The Digital Millenium Copyright Act (DMCA), which was passed into law in 1998, is one significant piece of legislation pertaining to digital media. A legal basis for copyrighted content protection is provided by the DMCA.
What research methods do journalists use?Journalistic research has many different components, including online searching, poring over data, records, surveys, and polls; phone calls with sources, experts, and officials; formal in-person interviews; trips to libraries and archives; and the traditional method of pounding the pavement and networking.
How do reporters find their stories?Journalists use a variety of sources to gather articles and news items for their work. The inspiration sometimes comes from close friends, but most of the time it comes from freely available public sources.
To know more about Copyright visit:-
https://brainly.com/question/22399852
#SPJ1
will give brainliestSelect the code that a program would follow to draw a triangle after the pen down command. (2 points)
a
Move 100 steps, turn right 120 degrees, move 100 steps with two iterations
b
Move 100 steps, turn right 120 degrees with three iterations
c
Turn right 120 degrees, move 100 steps, turn right 120 degrees with two iterations
d
Turn right 120 degrees, move 100 steps with zero iterations
Question 2 (2 points)
(04.01 LC)
Select the function that will tell the sprite to draw a square. (2 points)
a
block-based code with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 90 degrees with 4 iterations
© Scratch 2018
b
block-based code with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 100 degrees with 4 iterations
© Scratch 2018
c
block-based code blocks with the commands draw square left bracket right bracket, pen down, and move 100 steps turn 90 degrees with 3 iterations
© Scratch 2018
d
block-based code with the commands draw square left bracket right bracket, and move 100 steps turn 90 degrees with 4 iterations
© Scratch 2018
Question 3 (2 points)
(04.01 LC)
Sebastian wants to write a program to have his sprite draw a pentagon, move ten steps, and draw another pentagon in a different color. What is the last block he needs to add to complete his code? (2 points)
block-based code with the commands when space key pressed, draw pentagon left bracket right bracket, move 10 steps
© Scratch 2018
a
block-based code with the commands change color by ten, draw pentagon left bracket right bracket
© Scratch 2018
b
block-based code with the commands change pen size by 1, draw pentagon left bracket right bracket
© Scratch 2018
c
block-based code with the commands pen down, draw pentagon left bracket right bracket
© Scratch 2018
d
block-based code with the commands set pen color to blue, draw rhombus left bracket right bracket
© Scratch 2018
Question 4 (2 points)
(04.01 MC)
Madison wants to create a code that will turn on the lights if it is dark, and turn off the lights if it is sunny. There is a bug in her code. Which block is the bug? (2 points)
block-based code with the commands if it is sunny, then turn on lights, if it is dark then turn on lights
a
block-based code with the commands if it is dark then empty space
b
block-based code with the commands if it dark, then turn on the lights
c
block-based code with the commands if it is sunny then turn on the lights
d
block-based code with the commands turn off the lights
Question 5 (2 points)
(04.01 MC)
Jim is debugging his code. What should he do first? (2 points)
a
Change the code to fix the bug.
b
Check whether the bug is fixed.
c
Know what the code is supposed to do.
d
See where the error is.
Question 6 (2 points)
(04.01 MC)
Select the block of code that will create this picture. (2 points)
a triangle
© Scratch 2018
a
block-based code with the commands define draw triangle left bracket right bracket, pen down, turn right 120 degrees, move 100 steps with three iterations
© Scratch 2018
b
block-based code with the commands define draw triangle left bracket right bracket, pen down, turn right 120 degrees, move 100 steps with two iterations
© Scratch 2018
c
block-based code with the commands define draw triangle left bracket right bracket, pen up, turn right 120 degrees, move 100 steps with three iterations
© Scratch 2018
d
block-based code with the commands define draw triangle left bracket right bracket, pen up, turn right 60 degrees, move 100 steps with three iterations
© Scratch 2018
Question 7 (2 points)
(04.01 LC)
In order to draw a shape on the stage, what does the following function need? Move 100 steps, turn right 90 degrees with four iterations. (2 points)
a
Event block with the commands when space key pressed, then draw square
b
If-then block with the commands if draw square, then run function
c
Known initial condition using the pen down command
d
Loop block with two iterations
Question 8 (2 points)
(04.01 LC)
Dexter is trying to draw a rhombus and play the pop sound at the same time in his program. How should he correct the error in this algorithm? When space key pressed, draw rhombus, play pop sound. (2 points)
a
Add another when space key pressed event and move play pop sound to that event.
b
Change the draw rhombus command to a draw triangle command.
c
Put the code inside a loop block with two iterations.
d
Use a conditional block so that the code is if draw rhombus, then play pop sound.
