1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
4 years ago
9

In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of t

he background.
Computers and Technology
2 answers:
tangare [24]4 years ago
6 0

Answer:

She listens to the loudness , sound intensity.

Explanation:

kirill [66]4 years ago
4 0

Answer:

It listens for sound intensity

Explanation:

It listens for the sound intensity and loudness. As the intensity varies the background color changes as well.

You might be interested in
based on your completed tables for ping requests and replies, which field do you think helps the network identify the appropriat
Ilia_Sergeevich [38]

Ping, a computer network management tool, is used to determine whether a host is reachable on an IP network. ARP protocols To begin, launch Wireshark and the ecet-375 Web Browsing. Pcap capture file. This capture file was created while browsing the Internet.

<h3>What does ping operates mean?</h3>
  • Ping sends an ICMP Echo Request to a predefined network interface and then waits for a response. A ping signal is sent to the specified address when a ping command is issued.
  • The destination host sends the echo reply packet in response to receiving the echo request.
  • A ping is the time it takes for a small data set to be communicated from your device to an Internet server and back to your device (latency is the more accurate technical word). Ping times are measured in milliseconds.
  • Ping is the most commonly used TCP/IP command for troubleshooting connectivity, reachability, and name resolution.
  • This command displays Help content when run without any parameters. You can also use this command to verify the computer's name as well as its IP address.

To learn more about ping operates, refer to:

brainly.com/question/14366813

#SPJ4

7 0
2 years ago
In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Vigenère cipher. Your program
solniwko [45]

Answer:

C code is given below

Explanation:

// Vigenere cipher

#include <ctype.h>

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

/**

* Reading key file.

*/

char *readFile(char *fileName) {

   FILE *file = fopen(fileName, "r");

   char *code;

   size_t n = 0;

   int c;

   if (file == NULL) return NULL; //could not open file

   code = (char *)malloc(513);

   while ((c = fgetc(file)) != EOF) {

      if( !isalpha(c) )

          continue;

      if( isupper(c) )

          c = tolower(c);

      code[n++] = (char)c;

   }

   code[n] = '\0';

  fclose(file);

   return code;

}

int main(int argc, char ** argv){  

   // Check if correct # of arguments given

   if (argc != 3) {

       printf("Wrong number of arguments. Please try again.\n");

       return 1;

   }

 

  // try to read the key file

  char *key = readFile(argv[1]);

  if( !key ) {

      printf( "Invalid file %s\n", argv[1] );

      return 1;

  }

 

  char *data = readFile(argv[2]);

  if( !data ) {

      printf("Invalid file %s\n", argv[2] );

      return 1;

  }

 

   // Store key as string and get length

   int kLen = strlen(key);

  int dataLen = strlen( data );

 

  printf("%s\n", key );

  printf("%s\n", data );

 

  int paddingLength = dataLen % kLen;

  if( kLen > dataLen ) {

      paddingLength = kLen - dataLen;

  }

  for( int i = 0; i < paddingLength && dataLen + paddingLength <= 512; i++ ) {

      data[ dataLen + i ] = 'x';

  }

 

  dataLen += paddingLength;

 

   // Loop through text

   for (int i = 0, j = 0, n = dataLen; i < n; i++) {          

       // Get key for this letter

       int letterKey = tolower(key[j % kLen]) - 'a';

     

       // Keep case of letter

       if (isupper(data[i])) {

           // Get modulo number and add to appropriate case

           printf("%c", 'A' + (data[i] - 'A' + letterKey) % 26);

         

           // Only increment j when used

           j++;

       }

       else if (islower(data[i])) {

           printf("%c", 'a' + (data[i] - 'a' + letterKey) % 26);

           j++;

       }

       else {

           // return unchanged

           printf("%c", data[i]);

       }

      if( (i+1) % 80 == 0 ) {

          printf("\n");

      }

   }

 

   printf("\n");

 

   return 0;

}

4 0
3 years ago
Read 2 more answers
Information about www
iragen [17]

Answer:

Here is your ans

Thanku you

4 0
3 years ago
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy with
natulia [17]

Answer:

The given statement is "True".

Explanation:

  • Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.
  • Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.
4 0
3 years ago
What is are the html tags plss anyone​
sineoko [7]

Answer:

Each tag starts with a tag opener (a less than sign) and ends with a tag closer (a greater than sign).

Explanation:

Each tag starts with a tag opener (a less than sign) and ends with a tag closer (a greater than sign). Many tags have corresponding closing tags which identical except for a slash after the tag opener. (For example, the TITLE tag).

Some tags take parameters, called attributes. The attributes are given after the tag, separated by spaces. Certain attributes have an effect simply by their presence, others are followed by an equals sign and a value. (See the Anchor tag, for example). The names of tags and attributes are not case sensitive: they may be in lower, upper, or mixed case with exactly the same meaning. (In this document they are generally represented in upper case.)

Currently HTML documents are transmitted without the normal SGML framing tags, but if these are included parsers will ignore them.

7 0
3 years ago
Other questions:
  • A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single stateme
    13·1 answer
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • Plato: A university wants to install a client-server network. Which feature do you think is important for them as they set up th
    5·1 answer
  • Select all the correct answers.
    7·2 answers
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • Bluetooth 5 allows data to be transferred between two devices at a rate of
    8·1 answer
  • Although your project has been accepted by the customer, the contract with the system vendor specifies that it will support the
    13·1 answer
  • What is keyword density?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!