4. Make up your own here!

a. What hardware tool would you suggest for his computing system? Include an
explanation and the cost.
b. What software program would you suggest? Include an explanation and the cost.
c. What operating system might you suggest (Mac, Windows, iOS, Android, etc) and why?

Answers

Answer 1

Answer:

tool that I need is screw driver cause it's helpful


Related Questions

how do you delete your account when you forgot your password?! lol

Answers

Answer: okay if you remember the email you used, even if you logged in through goooooooooogle, just put the email and say forget the password. They will ask if you'd like to send a verification code to your email to change your password. Click yes. Go to your email change the password then use it to log in once again to your account.

Explanation:

concept of online storage

Answers

Answer: The Cloud

Explanation: The cloud is some close or far-off server that stores your data on WAN  and it goes on from here to Timbuktu and beyond. You pay a storage fee of a few dollars and month or a yearly fee of up to 300 bucks ..or more. has it as does another well know Web Browser  and a plethora of other companies .. problem is when you use these cloud drives on your computer your data is still stored on your computer as all as the drive ...Try to add on the web app and not the desktop app...

if you delete a shortcut from your desktop, have you also deleted the original file?

Answers

I don’t think so. When you delete a shortcut, it’s deleting the way to get there faster and not the file itself. To delete the original file, you would have to go directly to it or delete. Also make sure to delete it permanently if you want, because after you delete it there tends to be an option where you could bring it back, unless the device actually tells your the file is going to be deleted permanently the first time.

1. Create a function called numberGuess. Function numberGuess will first choose a random number in the range 1 to 1000. The number that is chosen is what the user is supposed to guess. Following this, your function should then display the following





The player then types a first guess. The function responds with one of the following:






Your function must not stop asking for guesses until the user has provided a correct solution. Your program should keep telling the player Too high or Too low to help them narrow down the answer. Count the number of guesses the player makes. At the end when the user finally guesses correctly, print Either you know the secret or you got lucky! if the number of guesses were 10 or less. If the player guesses the number in 10 tries, then print Ahah! You know the secret! If the player makes more than 10 guesses, then print You should be able to do better!
-


- I already have some code however not sure if its 100% correct
Please review feedback will appreciated, thanks
#include
using namespace std;

int main()
{
int num, guess, tries = 0;
srand(time(0)); //seed random number generator
num = rand() % 1000 + 1; // random number between 1 and 1000
cout << "I have a number between 1 and 1000"< > guess;
tries++;

if (guess > num)
cout << "Too high!\n\n";
}
while(guess < num);
cout << "Too low!\n\n";
if(10<=guess)
cout << "\nCorrect!either you know the secret or you got lucky" << tries << " guesses!" < {

} if (guess==10){
cout<<" Ahah! You know the secret!"< }
else


{
cout<< "You should be able to do better! ";
cout<< " Would you like to play again? (Y/N)";



}



}

Answers

You can edit this code whatever you want! Good luck.

what word is used today to refer to network-connected hardware devices?

Answers

The word used now to refer to it is endpoint.

The word that is used today to refer to network-connected hardware devices is an endpoint device.

What is an endpoint device?

Any device that is physically an endpoint on a network is referred to as an endpoint. Endpoints include desktop computers, laptops, mobile phones, tablets, servers, and virtual environments.

The desktop, laptop, or smartphone that the antivirus is installed on is the endpoint when one thinks of a traditional home antivirus.

On a TCP/IP network, an endpoint device is a piece of hardware with Internet access. In addition to printers and thin clients, the phrase can also be used to describe point-of-sale (POS) terminals, smart meters, smartphones, tablets, thin clients, and laptops.

Therefore, an endpoint device is a term used today to describe hardware components connected to a network.

To learn more about endpoint devices, refer to the link:

https://brainly.com/question/24768005

#SPJ12

Determine if the statement is true or false. Asymmetrical design can be visually balanced from left to right.
True or false

Answers

Answer:

true false asan pala tanong dyan?

It is false that the asymmetrical design can be visually balanced from left to right.