Question 9 (2 points)
(04.01 LC)
Select the code that a program would follow to draw a rectangle after the pen down command. (2 points)
a
Move 100 steps, turn right 90 degrees, move 50 steps, turn right 90 degrees with four iterations
b
Move 100 steps, turn right 90 degrees, move 50 steps, turn right 90 degrees with two iterations
c
Move 100 steps, turn right 90 degrees with four iterations
d
Move 100 steps, turn right 90 degrees with two iterations
Question 10 (2 points)
(04.01 MC)
Answer:
LOOK AT IMAGE, MARK AS BRAINLIEST!
What is authentication?
А
The process of converting data that has been converted into an unreadable form of text back to its original form
B
The process of converting data into an unreadable form of text
С
O
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
D
The process of providing proof that a transaction occurred between identified parties
Answer:
C
Explanation:
I believe that's the answer if it's not sorry
what did Ada lovelace do
Answer: Ada Lovelace is often considered to be the first computer programmer!
Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.
name two different colors used in the python program file window.name the type of program content that has each color ......
whoever answer this correct i will rate them 5 stars and a like .....
please urgent
In the Python program window, black is used for code and syntax, while white is used as the background.
How is this so?1. Black - The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.
2. White - The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.
Learn more about python program at:
https://brainly.com/question/26497128
#SPJ1
Suppose a message is 10 characters long. Each character can be any of the 26 characters in the alphabet and also any character 0 through 9. How many different ten character long sequences exist? Justify your reasoning.
There are 7,800 different passwords character long sequences exist.
Here we need to count the number of options for each of the digits of the password. The first character has 26 options (26 letters in the alphabet).
The second character has 10 options (ditis from 0 to 9), and also does the third character.The fourth character has 3 options (%,*, or #)
The total number of different passwords that can be generated is given by the product between the numbers of options, so we have:
C = 26*10*10*3 = 7,800
There are 7,800 different passwords.
Learn more about combinations on:
brainly.com/question/11732255
#SPJ1
What might happen to the wire if the uneven load is never balanced
If an uneven load on a wire is never balanced, it can lead to a variety of potential problems and risks. One of the most common consequences of uneven loading is the buildup of stress and tension in the wire, which can cause it to become overstretched and potentially snap or break.
When a wire is subjected to uneven loading, such as when a heavier weight is placed on one side of the wire than the other, the tension in the wire becomes unbalanced. This can cause the wire to become stretched beyond its normal limits, which can lead to deformation, fatigue, and ultimately failure. If the wire is not balanced, it may also be more susceptible to external factors such as wind, vibration, and temperature changes, which can exacerbate the stress and strain on the wire.
In addition to the risk of wire failure, uneven loading can also lead to other safety hazards. For example, if the wire is used to support a structure or equipment, an imbalance in the load can cause the structure to become unstable or the equipment to malfunction. This can result in property damage, injuries, and even loss of life.
To prevent these types of issues, it is important to ensure that loads are evenly distributed on wires and other support structures. This can be achieved through the use of proper rigging techniques, such as the use of equalizer bars or spreader bars, and by carefully monitoring loads to ensure that they are balanced at all times. By taking these precautions, the risk of wire failure and other safety hazards can be minimized.
To learn more about Wire loading, visit:
https://brainly.com/question/25922783
#SPJ11
what kind of script is used to run code on the client
Answer: JavaScript. What kind of script is used to run code on the client
given the declarations struct suppliertype { int idnumber; string name; }; struct parttype { string partname; suppliertype supplier; }; parttype partslist[10000]; write an output statement that prints the part name and supplier id number of the first 10 parts.
The program to illustrate the declaration will be:
#include <iostream>
using namespace std;
struct SupplierType
{
int idNumber;
string name;
};
struct PartType
{
string partName;
SupplierType supplier;
};
int main()
{
PartType partsList[10000];
for(int i=0; i<10; i++)
{
partsList[i].supplier.idNumber=i;
partsList[i].supplier.name="supplierName";
partsList[i].partName="partName";
}
for(int i=0; i<10; i++)
{
cout<<"partsList[i].supplier.idNumber:"<<partsList[i].supplier.idNumber<<endl;
cout<<"partsList[i].supplier.name:"<<partsList[i].supplier.name[0]<<endl;
cout<<"partsList[i].partName:"<<partsList[i].partName<<endl;
}
cout << endl;
return 0;
}
What is a program?A series of instructions written in a programming language for a computer to follow is referred to as a computer program.
