1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
14

I need help picture above

Computers and Technology
2 answers:
Sati [7]3 years ago
8 0
“https” at the very beginning of the URL
m_a_m_a [10]3 years ago
7 0

Answer:

The 2nd one on top and The Star ones.. (sorry if its wrong

Explanation:

You might be interested in
David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
shusha [124]

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

3 0
4 years ago
What are some advantages and disadvantages to flooded coolers?
aliya0001 [1]
Advantage is that the refrigerant distrubing in the evaporator will reduce and disadvantage is that the distribution of evaporator will increase
5 0
4 years ago
Which of the following is true of Shareable Content Object Reference Model (SCORM)? Group of answer choices guidelines that allo
dalvyx [7]

Answer:

The correct answer to the following question will be Option B (Control how well the e-learning artifacts interact technically with LMS).

Explanation:

SCORM seems to be a compilation of requirements and criteria for commodities used during e-learning. This describes the different ways to communicate here between information or data on the customer side as well as the run-time context.

  • The specification also specifies how to bundle e-learning material for functionality, this is achieved by using the Bundle Exchange Format, an exchangeable ZIP file.
  • It is essentially a manual that informs developers as well as content providers on how to make their apps or programs compliant with several other e-learning apps including applications.

The other three options are not related to the given scenario. So that option B is the right answer.

6 0
3 years ago
The Fibonacci sequence {fib}i≥1 is defined recursively as follows: fib(1) = 1, fib(2) = 1 and, fib(n) = fib(n-1) + fib(n-2) for
nadya68 [22]
<h2>Answer:</h2>

// Create a class header definition

public class Fibonacci {

   

   //Create a method fib to return the nth term of the fibonacci series

   public static long fib(int n){

       

       //when n = 1, the fibonacci number is 1

       //hence return 1

       if (n <= 1){

           return 1;

       }

       

       //when n = 2, the fibonacci number is 1

       //hence return 2

       else if(n == 2){

           return 1;

       }

       

       //at other terms, fibonacci number is the sum of the previous two

       //numbers

       //hence, return the sum of the fib on the previous two numbers - n-1

       // and n-2

       else {

           return fib(n-1) + fib(n-2);

       }

       

   }

   

   //Create the main method to test the fib() method

   public static void main(String[] args) {

     

       // Test the fib method with n = 9        

       System.out.println(fib(9));

     

   }

}

=====================================================

<h2>Sample Output:</h2><h2></h2>

34

======================================================

<h2>Explanation:</h2>

The program above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments.

The actual lines of code are written in bold face to distinguish them from comments.

Also, a sample output of a run of the program has been provided.

4 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Other questions:
  • Can someone fix this so that it only says "its a payday" on 15 and 30 and on all other days "sorry, it's not payday"
    9·1 answer
  • The IT director instructed the systems administrator to build a server to support the accounting department's file growth. The I
    7·1 answer
  • You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
    5·2 answers
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the
    13·1 answer
  • WhAt is a jpeg do i look like i know what a jpeg is
    13·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • What type of computer system can be found in the computer lab at school?
    14·1 answer
  • What kind of email formatting change can you make using the Rules Wizard?
    12·1 answer
  • 1.1<br> What are three reasons why decision-making is required in a programmed work cyde?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!