What is asymmetrical design?

Asymmetrical balance is the technique of achieving a sense of balance by using different visual elements of unequal weight on both sides of a composition.

If you understand that symmetrical means that both sides of something are identical, it should be simple to understand that asymmetrical means that the two sides are different in some way.

Asymmetrical objects are irregular and crooked, and do not perfectly match up when folded in half.

Asymmetry is the lack of symmetry or equality between your design's halves. While both halves of a symmetrical design are the same (or similar), both halves of an asymmetrical design are distinct.

Thus, the given statement is false.

For more details regarding asymmetrical design, visit:

https://brainly.com/question/14701136

#SPJ5

5. From the following risks of BYOD (Bring Your Own Device), which one is the most
important for an Employee * (1 Point)
O Technical challenge of connecting to Wifi
O Privacy and confidentiality of 'personal information
Data Breach
Sharing resources like printers

Answers

Answer:

B

Explanation:

you can easily fix a bad connection, but getting other people's data breach is a serious violation.

Hello Can someone help me with this problem?
Bob and Alice want to send each other secret messages that no one else will have access to. They have decided that they will use a locked box to hold the secret messages, and they will drop the box off in each other’s mailboxes. The problem is that if they use a combination lock, they will have to send the combination to the box and someone might intercept it. Here are the materials they have access to:
A box that can be locked with a combination lock
Two combination locks (the kinds that click shut that you might use on a school locker)
Paper
Pencil
Describe a protocol Bob and Alice can set up to deliver these messages securely.

Answers

Explanation:

Bob and Alice could first send each other their open locks. Then, e.g., Alice can send a message to Bob and lock her box with Bob's lock, and vice-versa.

A more real-world approach to this problem is that they use a form of Diffie-Hellman approach to exchange a combination for the lock.

Diffie-Hellman is an algorithm where you can exchange secrets even if you know someone is intercepting each and every message you exchange. It's a bit mathematical, but still very cool.

Which of the following measures the amount of substance?

candela
kilogram
ampere
mole

Answers

The measure of the amount of substance is the mole. The correct option is d.

What is the amount of substance?

The mole, denoted by the sign MOL, is the SI unit for measuring the amount of a substance made up of a particular elementary particle. Examples are an atom, molecule, ion, electron, or other particle or a specific set of particles.

Calculating the amount of any material is done using the mole, a SI unit of measurement.

Therefore, the correct option is d. mole.

To learn more about the amount of substance, refer to the below link:

https://brainly.com/question/20486415

#SPJ1

a systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.

Answers

A systems analyst conducts a preliminary investigation to study the schedule feasibility and recommend specific action.

A feasibility study is a thorough analysis of a proposed project that considers all elements essential to success in order to determine the project's likelihood of success. Business success can be primarily described in terms of ROI, which is the projected revenue from the project.

A proposed plan or project's viability is assessed in a feasibility study. A project or business venture is assessed for its viability as part of a feasibility study to ascertain if it will be successful.

A feasibility analysis, as its name suggests, is used to assess an idea's viability, such as confirming that a project is both legally and technically possible as well as economically justifiable.

As a project will fail if it is not finished on time, this assessment is crucial to its success. An organization determines the project's estimated completion time when determining scheduling feasibility.

The feasibility analysis assists in identifying any potential obstacles the proposed project may encounter, such as:

Internal project constraints, including those related to technology, finances, and resources.

Financial, marketing, and export restrictions are internal corporate constraints.

Logistics, the environment, laws and regulations, among other external constraints.

To know more about feasibility click on the link:

https://brainly.com/question/15016731

#SPJ4

Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he or she is finished providing inputs. After the user presses the enter key, the program should print the sum of the numbers and their average.

Answers

The program that receives a series of numbers from the user is:

theSum = 0.0

# stores the number of terms entered by the user

n = 0

# loop until user presses the enter key

# infinite loop

while True:

# get user input from user

data = input("Enter a number or press Enter to quit: ")

# if user presses enter

if data == '':

# break out of the loop

break

# convert data into float using float()

number = float(data)

# add the entered number to theSum

theSum += number

# increase the number of terms

n += 1

print()

print("The sum is", theSum)

# if numbers of terms entered are greater than 0

if n > 0:

# calculate average

average = theSum / n

print('The average is', average)

# if no terms are entered

else:

print('Average : undefined (as the number of terms entered are 0)')

What is a program?

