1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
7

What is a drone satellite?​

Computers and Technology
1 answer:
babymother [125]3 years ago
4 0

Answer:

A satellite that can be controlled where to go.

Explanation:

You might be interested in
Find the number of ideal integers within the given segment [low,high] inclusive. An ideal number is a positive integer that has
Alex Ar [27]

Answer:

  1. low = 10
  2. high = 50
  3. count = 0
  4. for i in range(low, high + 1):
  5.    if(i % 3 == 0 and i % 5 == 0):
  6.        count += 1
  7. print(count)

Explanation:

The solution code is written in Python.

We can create low and high variables to store the lower bound and upper bound in the range (Line 1-2)

Next create a counter variable, count (Line 3).

Use a for loop to traverse through the number between lower bound and upper bound and check if the current number-i is divisible by 3 and by 5, increment the count by one.

After the loop, print the count and we can get the number of ideal integers within the range (Line 8).

6 0
3 years ago
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
adell [148]

Answer:

Punch Card Machine

Explanation:

The punch cards or the punched cards are also termed as the Hollerith cards or we also know them as the IBM cards. And they happen to be the paper cards where holes can be punched with the help of the hands or with the help of the machine for representing the computer instructions or data. And these were used on quite a large scale for inputting the data when we talk of the early computers. And this technology was developed by the Herman Hollerith.

7 0
4 years ago
Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
Alexxx [7]

Answer:

/*********************************************************************************

* (The ComparableCircle class) Define a class named ComparableCircle that        *

* extends Circle and implements Comparable. Draw the UML diagram and implement   *

* the compareTo method to compare the circles on the basis of area. Write a test *

* class to find the larger of two instances of ComparableCircle objects.         *

*********************************************************************************/

public class Exercise_13_06 {

/** Main method */

public static void main(String[] args) {

 // Create two instances of ComparableCircle objects

 ComparableCircle comparableCircle1 = new ComparableCircle(12.5);

 ComparableCircle comparableCircle2 = new ComparableCircle(18.3);

 // Display comparableCircles

 System.out.println("\nComparableCircle1:");

 System.out.println(comparableCircle1);

 System.out.println("\nComparableCircle2:");

 System.out.println(comparableCircle2);

 // Find and display the larger of the two ComparableCircle objects

 System.out.println((comparableCircle1.compareTo(comparableCircle2) == 1  

  ? "\nComparableCircle1 " : "\nComparableCircle2 ") +  

  "is the larger of the two Circles");

}

}

3 0
3 years ago
Are Most job applications are online
Ahat [919]

Answer:

i would say yes since technology has evolved a lot over the years

Explanation:

5 0
3 years ago
A/an ________is a device used to protect computers against surges and spikes in power.
givi [52]

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

7 0
3 years ago
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    13·2 answers
  • I am doing Microsoft Excel and I have do formulas, Can some please explain to me how do them?
    14·1 answer
  • A user is connecting to an e-commerce server to buy some widgets for a company. the user connects to the site and notices there
    10·1 answer
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • What is a prototype ?
    9·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • Long Answer Questions: a. Briefly explain the types of Control Structures in QBASIC.​
    5·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • We know that February has either 28 or 29 days, but there is a year in the future, February will have 30 daysWhat exactly is thi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!