Answer:
The code is shown below.
Explanation:
Consider the provide information.
We need to find the perimeter of the triangle.
The perimeter of the triangle is the sum of all sides.
So the perimeter should be: 10 cm + 14 cm + 15 cm = 39 cm
Now we will write a Java program to find the perimeter.
public class MyClass {
public static void main(String args[]) {
int x=10;
int y=14;
int z=15;
int A=x+y+z;
System.out.println("The perimeter of the triangle is 10 cm + 14 cm + 15 cm = " + A+" cm");
}
}
Execute the program and you will get a result like this:
The perimeter of the triangle is 10 cm + 14 cm + 15 cm = 39 cm
Refer to the image for better understanding.
points)
(01.01 MC)
Which is an example of correct HTML?
This is a heading
This is a heading
This is a title
This is a title
Answer:
For a heading it would be <heading> </heading>
For a title it would be <title> </title> title goes in the heading by the way
Explanation:
You use tags in html
You put a title tag in the heading tag in html
The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the solutions that were used and along with the outcomes.
Answer:
The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.
Explanation:
Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.
Shane is debugging code and found a line reading Favorite Snack = "blueberry muffins". How should the line look after it’s been debugged?
Favorite_Snack = "blueberry muffins"
favorite snack = "blueberry muffins"
Favorite Snack is "blueberry muffins"
Favorite Snack = "blueberry_muffins"
Answer:
Favorite_Snack = "blueberry muffins"
Explanation:
Variable names cannot have spaces in them
Give four advantages for ssd compared to hdd
Answer:
Explanation:
SSD is not affected by magnets
SSD is more reliable because it uses flash technology instead of platters and arms.
SSD has no moving parts so it has less chance of breaking down
SSD makes no noise because it has no moving parts.
Choose the assistive technology that best completes each sentence.
A __ provides a magnification of a chosen area of the screen, without reference to other parts of the
screen.
A __ provides magnification of a portion of the screen in relation to the rest of the screen, much like a
physical magnifying glass.
A zoom feature provides a magnification of a chosen area of the screen, without reference to other parts of the screen.
A screen magnifier provides magnification of a portion of the screen in relation to the rest of the screen, much like a physical magnifying glass.
What does a screen magnifier do?A screen magnifier enables persons with vision impairment who can still see to access and interact with digital content, such as websites and papers.
Note that A screen's magnification function involves zooming in on specific areas of the screen or the entire screen to simulate using a magnifying glass.
Therefore, too zoom in and out is to make something or someone appear much larger as well as closer, or much smaller and farther away through using a camera or computer.
Learn more about magnifier from
https://brainly.com/question/27173427
#SPJ1
_____ is the process by which the visual cortex combines the differing neural signals caused by binocular disparity, resulting in the perception of depth.
Answer:
Stereopsis
Explanation:
Stereopsis is the process by which the visual cortex combines the differing neural signals caused by binocular disparity, resulting in the perception of depth.
Complete the output for the following program?
for num in range(4):
print (num * 4)
OUTPUT:
First: ___
Second: ___
Third: ___
Fourth: 12
Answer:
First: 0
Second: 4
Third:8
Fourth: 12
Explanation:
The for loop will generate numbers from 0 to 3 (one before 4), and theier product with 4 will be shown on screen.
Which type of information could be displayed using this line graph?
a comparison of how frequently earthquakes occur in different areas over a period of time
the percentage of grades obtained by one class on a certain test
the physical features of a given land mass
the number of students in one class in a local school
Answer:
The first one I'm sorry if I'm wrong
Answer:
A u were right dont worry :)
Explanation:
The user is told to guess a number between one and 10.
Which responses from the user could cause the program to halt with an error statement? Choose two options.
two
2.5
12
-3
0
Answer:
0 and -3
Explanation:
These two options do not fall within 1 and 10.
Answer:
2.5 and two
are the answers
How has music changed with the use of technology?
Musicians can now share their music on the World Wide Web.
Music can easily be created and edited with different applications.
Developers can include music in the background of their websites.
all of the above
please help
Answer: All of the above
Explanation:
Music like most other things, has been changed by its interaction with technology. Music for instance can now be shared on the internet to people far away from each other with services like Apple music and Tidal benefitting from this.
Different applications have also been created that can help make music from being able to create instrumentals to changing the voices of singers.
