1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
10

Let's play Silly Sentences!

Computers and Technology
1 answer:
Mrac [35]3 years ago
3 0

Answer:

Grace sat quietly in a stinky stadium with her blue jacket

Grace jumped on a plane to Paris.

Grace ate bananas, apples, and guavas quietly while she listened to the news.

Grace is the name of a major character in my favorite novel

Grace was looking so beautiful as she walked to the podium majestically.

Grace looked on angrily at the blue-faced policeman who blocked her way.

You might be interested in
Please Help, Thank you!
nevsk [136]

Answer: Devices connected in a Bluetooth network communicate with each other using ultra-high frequency (UHF) radio waves. These are electromagnetic waves with frequencies around 2.4 gigahertz (2.4 billion waves per second). UHF waves of different frequencies are used in microwave ovens, GPS systems and many other devices, White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. ... There are even courses, training, conferences and certifications for ethical hacking. A hub connects multiple computers together in a Local Area Network (LAN). All information sent to the hub is then sent through each port to every device in the network.

Hubs are unable to tell one computer from another, so they receive information on one port and then blindly forward it to all other ports — whether it was intended for those computers or not.

So even though you may only want to send information to one other computer, if you have five total computers on your network, then there will be four other computers receiving data that wasn’t intended for them. Showing results for are Infrared signals are suitable for long distance data communication..

Search instead for are Infra-red signals are suitable for long distance data communication..

Infrared laser systems can also be used for long-range communication (up to about 2.4 kilometres), with a maximum projected data rate of 16 Mbps. ... An infrared transmitting device, either a light-emitting diode (LED) or a laser diode, converts an electrical signal to an optical signal.

Web Browser is a software which is used to browse and display pages available over internet whereas web server is a software which provides these documents when requested by web browsers. ... Web browser sends an HTTP Request and gets a HTTP Response. Web server receives HTTP Request and sends a HTTP Response.

Simple LANs generally consist of cabling and one or more switches. A switch can be connected to a router, cable modem, or ADSL modem for Internet access. A LAN can include a wide variety of other network devices such as firewalls, load balancers, and network intrusion detection.

Coaxial cable, or coax (pronounced /ˈkoʊ. æks/) is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric (insulating material); many coaxial cables also have a protective outer sheath or jacket.

Terrestrial microwave- The most common type of microwave antenna is the parabolic “dish.”A typical size is about 3 m in diameter. The antenna is fixed rigidly and focuses a narrowbeam to achieve line-of-sight transmission to the receiving antenna. Microwave antennasare usually located at substantial heights above ground level to extend the range betweenantennas and to be able to transmit over intervening obstacles. To achieve long-distancetransmission, a series of microwave relay towers is used, and point-to-point microwave linksare strung together over the desired distance. Used in long haul telecommunicationsservice, as an alternative to coaxial cable or optical fiber.

You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets

3 0
3 years ago
The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program'
Semenov [28]

Answer:

transaction log.

Explanation:

The information stored in the transaction log is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program's abnormal termination, or a system failure such as a network discrepancy or a disk crash.

5 0
3 years ago
"What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
Fofino [41]

The #include directive causes the source code of a second file to be inserted into the original file without having to retype the code.

Explanation:

<u>Include</u> is a <u>directive </u>that many programming languages and computer files use in order to merge the source code of one file with that of the another file without retyping the code

# include is used in programming languages like c,c++ because it includes the library functions which makes coding simpler .

For example

#include<Math.h> - is responsible for the mathematical calculations if we don,t  use math.h then we will face a error in the code

4 0
3 years ago
2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
True [87]

Answer:

Follows are the explanation of the choices:

Explanation:

Following are the Pseudocode for selection sort:                      

for j = 0 to k-1 do:

      SS = i

      For l = i + 1 to k-1 do:

        If X(l) < X(SS)

          SS= l

        End-If

      End-For

      T = X(j)

      X(j) = X(SS)

      X(SS) = T

    End-For

Following are the description of Loop invariants:

The subarray  A[1..j−1] includes the lowest of the j−1 components, ordered into a non-decreasing order, only at beginning of the iteration of its outer for loop.  

A[min] is the least amount in subarray A[j.. l−1] only at beginning of the each loop-inner iterations.                      

Following are the explanation for third question:

Throughout the final step, two elements were left to evaluate their algorithm. Its smaller in A[k-1] would be placed as well as the larger in A[k]. One last is the large and medium component of its sequence because most and the last two components an outer loop invariant has been filtered by the previous version. When we do this n times, its end is a repetitive, one element-sorting phase.

Following is the description of choosing best-case and worst-case in run- time:

The body the if has never been activated whenever the best case time is the list is resolved. This number of transactions are especially in comparison also as a procedure, that will be (n-1)(((n+2)/2)+4).    

A structure iterator at every point in the worst case that array is reversed, that doubles its sequence of iterations in the inner loop, that is:(n−1)(n+6) Since both of them take timeΘ(n2).

7 0
3 years ago
What is a traditional tool used to align and mark vertical points from top to bottom?
amm1812
For the answer to the question above, <span>A </span>plumb bob<span>, or plummet, is a weight, usually with a pointed tip on the bottom, suspended from a string and used as a vertical reference line, or </span>plumb<span>-line. It is essentially the vertical equivalent of a "water level".</span>
7 0
2 years ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • ________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
    8·1 answer
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • Larry sent an email to Andy. Andy didn't open Larry's email but still understood what the message was. How did Andy determine th
    14·1 answer
  • Difference between positional and non positional number​
    12·1 answer
  • Please someone helpp
    12·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Write a program whose inputs are three integers, and whose output is the smallest of the three values. Ex: If the input is: 7 15
    5·1 answer
  • My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
    15·2 answers
  • 3. It is important to make certain that your employees are aware of the work ethic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!