to the next Steam Workshop Downloader