Software, which also includes documentation and other intangible components, includes computer programs as one of its components. Source code is a computer program's human-readable form.
Learn more about program on:
https://brainly.com/question/1538272
#SPJ1
"necessarily is the mother of computer " justify this statement with respect to the evolution of computer.
Explanation:
Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist. In reality, computers as they are known and used today are still relatively new. Although computers have technically been in use since the abacus approximately 5000 years ago,
A _____________ is designed for a individual user.
This is for Keyboarding Applicaions
Plz help :D
Answer:
i don't know it sorry
Explanation:
which items should be included in a documentation worksheet?
See the explanation below for a list of items should be included in a documentation worksheet
What is a documentation worksheet?A worksheet for documentation is a tool used to record the specifics of a task, project, or event. Project managers, supervisors, and other professionals who need to organize information and conduct data analysis frequently utilize it. Worksheets for documentation frequently have fields for task titles, dates, descriptions, and other essential data. They can also be used to define objectives, monitor progress, and assess success.
Here are the items that should be in a documentation worksheet:
Title of the document Purpose of the document Author of the document Date of creation Version or Revision Number Keywords Reference Information Target Audience Requirements Definitions Assumptions Limitations Related Documents Change History Approvals Distribution ListLearn more about documentation worksheet here:
https://brainly.com/question/30383502
#SPJ1
!!!!!16 POINTS!!!!Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?
DO NOT JUST ASWERE FOR POINTS OR YPU WILL BE REPORTED AND BLOCKED. IF YOU HAVE ANY QUESTION PLEASE ASK THE IN THE COMMENTS AND DO NOT ASWERE UNLESS YOU KNOW THE ANSWER TO THE PROBLEM, thanks.
Answer:
Yes a computer can evaluate between a true or false. x < 1, and if the condition is met, the value is true, else its false. A computer itself cannot handle any "maybe" expression, but with the influence of human opinion, in theory its possible. Chocolate cake < Vanilla cake, is an example. Entirely on opinion.
in Kakegurui at the end of the what happens
Answer:
ok
Explanation:
မင်းငါ့ကိုငိုနေတာကိုမလိုချင်တဲ့လူငယ်များရဲ့ဆူနာမီကိုမကြည့်ချင်ဘူး
Answer:
me tiamo kisses me ddeee
Explanation:
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
A. A new firewall rule is needed to access the application
B. The system was quarantined for missing software updates
C. The software was not added to the application whitelist
D. The system was isolated from the network due to infected software
Based on the given information, the most likely cause for the document-scanning software program not responding after installation is option C: The software was not added to the application whitelist.
How to explainFailure to include the program in the whitelist may trigger computer security protocols, leading to its operational disruption.
If the software is added to the list of authorized applications, it can operate without any hindrance and perform its intended tasks. An often encountered problem arises when recently installed software is not given explicit authorization by the security settings.
Read more about application whitelist here:
https://brainly.com/question/24193738
#SPJ1
Symbology that only tells you the type of data represented is a. dynamic data b. raster data c. nominal-level data
The symbology that only tells you the type of data represented is c. nominal-level data.
Nominal-level data refers to categorical data that has no inherent order or numerical value. In this case, the symbology is used to represent different categories or types of data, without any specific numerical or spatial meaning.
What is nominal-level data?
Nominal-level data is a type of categorical data that represent variables with distinct categories or labels. In this level of measurement, data is classified into categories or groups based on their characteristics, but there is no inherent order or numerical value associated with the categories. The categories in nominal-level data are typically represented by names, labels, or codes.
In data analysis, nominal-level data is often used for descriptive purposes, such as counting the frequency of each category or calculating percentages. It is also used in statistical tests that analyze associations or relationships between categorical variables, such as chi-square tests or contingency table analysis.
What are nominal-level data:
https://brainly.com/question/13267344
#SPJ11
Tori needs to turn her Turtle to the left 90 pixels. Which line of code should Tori use?
