1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
5

Brainstorm what you want your LED board to do. What would need to happen first? What happens next?

Computers and Technology
2 answers:
makkiz [27]3 years ago
7 0
Make it look like a disco or something like a party
lbvjy [14]3 years ago
5 0
First it will glow then change what color you want
You might be interested in
Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last
evablogger [386]

Answer:

The method is as follows:

public static int lastIndexOf(int [] numbers, int num){

    int lastIndex = numbers[0];

    for(int i =0; i<numbers.length;i+=num){

        lastIndex = numbers[i];

    }

    return lastIndex;

}

Explanation:

This defines the method

public static int lastIndexOf(int [] numbers, int num){

This initializes the lastIndex to the first element of the array

    int lastIndex = numbers[0];

This iterates through every "num" element of the array

    for(int i =0; i<numbers.length;i+=num){

This gets the current index... until the last

        lastIndex = numbers[i];     }

This returns the last

    return lastIndex; }

7 0
3 years ago
A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
elena-s [515]

Answer:

Client To Site.

Explanation:

The Client-to-Site is a virtual private network which used to provide the connection of the device like a laptop to the organization network. In the Client To Site a single computer is connected to the remotely network, for all the purpose and the intent of the network.

The single laptop is connected with a remote machine in the firewall. The  "IPSec" protocol is used in the Client To Site connection.

3 0
3 years ago
Computer Science uses the power of ______________ to solve problems.
Rudiy27

Answer:

Technology, Algorithm

Explanation:

An algorithm csn be defined as a step by step solution to any given problem.

It is one of the procedures in which computer science solves human problems.

The other way is with the use of Technology.

Advanced technological innovations have led to so many solutions to the numerous human problems.

And finally, all these are done making use of a computer.

8 0
3 years ago
What kind of value should an employee possess when employees are expected to be responsible and fair?
WINSTONCH [101]

I'd say professionalism

Professionalism in a workplace setup is acting in a responsible and fair manner in all your personal and work activities. It is always seen as sign of maturity and self-confidence. This work value includes learning every aspect of a job and performing it to the best of your God given ability.

3 0
3 years ago
A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and print
kobusy [5.1K]

Answer:

Domain Networking.

Explanation:

A domain in networking refers to any group of workstation,users,printers devices ,database servers and computers which share different type of data via resources of network.

Hence domain networking will be the best option for the company having 40 workstation in a single building sharing a single network.

6 0
3 years ago
Other questions:
  • What is the last step in conducting url search
    11·1 answer
  • A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have d
    11·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • Why would you use quotation marks in a search string when conducting an internet search?
    12·1 answer
  • What simple machine is most often used to lift the blinds on a window?
    8·2 answers
  • Controlling access of information on the internet
    15·1 answer
  • What is the purpose of a mutator?
    8·1 answer
  • If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
    8·1 answer
  • Does anyone have discord
    14·2 answers
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!