(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer 1

Answer:

000000000000000000000000000001111111111111111111


Related Questions

What should Iris obtain from the client in order to display the work in her portfolio?

Answers

Answer:

depends on the laws of the country in which you are working

Explanation:

This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.

Data bars are a form of ________.

data input
conditional formatting
data calculations
data formatting

Answers

Answer:

Hello There!!

Explanation:

The answer is conditional formatting.

hope this helps,have a great day!!

~Pinky~

Answer:

conditional formatting

Explanation:

hopes it helps

Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I really need correct answer ASAP

What kinds of people do you think are susceptible to being duped by "phishing" attacks?

Answers

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Answer:

what do you look like?

A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger

share is $450. What is the total sum shared?

Answers

300! Is the answer for this problem. 450 is the bigger sum, and that’s the 3 part of the ratio. So when we divide 450 by 3 it gives us 150. 150 is what one point on the ratio stands for. We’re looking for what 2 points on the ratio is, so 150*2 which gives us 300 … hope this helps

What is missing in this list of information needed to cite a book?
Author, title, date, publisher
A. page numbers
B. author’s name
C. city and state where it was published
D. author’s sources

Answers

Answer:

C. City and state where it was published

Explanation:

#CarryOnLearning

[tex]{hope it helps}}[/tex]

The one that is missing in the list of information given is author’s sources. The correct option is D.

What is citation?

A "citation" is the way you tell the readers that some of the information in your work came from another source.

It also provides your readers with the information they need to locate that source on the reference or Works Cited page. A citation must be enclosed by parentheses.

It properly credits the authors of the phrases or concepts that you used in your paper. It enables those reading your work to find your sources and learn more about the ideas you present in your paper.

In the given list to cite a book, i.e. Author, title, date, publisher, the one that is missing and should be incorporated is author's source.

Thus, the correct option is D.

For more details regarding citation, visit:

https://brainly.com/question/1272936

#SPJ2

Two devices used by the supermarket point-of-sale (POS) terminal are a bar code reader and a keyboard. Name two other input/output devices used at the POS and give a use for each device.

Answers

Answer:

1. Receipt printer

Use of receipt printer:

i. They are used to print customer transaction receipts for proof.

2. Touch screen monitor

Use of touch screen monitor:

i. Allow record of when, where, price, and other important information about the sale conducted.

Explanation:

A Point of sale (POS) terminal takes record of transactions at the point where a product is purchased or a service is rendered. A barcode reader is a price scanner that is an input device used in a point-of-sale (POS) terminal. The keyboard is also an input device. The receipt printer is an output device since it converts information into a readable format. While only a touch screen monitor among the other devices mentioned above is an input and output device, because of its touch panel and its ability to display information.

             

this bar is located at the top of your computer school in.Its functions allow you to navigate the web​

Answers

Answer:

idu

Explanation:

The answer is Address bar

Define the terms of data and information .​

Answers

data is a collection of facts such as numbers words measurements observation or just description of thing. information is facts provided or learned about something or someone.

Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user handles software maintenance and upgrading features. The user controls software deployment and configuration settings. The user can create an application using tools and libraries from the provider. The user does not need to purchase and install additional hardware to provide increased capacity.

Answers

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

can you help me here please​

Answers

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One formula for calculating the maximum heart rate is the difference between 220 and the patron’s age. Some of the steps in your plan are below.

Put them in order of which occurs first. Some steps are not listed.

Answers

Answer:

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

Explanation:

The programs will be as follows

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

 

Answer:

got 100 on the quiz

Explanation:

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

Explain cell reference and its types with examples?​

Answers

Answer:

There are two types of cell references: relative and absolute. Relative and absolute references behave differently when copied and filled to other cells. Relative references change when a formula is copied to another cell. Absolute references, on the other hand, remain constant, no matter where they are copied.

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

rem wap a programe using function procedure to calculate simple interest

Answers

Answer:

The program in Python is as follows:

def interest(P,R,T):

    [tex]I = P * R * T/100[/tex]

   return I

   

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

print(interest(P,R,T))

Explanation:

Required

Simple interest program using function

This defines the function

def interest(P,R,T):

This calculates the simple interest

   [tex]I = P * R * T/100[/tex]

This returns the calculated interest

   return I

The main begins here

These get inputs for principal, rate and time

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

This calls the interest function

print(interest(P,R,T))

An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database

Answers

the correct answer is b

Define the terms data and information ??​

Answers

Answer:

Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.

Data refers to raw unprocessed facts while information refers to data or raw facts that have undergone processing.

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

i need a constant supply and i am not portable
A. desktop pc
B. smart phone
C. tablet pc
D. laptop​

Answers

the answers desktop pc

what is the most important/powerful computer in a typical network?​

Answers

Answer:

A network server is a computer that provides various shared resources to workstations and other servers on a computer network. They are built with more powerful components than individual workstations

Each time David saves a file, he saves it to the desktop of the computer. His desktop is very cluttered and he has trouble finding the files that he needs. Advise David on a more effective way to organize his files​

Answers

Answer:

well she should organise his desktop a-z so that way he can just look at the name of the file he needs or give the files easier names to remember that way whatever file he needs he can just click on it

Explanation:

David could organise them in alphabetical order or he could delete all the files he no longer needs. He could also sort them into different folders depending on the type of software he uses for each file.