A tina(90)
B tina.back(90)
C tina.left(90)
D tina.right(90)
Answer: D tina right (90)
Explanation:
right
Answer:
D tina.right(90)
Explanation:
Andrew likes to purchase his school supplies online. What are two advantages of doing so?

A.
It is possible for his information to be accessed or stolen by a third party.

B.
All his personal information is sent digitally and does not change when transmitted.

C.
Because the information is sent digitally, there are an infinite number of different signals possible.

D.
Because the information is sent quickly, he can receive his order more quickly.
Answer:
bd
Explanation:
Answer:
The answer is B.All his personal information is sent digitally and does not change when transmitted. And D.Because the information is sent quickly, he can receive his order more quickly.
Explanation:
I took AP EX quiz.
2.
Python was created
Python was created by Guido van Rossum
Jake is a 6-year-old boy. his mother wants him to learn scissor skills for improving his finger grip. so, she hands him several colorful papers and a pair of scissors. jake does not have difficulty understanding which object cuts the other. what is this type of reasoning called?
a.
analogical
b.
deductive
c.
common sense
d.
inductive
please answer so brainly doesnt get rid of it.
According to this, I think it is common sense.
You are running a python script and suspect that the script has entered an infinite loop. what key combination can you use to halt the loop?
The key combination that can be used to halt an infinite loop in a python script is: CTRL + c.
What is a looping structure?A looping structure can be defined as a type of function which instructs a computer to repeat specific statements for a certain number of times based on some condition(s).
This ultimately implies that, a computer repeats particular statements for a certain number of times based on some condition(s) in looping structures.
What is a forever loop?A forever loop is sometimes referred to as an infinite loop and it can be defined as a type of loop which comprises a sequence of instructions that are written to run indefinitely, continuously or endlessly, until the simulation is halted (quitted) by an end user.
In Computer technology, the key combination that can be used to halt an infinite loop in a python script is: CTRL + c.
Read more on forever loop here: https://brainly.com/question/26130037
#SPJ1
every student has an internet account."" ""homer does not have an internet account."" ""maggie has an internet account.""
It seems like you are providing additional information rather than requesting a program. However, based on the statements you mentioned:
"Every student has an internet account.""Homer does not have an internet account.""Maggie has an internet account."We can infer the following:All students, except for Homer, have an internet account.Maggie, specifically, has an internet account.If you have any specific requirements or if you need assistance with a program or any other topic, please let me know, and I'll be happy to help.every student has an internet account."" ""homer does not have an internet account."" ""maggie has an internet account.""
To know more about program click the link below:
brainly.com/question/30613605
#SPJ11
In which control zone are the incident command post (icp) and other support functions necessary to control the incident located?
The incident commander, EMS providers, the command post (ICP), and other support functions that are necessary to control an incident should be located in the cold zone.
What is a control zone?A control zone can be defined as an area at a hazardous materials incident which is designated as either hot, warm, or cold, based on safety issues and the degree of hazard are located or found.
What is incident management?Incident management can be defined as a strategic process through which a business organization (company) identifies, analyzes, and correct hazards and potential threats (problems), so as to ensure that normal service operation is restored as quickly as possible to its end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.
What is a cold zone?A cold zone can be defined as a safe area at a hazardous materials incident which is designated for the agencies that are involved in the operations.
In this context, we can infer and logically deduce that the incident commander, EMS providers, the command post (ICP), and other support functions that are necessary to control an incident should be located in the cold zone.
Read more on incident management here: brainly.com/question/11595883
#SPJ1
Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?Method 1: SLAACMethod 2: SLAAC and Stateless DHCPv6Method 3: Stateful DHCPv6
The correct answer is Which dynamic addressing technique for GUAs entails that devices base their addressing decisions only on the information included in the RA message .
What distinguishes a dynamic IP address from a static one A device's IP address does not change when given a static IP address. The majority of devices employ dynamic IP addresses, which the network issues to new connections and alter over time. A hotel, for instance, might have a static IP address, but every gadget in each of its rooms would have a dynamic IP address. Your ISP's DHCP server may assign your house or place of business a dynamic IP address for use online. After selecting Network, select Advanced. There is a special option here called TCP/IP. It will mention either Manually or Using DHCP under this item.
