1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
5

Help plz

Computers and Technology
1 answer:
Anarel [89]3 years ago
5 0

Answer: 1.) Collect the necessary ingredients and tools:

- jar of peanut butter

- jar of fruit jelly

- two slices of bread

- cutting board (larger that the combined surface areas of the slices of bread)

- butter knife

- tablespoon-sized spoon

2.) Place the cutting board on a stable surface, and the slices of bread side-by-side on the cutting board

3.) Open the jar of peanut butter.

4.) Using the spoon, scoop out 2 tablespoons of peanut butter and deposit in the center of one slice of bread [henceforth known as "Slice 1"].

5.) Using the knife, spread the peanut butter evenly across this side of Slice 1.

6.) Repeat steps 3-5, but with jelly instead of peanut butter and the slice of bread that is not Slice 1 [this second slice will henceforth be known to as "Slice 2"].

7.) Once Slice 1 and Slice 2 each have one side that is evenly coated with its respective spread (peanut butter or jelly), place Slice 2 on top of Slice 1 so that the spreads (peanut butter and jelly) are between the two slices and the externally-facing sides of each slice do not have spreads.

(ok so this is the best answer i can give u don't blame me if it's wrong)

You might be interested in
before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
masha68 [24]

It is an input and an output. The scanner scans the paper which is the input ,and the output is when the printer prints the paper.

3 0
3 years ago
Consider the following code segment. for (int a = 0; a < 10; a++) { for (int b = 10; b > a; b--) { System.out.print("#");
Ket [755]

Answer:

55

Explanation:

Given the codes as below:

  1.        for (int a = 0; a < 10; a++)
  2.        {
  3.            for (int b = 10; b > a; b--)
  4.            {
  5.                System.out.print("#");
  6.            }
  7.        }

There are two layer loops in the code. The outer loop (Line 1) will run for 10 iterations by traversing through a = 0 to a=9. However, the inner loop  (Line 3) will run for 10 + 9 +  8 + 7 +...+ 1 = 55 iterations.

Since the print statement is within the inner loop (Line 5) and therefore the number of printed "#" symbols is dependent on the number of iterations of the inner loop. There will be 55 "#" symbols printed.

6 0
3 years ago
Charlie does not think he will be able to finish his project by the deadline at this point in the decision making progress to so
NemiM [27]
A and B are out because Charlie knows his problem is he is not going to finish in time. D is out because he hasn't talked to his manager yet. so only choice left is C. decide if he should talk to his manager about the problem he now knows
5 0
3 years ago
hona is buying a rug for her room. Store A has the rug for $45 with a 10% discount. Store B has the same rug for $46 and is offe
Fed [463]
Store b. This will have her paying 36.00 for the rug. Store A she will pay 40.50
7 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Other questions:
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • Renee is creating a multimedia presentation for a website that requires user interaction. Which multimedia type is Renee using?
    5·2 answers
  • 3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk
    11·1 answer
  • How can a user preview the playback of an audio clip in PowerPoint? Use the drop-down menus to complete the statements.
    14·1 answer
  • Which command can be used to find errors on a hard drive​
    6·1 answer
  • Select the three reasons that the gaming industry is set to grow.
    12·2 answers
  • Similarities between inline css and internal css​
    6·1 answer
  • Windows is a GUI Operating System, what is the other type?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!