1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
7

Please help! first one to answer correctly gets brainliest and thanked

Computers and Technology
1 answer:
jonny [76]3 years ago
6 0
It’s either presentation Because the software is used to create a sequence of texting, graphics and often audio and video to accompany a speech or a public presentation, or letter
You might be interested in
Write a program to provide information on the height of a ball thrown straight up into the air. The program should request as in
Ymorist [56]

Answer:

The height of the ball after t seconds is h + vt - 16t 2 feet:

def main():

getInput()

def getInput():

h = int(input("Enter the initial height of the ball: ")) # Adding the int keyword before input() function

v = int(input("Enter the initial velocity of the ball: ")) # Same as above

isValid(h,v)

def isValid(h,v):

if ((h <= 0) or (v <= 0)):

print("Please enter positive values")

getInput()

else:

maxHeight(h,v)

def maxHeight(h,v):

t = (v/32)

maxH = (h + (v*h) - (16*t*t))

print ("\nMax Height of the Ball is: " + str(maxH) + " feet")

ballTime(h, v)

def ballTime(h,v):

t = 0

ballHeight = (h + (v*t) - (16*t*t))

while (ballHeight >= 0):

t += 0.1

ballHeight = (h + (v*t) - (16*t*t))

print ("\nThe ball will hit the ground approximately after " + str(t) + " seconds")

# Driver Code

main()

7 0
3 years ago
Read 2 more answers
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
lesya [120]
<span>With jump-YES. SInce we know that the instruction format of the jump instruction is 6 bits opcode and 26-bit jump address we can sufficiently encode the given address in the 26-bit space.</span>
7 0
4 years ago
In a food chain are living creatures that eat organisms from a diferente population?
marysya [2.9K]
I’m thinking predator? Or maybe consumer?
3 0
2 years ago
Read 2 more answers
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • How to change default search engine in internet explorer 11?
    13·1 answer
  • You are looking for ways to pay your higher education costs.Which of the following options will require you to pay back any mone
    6·1 answer
  • Where can i watch twilight breaking Dawn 2 full movie. In the internet where can i wath it for free
    14·1 answer
  • B. What is a window?​
    8·2 answers
  • Given the declaration Circle x = new Circle(), which of the following statements is most accurate?
    11·1 answer
  • Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or
    7·1 answer
  • The process of recording and reporting the financial data for a business is known as:
    6·2 answers
  • Write a program that takes two decimal numbers as input and print the largest. If the numbers are equal, print one of them.
    13·1 answer
  • Given that the input A is false, the input B is false, and the input C is true, what is the resulting value of the output?
    12·1 answer
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!