To learn more about dynamic addressing click on the link below:
brainly.com/question/29451368
#SPJ4
What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6
Answer:
A math.pow reference
Explanation:
Answer:
from math import ceil
Explanation:
yes
what is a device that connects lots of devices and remembers
Why would you clear a computer’s cache, cookies, and history?
to ensure that your computer’s settings and security certificates are up to date
to ensure that your computer’s settings and security certificates are up to date
to make sure that nothing is preventing your computer from accessing the internet
to make sure that nothing is preventing your computer from accessing the internet
to prevent intrusive ads from delivering malware to your computer
to prevent intrusive ads from delivering malware to your computer
to ensure that they are not clashing with the web page or slowing your computer down
Answer:
prevents you from using old forms. protects your personal information. helps our applications run better on your computer.
Why should you delete files from your computer?
so that you will have less work to do
because only one hundred files can be saved in a directory
to increase the computer's efficiency
to improve your productivity
to increase the computer's efficiency
Explanation
The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.
hope it helps!
Answer:
To increase the computer's efficiency.
Explanation:
Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.
I hope this helps :)
800,000= 180,000(P/AD, i,5) + 75,000(P/F,i,5) I want to find interest rate (i)
Would you let me know how to calculate this using Excel?
here is how to compute the above using Excel.
How to calculate the aboveOpen a new Excel spreadsheet and enter the following values in the cells:
Cell A1: 800,000 (Total amount)
Cell A2: 180,000 (Payment at the end of each period)
Cell A3: 75,000 (Payment at the beginning of each period)
Cell A4: 5 (Number of periods)
In cell A5, enter an initial guess for the interest rate (i). For example, you can start with 0.1 (10%).
In cell B1, enter the formula =A2*PMT(A5,A4,0) to calculate the present value of the periodic payments at the end of each period.
In cell B2, enter the formula =A3*PMT(A5,A4-1,0) to calculate the present value of the periodic payments at the beginning of each period.
In cell B3, enter the formula =A1 - B1 - B2 to calculate the remaining balance.
In cell B4, enter the formula =RATE(A4, B2, B1) to calculate the interest rate.
Learn more about Excel Formula at:
https://brainly.com/question/29280920
#SPJ1
A very common problem in computer graphics is to approximate a complex shape with a bounding box. For a set, s, of n points in 2-dimensional space, the idea is to find the smallest rectangle, R, with sides parallel to the coordinate axes that contains all the points in s. Once s is approximated by such a bounding box, we can often speed up lots of computations that involve s. For example, if R is completely obscured some object in the foreground, then we don't need to render any of s. Likewise, if we shoot a virtual ray and it completely misses R, then it is guarantee to completely miss s. So doing comparisons with R instead of s can often save time. But this savings is wasted if we spend a lot of time constructing R; hence, it would be ideal to have a fast way of computing a bounding box, R, for a set, s, of n points in the plane. Note that the construction of R can be reduced to two instances of the problem of simultaneously finding the minimum and the maximum in a set of n numbers; namely, we need only do this for the x- coordinates ins and then for the y-coordinates in s. Therefore, design a divide- and-conquer algorithm for finding both the minimum and the maximum element of n numbers using no more than 3n/2 comparisons.
The divide-and-conquer algorithm for finding both the minimum and the maximum element of n numbers using no more than 3n/2 comparisons involves splitting the input set into smaller subsets, recursively finding the min-max pairs for each subset, and merging the pairs to determine the overall min-max values.
The algorithm follows these steps:
1. Divide the input set into two equal subsets.
2. Recursively find the min-max pairs for both subsets.
3. Merge the min-max pairs by comparing the minimum values and the maximum values separately, selecting the lowest minimum and the highest maximum from the pairs.
4. Return the overall min-max pair.
The algorithm performs less than 3n/2 comparisons by comparing both min and max values simultaneously, saving time compared to finding them separately.
The divide-and-conquer algorithm efficiently computes the minimum and maximum elements in a set of n numbers, which can be used for constructing a bounding box in computer graphics to speed up computations.
Learn more about divide-and-conquer visit:
https://brainly.com/question/30404597
#SPJ11
An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access number
Answer:
Option A (dotted quad ) is the correct option.
Explanation:
A dotted quad seems to be a decimal, readable form interpretation of such an IP version 4 address. It appears in the form of xxx.xxx.xxx.xxxx.xxxx. In something like a 32-bit address, the amount across each quad symbolizes a single byte. Every other quad lies between 0 and 255. 192.168.0.1, besides instance, would have been a representation of such a dotted quad.Other preferences presented are also not connected to the sort of situations in question. So the obvious response to the above was its completely accurate one.