1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
12

The music is the soul who says this

Computers and Technology
1 answer:
Crazy boy [7]3 years ago
4 0

Question:the music is the soul who says this

Answer: Arthur Schopenhauer

Explanation: he says music is the language of feeling and of passion

question answered by

(jacemorris04)

You might be interested in
Apps are designed by___.
nadya68 [22]

Explanation:

Apps are designed by___.

A. Software Developer

is the answer

3 0
3 years ago
Read 2 more answers
AP CSP - Write a program that takes 10 random numbers from 1 to 12 inclusively and averages them together.
Amanda [17]

Answer:

follows are the correct python code to this question:

import random as r#import random package as r

import statistics as s #import statistics package as s

l= r.sample(range(0,12),10)#defining l variable that use random function to store 10 random numbers

avg= s.mean(l)#defining avg variable for calculate average of l

print('List of random number are: ', l)#print list of random numbers

print("The random number Average is: ", avg)#print average value

Output:

List of random number are:  [4, 10, 6, 0, 3, 5, 1, 7, 11, 2]

The random number Average is:   4.9

Explanation:

In question 1:

In the given code, two packages are imported, which are "random and statistics", in which "random" is used to generate a random number, and "statistics" is used to calculate the average value.

In the code, the "l" variable is used, which uses a random function and store 10 random numbers, and an "avg" variable is defined that calculates the average value. In the last step, the print method is used that print number and its average value.

In question 2:

The given code is wrong because it only calls the "random" method, which is not defined.

3 0
3 years ago
Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
Artyom0805 [142]

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

3 0
3 years ago
All of the following except one are issues that should be covered in an AUP. Which one is the exception?
Maslowich

Answer:

D) Your computer monitor will not switch on.

Explanation:

A written agreement or a document stipulating constraints and practices that a community computer network or an individual user must agree and adhere to is called an Acceptable Use Policy (AUP). Employees and students are required to sign an AUP when you sign up with an ISP. A good AUP will cover most provisions for network etiquette and indicate clearly the privacy levels of a member. The examples given in the multiple choices above are use cases for AUP apart from option D. If a user is not certain on the actions that should be taken in use cases like these, an AUP should be of great help.

6 0
3 years ago
The process of starting or restarting a computer or mobile device is called __________.
Neko [114]
Hi!

When ever we start or restart any device we may hold - this process is called <em>booting. </em>

Hopefully, this helps! =)
3 0
3 years ago
Other questions:
  • When you copy text, the selected text is copied from the original location and placed on the
    9·1 answer
  • Which ergonomic principle helps to maintain good posture?
    7·2 answers
  • Select
    14·1 answer
  • What do you call the physical, touchable, materials parts of a computer system?
    7·1 answer
  • Creating Classes
    10·1 answer
  • 2. Released in 1992, Street Fighter II, the revolutionary fighting game, was developed by which company?
    8·2 answers
  • What was the name of the first personal computer and what year was it introduced
    7·1 answer
  • Please help me plss! PLS​
    8·2 answers
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!