Developers are now even able to include their music in their website background as way to market their product, proof of another way music has changed due to technology.
Answer:
all of the above
Explanation:
what is a filter in excel (please keep your answer brief)
Answer:
The Excel FILTER function "filters" a range of data based on supplied criteria. The result is an array of matching values the original range. When this array is the final result (i.e. the results are not handed off to another function) matching results will "spill" on to the worksheet.
Explanation:
A website wants to gives out detailed information to viewers about its upcoming conference and also provides a feature for searching the
website's internal content. Which planning tool addresses these aspects based on prioritization of text?
OA page description diagrams
ОВ.
wireframe
OC.
sitemap
OD.
navigation
The planning tool that addresses these aspects based on prioritization of text is wireframe.
What is website?A website is described as a composition of web pages and linked content that is seen by a common domain name and then they are published on any web server.
Note that a wireframe is said to be a two-dimensional depiction of a page's interface that is known to be based on space allocation and prioritization of content, etc.
Learn more about website from
https://brainly.com/question/13171394
Greg wants to check the amount of requests his website receives. What test can he use?
A
functionality test
B.
user test
C.
performance test
D.
website load test
Help ASAP
Answer:
D - Website load test
Explanation:
Just got it right
what key do you have to press i order to send your finish information to the CPU
Answer:
Enter key.
Explanation:
The key you have to press in order to send your finish information to the central processing unit (CPU) is the Enter key.
In Computer science, the Enter key found on all keyboards serves a similar purpose (function) as the OK button and it is typically used to end or finish an entry and sequel to that, starts the processing of the information entered into the computer system.
This ultimately implies that, when a computer user wishes to enter or send a finished information to the central processing unit (CPU), he or she is required to hit the Enter key.
A video conference on the topic: "The internet solves more problems than it causes". You will then be asked to discuss this question and your results will be marked!
What do you think about this topic
Answer:
Internet help us in daily life. i save our time, also it let us to connect with our friends and family, faster with no time
Explanation:
Hi, that what do i know
Which statement describe the advantages of using XML? more than one answer can be correct
A-it saves file space
B-it allows for data storage in a separate file
C-it is hardware dependent
D-it is software independent
E-it facilitates the transport of data
Answer:
The statements that describe the advantages of using XML are;
B-It allows for data storage in a separate file
D-It is software independent
E-It facilitates the transport of data
Explanation:
XML data can be stored in separate file such that the layout and display can designed in HTML whereby the data in the XML file can be changed without changing the HTML
XML is both software and hardware independent thereby it is possible to use the same XML to carry information to different computers and software
XML is used for data transport.
HURRY
I ONLY HAVE 4 DAYS LEFT
In a multiplayer game, you are part of a team that consists of players from all over the world. You are a warrior and prefer to carry weapons with you. Another member in the team takes on the role of the team medic, and carries regenerative potions. Whenever you are injured, you can access the medic’s inventory to swap your weapons with potions. What kind of interaction has been described here?
A.
player-to-game interaction
B.
cooperative player-to-player interaction
C.
direct player-to-player interaction
D.
competitive player-to-player interaction
E.
player-to-platform interaction
Your answer is B: cooperative player-to-player interaction
Roses are red, violets are blue, I'm going to ki.ll myself, to make life better for you.
Answer:
i like this poem helps out the world
Explanation:
p,s. deserves brainiest
Are you able to connect a VPN to a Spectrum Internet modem or do you need a Router for that. Are routers better than modems?
Answer:
Yes
Explanation:
Spectrum Internet modems work very wells with VPNs.
Input of ___________________ and generating _____________________ is an example of how a business uses data and processes it into meaningful information.
Answer:
Input of _______data______ and generating _____information (reports)____ is an example of how a business uses data and processes it into meaningful information.
Explanation:
The data processing is the transformation of data into actionable information to ease decision making. The steps involved in data processing include data collection, data preparation, data input, processing, and information output and storage. These steps enable data to become useful to the user. Without data processing, data and information may be too complex for usage.
describe how there has been a reduction of employment in offices, as workers' jobs have been
replaced by computers in a number of fields (e.g. payroll workers, typing pools, car production
workers)
Answer:
Automation is the term you are looking for. When we automate things in a business, it can reduce the amount of manual input needed to complete tasks. With the reduced need of manual input, this leads to many jobs being unnecessary. Furthermore, automation can be significantly more efficient in handling repetative tasks.