I love science its my favorite subject

Answers

Answer:

Nice!

Explanation:

i like physics and biology :)

Answer:

I also love science!!

Explanation:

Two uses of mortise chisel

Answers

Answer:

Two uses of the mortise chisel are;

1) Mortise chisel are used for cutting across the grain of the wood directly   and also

2) To lever waste materials out of the cut area and smoothen the cut area

Explanation:

A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together

A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet

What are the best editing apps?

Answers

Answer:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt.

Explanation:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt are the best editing apps. Some of the apps are present as free while some of them are not available without paying money for it. These are the top best editing apps so you can use it anyone of it. Snapseed is free on iOS and Android whereas Lightroom needs $5 per month for full access. Adobe Photoshop is also free on iOS and Android.

Answer:

After effects or alight motion on mobile are pretty good

Explanation:

four categories of installer apps

Answers

Answer:

I find 5 categories

Explanation:

1 Overview

2 Necessity

3 Types

4 Attended installation

4.1 Silent installation

4.2 Unattended installation

4.3 Headless installation

4.4 Scheduled or automated installation

4.5 Clean installation

4.6 Network installation

5 Installer

5.1 Bootstrapper

5.2 Common types

5.3 System installer

Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen when the game is played, then Cora needs to add something to the code that will make the speed

Answers

Answer: C. Boolean value

Explanation:

The options are:

A. input

B. output

C. Boolean value

D. conditional statement

Boolean data type refers to the data type which possesses two values which are true and false which shows two truth values of values.

The boolean expression results in a boolean value. Based on the question given, then the answer will be Boolean value. Therefore, the correct option is C.

Answer:

c

Explanation:

sorry if I was wrong

suggest a reason why it was constructed there?​

Answers

Can you post the work assigned so I can better understand?

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]

a. style lines

b. edge lines

c. borders

d. underlines

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

Other Questions
Solve for c. 2 abc + d=3 3. What is the velocity of a collision if a railway train with a mass of 6000 kg is moving to the right at 2.0 [tex]{12{\frac{m}{s}}}[/tex] and collides with an empty freight train with a mass of 3000 kg which ia moving to the left on the same track at 3.0 [tex]{12{\frac{m}{s}}}[/tex] After three years' expectation that things would mend, I accepted an advantageous offer from Captain WilliamPrichard, master of the Antelope, who was making a voyage to the South Sea. We set sail from Bristol, May 4, 1699,and our voyage at first was very prosperous.What would be the best suggestion to give to Jonathan Swift for improving the setting in the passage?O Provide more description of the weather on the day Gulliver sets sail.O Explain Captain Prichard's "advantageous offer."O Describe Captain Prichard's appearance and personality.O Explain the background of the statement, "after three years' expectation that things would mend." A right triangle with the leg lengths of 7ft and 10ft. Using this information, find the length of the hypotenuse. Then round your answer to the nearest hundredth. What are the values of x in the equation x2 - 6x + y =A)x= -2 or x = 8B)x= -1 or x = -11C)x= 1 or x = 11D)x = 2 or x = -8 What is tan 0 when csc 0= 2/3 If (a,3) is the point lying on the graph of the equation 5x + 2y = -4, Then find a. there was much _____ used in the ancient writings, to produce a visual narritive of what had happened Type the correct answer in each box. Michelle decides to ride her bike one day. First she rides her bike due south for 12 miles, then the direction of the bike trail changes and she rides in the new direction for a while longer. When she stops, Michelle is 2 miles south and 10 miles west from her starting point. Find the total distance that Michelle covered from her starting point. If sally completed 6 laps around a circular track with the dimensions shown below, how many meters will she have run? Use 3.14 for up and round your answer to the nearest tenth Which of the following is NOT essential for protein synthesis? *ribosomestRNAmRNAcarbohydrates Steven thinks athletes are not the brightest group of students. He interviews an athlete at his school, and elects to ask the athlete very basic questions that can only be answered simplistically. After the interview, Steven reviews the athletes answers and says, "See, look at how simple the answers to my questions are." Of the following, this example bestillustrates:______.a.confirmation bias.b. illusory correlation.c. stereotype threat.d. social role theory. Show your work on how you got the answerplease helppp I cannot get the range on this one right, can someone help? I had (-infinity, -5) and it said it was wrong. How many years (to two decimal places) will it take $15000 to grow to $17500 if it is invested at 8% compounded semi- annually? The scores from Dr. Wilhelm's students science fair project are shown below .Dr wilhelm made a histogram for the data. answer choices :50657071plsss help I appreciate it thank you so much DEFINE UNIFORM AND NON UNIFORM VELOCITY what was the impact of pseudoscientific ideas of race on the Jewish nation by the nazi germany during 1933 to 1946 En Fairtrade labeling organizations trabajan 24 __ de diferentes paises.