A computer program is a set of instructions written in a programming language that a computer is supposed to obey.

Computer programs are one of the intangible components of the software, which also includes documentation and other components. The version of a computer program that humans can read is called the source code.

Learn more about program on;

https://brainly.com/question/23275071

#SPJ1

susan wants to bring out as much tone and shading in her prints as possible what type of paper should she use

Answers

Since Susan wants to bring out as much tone and shading in her prints as possible, the type of paper that she need to use is Strathmore Toned papers.

What effect does value shading have on a piece of art?

Value is employed to simulate the appearance of highlights and shadows. The illusion of a light source is produced by the interaction of highlights and shadows.

Tone can be a key instrument for generating contrast in an artwork by establishing a sense of antagonism and tension between various elements or by drawing attention to certain areas of the composition.

Your speed increases on a toned surface. more approachable than a white paper. minimize glare when it is sunny. stronger compared to several other art paper varieties. come in a huge range of hues.

Therefore, In a sketchbook, artists would record the images that served as their sources for larger, more complex paintings.

Learn more about shading from

https://brainly.com/question/25729154

#SPJ1

Network access methods used in PC networks are defined by the IEEE 802
standards.
O a.
False
O b. True

Answers

Answer: stand

Explanation:

Some one please help me​

Answers

The Computer Networking Topology indicated above is called the Star Topology. While the Connecting Devices are:

Modem (Direct Connection to the Internet)Switch (Connects the internet to other devices via Lan and via the wireless router)

What is a Computer Network Topology?

The layout of the elements of a communication network is referred to as network topology. The term network topology refers to the layout of several forms of telecommunication networks, such as command and control radio networks, industrial field busses, and computer networks.

Physical things that can communicate with one another and other systems through the internet are referred to as connected devices. They range from classic computer gear like a laptop or desktop to typical mobile devices like a smartphone or tablet to an ever-expanding spectrum of physical devices and things.

A central hub or switch serves as a type of intermediary for data transfer in a star architecture. When seeking or supplying communication, each network device enlists the central hub.

Star topologies are simple to debug and scale since one broken node does not affect the others. For this architecture to function properly, the centralized device must constantly be in good working order.

Learn more about network topology:
https://brainly.com/question/13163014
#SPJ1

Which statement is NOT related to computational thinking?

Answers

The statement that is not related to computational thinking are option A, B and D:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

What exactly is computational thought?

That difficult challenge is broken down into a succession of smaller, more manageable problems using computational thinking (decomposition).

Note that the ability to apply core ideas and logic from computer science and computing to address issues across all domains is known as computational thinking. CT is a set of problem-solving techniques used in education that entails describing issues and potential answers in a way that a computer might also carry out.

Therefore, The ability to solve problems in the actual world is computational thinking's greatest advantage.

Learn more about computational thinking  from

https://brainly.com/question/19189179
#SPJ1

See choices of this question below:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions,

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is basically synonymous with programming.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems

Understanding all of the minor details about a problem is critical in computational thinking

The python language is not sensitive to block structuring of code.

a. True
b. False

Answers

Answer: False

Resource of Information: Quizlet

The statement "The python language is not sensitive to block structuring of code" is false.

What is python language?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code.

Python uses block structuring and indents for loops, so this is simply untrue. Pressing the tab will indent the code, and anything that is not indented will not be included in the loop. Python is therefore responsive to block structuring.

Therefore, the statement is false.

To learn more about the python language, refer to the link:

https://brainly.com/question/14068778

#SPJ12

What is the difference between symbolic addressing and absolute addressing? Which addressing is easier to understand

Answers

Symbolic addressing varies from Absolute Addresses in that they specify relocatable addresses by either utilizing an emblem as the label in the name field of an assembler code statement or equating a symbol to a relocatable expression. Absolute addressing (or values) are obtained by equating a marker to an absolute expression.