One major example of this is a stock brokerage room. In the 1980's, you'd see many people with phones, calling and making trades with other brokers. It would be loud, cluttered and a mess. However, nowadays all of these trades are done at incredibly fast speeds by computers with relatively small input from humans.
Which of these tools can best be used as a self assessment for career planning purposes?
a personality test
an asset analysis
a self-directed learning experience
a goal development checklist
Answer:
C. would be your answer
Explanation:
just took the test
E-governance is the only solution against corruption. justify the statement in context of nepal
Answer:
Following are the solution to this question:
Explanation:
The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.
E-government involves against the utilization of Intelligent as the impact of government way of managing practice evidence, accountability as well as traceability, responsiveness.
It's often stated that decreasing the possibility of bribery thru enhanced government employee supervision and minimizing the necessity for civilian involvement with employees delivering critical services reduces the chance of corruption.
Thus the response above is right.
Learn more about corruption here:
https://brainly.com/question/24673177
Is the app scener safe? its a chrome webstore app on computer.
Answer:
Maybe
Explanation:
If you are unsure if a website is safe look for signs. If its asking you to allow advertisement then no. I suggest you download a VPN before going to the website just to be safe
can some one please help me
Answer:
Option "3" is correct answer to the following question.
Explanation:
A process is a procedure on your machine that is working. This could be anything from a tiny context job to a filled program like Web Browsers or Sql Server, such as a cast or device event controller. One or even more strings are made of all operations.
If you have a spectrum modem can you connect it to a VPN without a Router. Is it possible to do?
Answer:
From the internet itself, not sure if this will help, but if does, great.
Explanation:
Charter Spectrum Internet works with VPNs very well. You can install it on your device or have it set up on the router. In the latter case, the VPN automatically turns on when you use the Internet from any device be it a smartphone, PC, or tablet.
write an algorithm to calculate the simple interest using the formula
Answer:
step 1:- start
step 2:-read principal amount, rate and time
step 3:- calculate interest using formula sI=((amount*rate*time)/100)
step 4:- print simple interest
step 5:- //CPP program to find compound interest for. //given values
PYTHON 7.1.6: Sandwich Sandwiches (codehs)
In this exercise, write a function called sandwich which takes a 3 letter string. Your function should return the letters that are at the beginning and end of the string.
For example,
sandwich("pbj")
# => "pj"
sandwich("blt")
# => "bt"
I've included my code below. Best of luck.
Following are the Python program to calculate the string value:
Program Explanation:
Defining a method "sandwich" that takes string variable "x" in parameter.Inside the method, a return keyword is used that removes the middle string value.Outside the method, a print method is used that calls the "sandwich" method which accepts a string value in it and prints its return value.Program:
def sandwich(x):#defining a method sandwich that takes string variable x in parameter
return x[0]+ x[-1]#using return keyword that remove middle string value
print(sandwich("pbj"))#calling method and print its return value
print(sandwich("blt"))#calling method and print its return value
Output:
Please find the attached file.
Learn more:
brainly.com/question/8647085
Your manager wants you to implement a type of intrusion detection system (IDS) that can be matched to certain types of traffic patterns. What kind of IDS is this?
Answer:
Signature-based IDS.
Explanation:
IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.
Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;
1. Statistical anomaly-based detection.
2. Stateful protocol analysis detection.
3. Signature-based detection.
In this scenario, your manager wants you to implement a type of intrusion detection system (IDS) that can be matched to certain types of traffic patterns. Thus, this kind of IDS is known as a signature-based IDS.
A signature-based detection system refers to a type of detection and protection system used to detect a malicious attack such as a worm, virus, trojan, malware etc., by checking and matching them with a repository of specific signatures, patterns or fingerprints.
what is the use of functions in Ms excel
Answer:
To perform or carry out calculation
Explanation:
Function is a special command or set out the formula in Microsoft Excel, that accomplishes calculations using specific values in a specific arrangement.
For example, in Microsoft Excel, Function can be applied to rapidly deliver or calculate outcomes such as total sum, average, count, main value, and least value for a range of cells.
Hence, in this case, the correct answer is "To perform or carry out the calculation.".