1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
14

Scenario: As you walk into an empty class, you see a bag on the floor under the desk what will you do next

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
5 0
I'm not sure on what you mean by this however lets say that it may contain a device, when entering DO NOT TOUCH ANYTHING, there are different methods on how a device could be triggered either from light switches or by trip wire which its best to leave the facility over all however lets say you cannot then stop listen for any ticking if not then have a flash light, if the room lights are turned off leave them off use a flash light but be careful where you shine it there could be light sensors on the device that trigger when a light hits it hence why the lights are off. when having a flash light you could be able to see a glare of a wire which could be a trip wire. there are many possibilities in how the device was made from timers, trip wire, sound,light,pressure, switches, electronic waves from phones may effect the device and could activate it as well. But anyways this is all a factor and its best to be careful and if able evacuate if the device is in a weird location at a odd time you know its not suppose to be there, and or items moved that are never moved and if it is never moved then there is dust that could have a odd shape like a hand print. Anyways im not sure if your looking for this type of answer but its good to know!
You might be interested in
How can I hide my cracked phone screen? or How can I fix it myself without my parent finding out? or How can I fix my phone with
sammy [17]
Ummm I don’t know how to answer that
8 0
3 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
Nadusha1986 [10]

Answer:

Algorithms need to be simple, factual, and explained in simple but relevant vocabulary, and must be step by step, and none of the step should be missing.

Hence, first you need to understand the requirement, which can be yours or your clients.

Then consider each module of the problem, and separate each of them from the others. Now, understand the relationship between each module. And then you need to understand how you can combine them in one algorithm.

Also remember, the modules are functions. and various functions combine together to form an algorithm. We can have separate algorithms for each module as well, and then you can combine them together in right continuity to form the one single program.

Also, a project can have a loads of programs with other parts like images and various other assets and technologies.

However, everything starts with algorithms. And if are good at explaining, and a sound vocabulary, plus can explain the process well, you can explain the process well, and write a good algorithm definitely. Learn languages like Python, C, and C++  to start with, and then continue with Java, R etc. Remember we still uses functional programming as well like through Haskell etc.

The below is an example of sample algorithm. John wants to check what Ana has brought for him.

Step 1: Ana arrives with meat, which can be of goat or chicken

Step 2: John: Hi Ana

Step3: Yes John

Step 4 What meat is that Ana

Step 5: Goat

Step 7: Thanks Ana for Bringng Goat Meat

Step 8: Stop

In the above algorithm John confirms that what meat Ana has brought for him. And he comes to know She has bought Goat meat. This is the simplest of algorithm with no loop. And the complexity can be increased to any level.

Explanation:

The Answer is self explanatory, and has all that is required.

7 0
3 years ago
Read 2 more answers
Which function works best when you need to remove an element at a specific index in a list?
natka813 [3]

Answer:

You can use the pop() method to remove specific elements of a list. pop() method takes the index value as a parameter and removes the element at the specified index. Therefore, a[2] contains 3 and pop() removes and returns the same as output.

Explanation:

Hope it helps you!

8 0
3 years ago
Write a class definition line and a one line docstring for the class Dog. Write an __init__ method for the class Dog that gives
Viefleur [7K]
Python Code:

class Dog:
""" Dog class definition """

# data attribute species as part of the class Dog
species = "Canis familiaris"

def __init__(self, _name, _breed):
""" Constructor """
# Assigning values
self.name = _name
self.breed = _breed
self.tricks = []

def teach(self, trick):
""" add a passed string parameter to tricks """
# Adding to list
self.tricks.append(trick)
# Printing message
print(self.name + " knows " + trick)


def knows(self, chkStr):
""" check whether a passed string parameter is in the dog’s list of tricks """
# Checking in tricks list
if chkStr in self.tricks:
# Printing message
print("Yes, " + self.name + " knows " + chkStr)
else:
# Printing message
print("No, " + self.name + " doesn't know " + chkStr)
4 0
2 years ago
Other questions:
  • *FREE POINTS* If you comment and follow me this will give up lot of points :p seriously I will follow u back if u do it :p​
    11·2 answers
  • Why is it important to respect other political opinions
    7·2 answers
  • In a chassis, the path along which air from a cool air source is conducted, past equipment to cool it, and then out of the rack.
    13·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • Which letter would appear in the third position of the standard wheel marking of a hard-grade wheel?
    10·2 answers
  • TRUE AND FALSE
    10·1 answer
  • What is the answer to 4.9 Code Practice: Question 2
    14·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
  • What is the extension of a Microsoft access database 2013​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!