What is a symbolic address?

A symbolic address is associated with a program symbol or a symbol defined by the Equate subcommand. The topic of certified symbolic addressing is covered further down. See Restrictions on the Use of Symbols for a more thorough explanation.

In memory management, the compiler binds symbolic addresses from the source program on disk to relocatable locations (which are the instruction addresses relative to each other). The linker then associates the relocatable address with absolute addresses (which are the physical addresses allocated in key memory).

The contents of a register reflect an absolute address. The contents of a register reflect an absolute address. In the sense that it is not stated relative to the present instruction address, this addressing method is absolute.

Learn more about addressing:
https://brainly.com/question/28769221
#SPJ1

converting 13975 from decimal number to binary format​

Answers

13975 from decimal to binary is 11011010010111.

1. Manny would like to design a flier for his new restaurant advertising their new
weekly specials. Which of the following programs should he use to complete this
task?
A. Microsoft Word
B. Microsoft
Publisher
C. Microsoft PowerPoint
D. Microsoft Excel

Answers

Since Manny would like to design a flier for his new restaurant advertising their new weekly specials, the software program which he should use to complete this task is: B. Microsoft Publisher.

The Microsoft Office package.

Generally speaking, the Microsoft Office comprises different software applications and these include the following:

Microsoft PublisherMicrosoft Word.Microsoft PowerPoint.Microsoft Excel.Microsoft AccessMicrosoft Project

What is Microsoft Publisher?

Microsoft Publisher can be defined as a desktop publishing software application or program that is designed and developed by Microsoft Inc.,  in order to avail its end users an ability or opportunity to work on page layout and graphic design such as a flier.

Read more on Microsoft Publisher here: https://brainly.com/question/26717262

#SPJ1

Answer:

D. Microsoft Excel

Explanation:

If String str = "United States";, then what is the value of str.substring(2, 4);? (2 points)

ni
nit
it
ite
nite

Answers

Explanation:

Program PascalABC:

Rezult  ited

What is the value of grade after this program is executed? Assume the score is 71. if score >= 90: grade = "A" elif score >= 80: grade = "B" elif score >= 70: grade = "C" elif score >= 60: grade = "D" else: grade = "F" grade =

Answers

Answer:

C

Explanation:

if the score is 71 it would fall into 70 because it is not greater than 80 and not less than 70

Answer:

F= 50%

Fail is 50% grades.

1. Your employer is opening a new location, and the IT director has assigned you the task of calculating subnets for the new network. You’ve determined that you need 50 subnets for the class B network beginning with the network ID 172.20.0.0. how many unused subnets will be waiting on hold for future expansion? How many possible hosts can each subnet support?

Answers

14 subnets that are unused will be waiting on hold for future expansion.1022 possible hosts can each subnet support.

What is subnets?

A subnetwork, also known as a subnet, is a logical division of an IP network. Subnetting is the practise of dividing a network in to the two or more networks. Computers on the same subnet are addressed in their IP addresses with the same most-significant bit-group. As a result, an IP address is logically divided up into two fields: the network number or routing prefix and the rest field as well as host identifier. The rest field identifies a particular host or network interface.

After subnetting, we have 16+6 = 22 network and 16-6=10 host bits.

No. of unused subnets = 2^6-50 = 14 subnets

No. of hosts. per each subnet =2^10-2 = 1022 hosts.

To learn more about subnets

https://brainly.com/question/28256854

#SPJ9

three transformations are available when you right-click a column header in the Query Editor window?

Answers

The three transformations are available when you right-click a column header in the Query Editor window are:

RemoveChange TypeDuplicate ColumnWhat is a query editor window?

You may edit and run queries using the Query Window, a fully featured editing environment. A few of the features the editor offers are listed below: editing with drag and drop. Automatic syntax highlighting and brace matching

What purposes does the query editor serve?

