1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
5

What help in executing commands quickly

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0

Answer:99

Explanation:  Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.

At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.

After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.

Problem:

audio

The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?

audio

the production of light from an organism’s body

audio

the study of creatures that live in the ocean

audio

to move around underwater water like a fish

audio

an organism with a whip-like part it uses to move around in the water

You might be interested in
A _____ describes two or more computers connected to each other.
WARRIOR [948]

Answer:

Computer network.

Since it is 2 or more computers connected together.

5 0
3 years ago
Read 2 more answers
How many threads can a quad-core processor handle at once?
Hoochie [10]
It can handle 8 threads at once.
4 0
3 years ago
What question for attack libraries help answer?
ch4aika [34]

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




6 0
3 years ago
Calling all engineers and tech geniuses. Brianliest for correct answer.
vodomira [7]

Answer:

so id assume you need a battery like in the photo. to attach it you should be able to look at the top of the battery and just click the battery component onto the battery. sorry if im using the incorrect terms.

5 0
3 years ago
Python Write a program that asks the user for an integer and then prints out all its factors.
scoray [572]

Answer:

def display_factors(num):

   for counter in range(1, num+1):

       if num % counter == 0:

           print(counter)

int_num= int(input("Enter a number : "))

print("The factors for {} are : ".format(int_num))

display_factors(int_num)

Explanation:

The function display_factors is used to display all factors of a number entered by a user.

  • In this  for counter in range(1, num+1) the for loop is iterated until counter is greater  to num is false.   Counter variable starts from 1 and ends when it gets greater than the input number.
  • if num % counter == 0: In this statement, each loop  iteration, checks whether a number (num) is exactly divisible by counter. It is the condition for counter to be a factor of num.
  • print(counter) This is used to display factors of an input number
  • int_num= int(input("Enter a number : ")) This statement asks user to enter a number (int_num) which will be an integer.
  • display_factors(int_num) This calls display_factors number to find the factors of an input number.

7 0
3 years ago
Other questions:
  • 30 POINTS Conduct Interviews
    11·1 answer
  • A musical compact disc is an example of
    13·1 answer
  • Write a static method named anglePairs that accepts three angles (integers), measured in degrees, as parameters and returns whet
    10·1 answer
  • The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
    13·1 answer
  • The ____ of a variable is the location in memory where it’s value is stored. A. Value B. Address C. Data type D. Number
    8·1 answer
  • If you had an idea for a new software company, what would be the best approach to help make it a successful business? develop a
    5·2 answers
  • Giải thích mục đích của các thao tác open() và close().
    6·2 answers
  • When you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible
    10·2 answers
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!