Power Query Editor is a component of Power BI Desktop as well. Connect to one or more data sources using Power Query Editor, then shape and manipulate the data to suit your needs before loading the model into Power BI Desktop.

How can you build a query editor?

The query you want to open should be double-clicked. Then, right-click the selected area and select Design Query in Editor from the menu that appears.

To know more about query editor window visit:

https://brainly.com/question/27960642

#SPJ10

I understand that the question you are looking for is:

Which 3 transformations are available when you right click a column header in the Query Editor window?

Kinoflos are a type of:


A. A lighting wheel that contains red, blue, and green scrims

B. A type of fluorescent soft light

C. Bright overhead incandescent spotlight

D. A type of fluorescent hard light

Answers

Answer:

d a type of ni is the way to go

Beth wants to start multimedia business in 3D modeling and sound integration and editing. She should invest in____ for 3D modeling and____ for sound editing.

Answers

Beth wants to start a multimedia business in 3D modeling and sound integration and editing. She should invest in Adobe Substance 3D Modeler for 3D modeling and Adobe Audition for sound editing.

What is 3D modeling?

3D modeling is a method in 3D computer graphics that involves manipulating edges, vertices, and polygons in a simulated 3D environment to create a mathematical coordinate-based depiction of any surface of an object in three dimensions using specialist software.

3D modeling may be applied almost anywhere. We know it's popular in film, video games, and animation, but that's not all. From architecture to mechanical engineering to the medical business, all of these demanding industries are finally realizing and capitalizing on the full potential of 3D modeling. 3D modeling may be beneficial in a variety of ways.

3D modeling may be classified into the following categories:

Solid modeling is used to create three-dimensional forms. The forms may differ, yet they function as building blocks when combined. Depending on the input, some of these blocks add material while others delete.

When the surface is complicated and curved, wireframe modeling might be useful. You'll eventually discover that the fundamental building blocks of solid modeling are too obtuse for some applications, while wireframe modeling gives the refinement for more complicated designs.

The next level of complexity is surface modeling. Smooth surfaces and flawless integration are required for highly professional applications, which may be handled by more complicated programs that need more labor and computational capacity.

Learn more about 3D modeling:
https://brainly.com/question/820276
#SPJ1

Answer:

An animation tool

a sound editing tool

Explanation:

Just took the quiz and got it right.

Both radio and television signals are carried by radio waves. What other type of electromagnetic radiation is used to send information over long distances?



a
ultraviolet light
b
X-rays
c
gamma rays
d
microwaves

Answers

Answer:

Explanation:

c

A paralegal bills a law firm for 19.5 hours of work at a rate of £240 per hour. How much money has the paralegal earned from this job? Include units in your answer.

Answers

The amount of money that this employee (paralegal) has earned from his job is equal to £4,680.

What is an expression?

An expression can be defined as a mathematical equation which is used to show the relationship existing between two or more variables and numerical quantities.

In this exercise, you're required to calculate the amount of money that this employee (paralegal) has earned from his job. Therefore, an expression which can be used to calculate the amount of money that this paralegal staff earned is given by:

Amount of money = Rate × Amount of hours worked

Substituting the given parameters into the formula, we have;

Amount of money = 240 × 19.5

Amount of money = £4,680.

Read more on expressions here: brainly.com/question/17361494

#SPJ1

Do you know how many regular people are making 2k a day with 100% commissions?

Answers

Answer:

Depending on your job role, your commission may subsidize your paycheck or be dependent on it. Meaning you either have a base salary and earn extra money through bonus schemes or incentives, or you must make sales if you want to receive a paycheck at the end of the month.

which common design feature among instant messaging clients make them less secure than other means of communicating over the internet?

Answers

Peer-to-peer networking is the common design feature among instant messaging clients make them less secure than other means of communicating over the internet.

A straightforward computer network is a peer-to-peer network. It was created for the first time in the late 1970s. Within this network, each computer serves as a node for file sharing. There is no central server in the network because each node acts as a server in this case. This makes a tremendous amount of data sharing possible.

Each node receives an equal share of the tasks. Each linked node in the network has an equal share of work to do. Each node must stop functioning for the network to cease to exist. This is so that each node may function independently.

These networks often have less than 12 nodes, which is not a very large number. Although each machine in the network stores its own data, the entire group has access to it.

Peer-to-peer networks, in contrast to client-server networks, both use and provide resources. If the quantity of nodes rises, more resources are needed. Software specifically for this is needed. It enables network-wide resource sharing.

The nodes serve as both clients and servers, therefore an assault is always a possibility. Peer-to-peer networks are supported by almost all OS today.

To know more about peer-to-peer click on the link:

https://brainly.com/question/10571780

#SPJ4

You have a customer who is having issues with their
computer audio, What do you have them check first?*

Answers

Answer:

Explanation:

What is the Product Rule of Exponents?When multiplying two numbers with the same base, their powers/exponents would be added.For example, .Given:(a²c)³Therefore:(a²c)³ = (a²c)(a²c)(a²c) (a²c)³ = (a²c)³ = Therefore, applying the product rule of exponents, (a²c)³ = .

Other Questions
Which doesnt belong and why?Pawnshops, Payday loan company, rent-to-own center or savings and loan association m. The formula shown can be used to find A, the amount of money Ricardo has in his savings account. A=P+PrtRicardo wants to find r, the rate of interest his money earns. Which equation is correctly solved for r? 10. Which of these are characteristics of Renaissance art?Emphasis on nature and wood carvings.Islamic themes and Geometric designUse of perspective and Emphasis on Human form. Question 10Which sentence contains a fragment?a. To people who don't know them well. The identical twins are impossible to tell apart. But their friends notice subtle differences.b. To people who don't know them well, the identical twins are impossible to tell apart. But their friends notice subtle differences.c. The identical twins are impossible to tell apart to people who don't know them well. But their friends notice subtle differences. the product of (5ab) and (- 2a^2 b)^3 The equation 2x^2 - 3x - (k+1)=0 where k is a constant has no real roots. Find the set of possible values of k Spanish help please? _____ profesor______ en______ escuela Santo Domingo son buen____.Word Bank: El la es o os Losfill in the blanks In Chapter 4 of The Scarlet Letter, what do the circumstances of Roger Chillingworths arrival in the settlement reveal about the time period in which the novel takes place?Settlers were dependent on Native Americans for all their medical and clothing needs.Settlers had an efficient system of communication in place between their old and new worlds.Settlers charged strangers who arrived in their settlement with trespassing and sentenced them to time in prison.Settlers were dependent on Native Americans for survival in the wilderness beyond the settlement. The function shown can be used to determine the amount of money, indollars, in a savings account after m months. If no money is added orwithdrawn, which of the following is closest to the amount of money inthe account after 30 months?f(m) = 1500(1.003)^m cutting the top of the plant does not increase the height state the value of as a 5/7 recurring decimal Try Again3Graph the line with slopepassing through the point (-4,5) Order the numbers from least to greatest. PLEASE HELP Can someone help me with this?Examine roadblocks to decision-making in your life, and possible steps for correction.Type an essay of no less than 125 words naming which of these six people most nearly represents your weakness (from L6, Career Decisions). Then explain how it may affect your career and ministry, and describe what you should do to correct it.Skeptical SteveParalyzed PattyFrustrated FrankShrinking ShirleyImpulsive IvanPaula Procrastinator to what extent was the 1862 pacific railway act responsible for westward migration If the cost of buying three sodas and a candy bar are given by the expression 3c + 1.50, where c is the cost of a soda can.What is an equivalent expression to the cost?Select ALL that apply.Select all that applyA1.50 +3cB (0.50 + c)3C 3.50c +1D 3(c+0.50)E 4.50c why do isotopes of the same element have different number of neutrons? true or false? in a perfectly competitive market, there are limited amounts of buyers and sellers in the industry. solve the system of equations for each variable x, y, and z. please show your work 2xy=z 4x+z=4y y=x+1 which is the best summary of the story ending found in paragraphs 13-20 aiden goes silent