are tigers and goldfish related

Answers

Answer 1
Yes, they are by law of America

Related Questions

Why do people take off the keys on the school computers

Answers

Answer:

is this supposed to be a joke-

Explanation:

cuz i dont get it

help this poped up on my pc im on my laptop what does it mean HELP rC % M i \g e - A u t o M e r g e d - b a s e ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c a t rC % M i c r o s o f t - W i n d o w s - C l i e n t - F e a t u r e s - P a c k a g e - A u t o M e r g e d - n e t ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c

Answers

It means you need to get a new computer
The answer




Is


Uploaded



Down




Here

The entities on which data are collected are _____.

Answers

The entities on which data are collected is known as variables.

Answer:

The entities on which data are collected is known as variables.

Explanation:

If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision

Answers

Explanation:

Both station will retract their data. They will wait a random amount of time before sending out data again. This lessens the chance of collision again.

which of the following is an output device ?

Answers

Answer:

a mouse

a keyboard

Explanation:

those are things that require human interaction with before any thing can appear on the screen of the computer

Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e

Answers

The file format that produces a lock-down version of an access database is called; ACCDE

How to Identify Access Database?

ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.

Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.

Read more about Access Database at; https://brainly.com/question/9745438

#SPJ1

Choose the correct order for the process of a user attempting to access network resources: 1. network protocol 2. application 3. network client 4. nic driver

Answers

Answer:

2, 3, 1, 4

Explanation:

With the advent of _____ that stored the games and could be interchanged in the console, users were no longer limited to a set number of games, leading many video game console makers to switch their emphasis to producing games

Answers

Answer:

game cartridges

Explanation:

Explain methods of managing digital databases including permission marketing and the application of suppressions/opt-outs

Answers

The steps to manage a database management system are

State or define your needs.Form a Shortlist. Look into  your options. Implement your Software. Keep Your Database.

What is opt-out?

The Opt-out method is known to be often used in permission marketing as it is in the case where a user is said to leaves a mailing list or a website.

Therefore, The steps to manage a database management system are

State or define your needs.Form a Shortlist. Look into  your options. Implement your Software. Keep Your Database.

Learn more about database management from

https://brainly.com/question/24027204

#SPJ1

Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal places. also, compute the root-mean square error (rmse) between a and a.
a=[1 2 2]
[ 3 4 5]
[ 6 7 8]

Answers

Using the knowledge in computational language in C code it is possible to write a code that organizes and calculates the value of the matrix of A*A and that is in up to 4 decimal places.

Writing the code in C is possible:

A=[1 2 2;3 4 5;6 7 8];

[u ,s ,v] = svd(A);

k = 1;

A1 = u(:,1:k)*s(1:k,1:k)*v(:,1:k)'; %'

RMSE = rms(sqrt(mean((A - A1).^2)))

See more about C code at brainly.com/question/17544466

#SPJ1

Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including:

Answers

Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including Interdisciplinary research diploma applications integrate or greater conventional educational guides of have a look at right into a greater personalized major.

What is Interactions among AI Artificial intelligence?

Interactions among AI Artificial intelligence and schooling is but some other instance of interdisciplinarity in AI (Oudeyer et al., 2016), that may immediately gain now no longer best the 2 fields, schooling and AI, however society and productiveness as a whole.

Interdisciplinary research diploma applications integrate or greater conventional educational guides of having a look at right into a greater personalized major. Unlike a liberal arts diploma wherein you'll have a look at an extensive type of subjects, an interdisciplinary diploma lets in college students to discover a greater centered subject matter that crosses into more than one field.

Read more about the interdisciplinary :

https://brainly.com/question/25955559\

#SPJ1

Disadvantages of the divisional organization structure are _____. each division is able to operate independently from the parent company each division is able to operate independently from the parent company cheap to operate cheap to operate cannot share resources with other divisions cannot share resources with other divisions more expensive to operate more expensive to operate

Answers

Answer:

Disadvantages:

1. A division may feel separated from the parent company because it has too much independence

2. This feeling of separation may lead to the division only worrying about meeting it's goals and objectives and not the companies as a whole

3. This system may be more expensive to operate and cannot share resources with other divisions

Explanation:

PYTHON!


Build a simple restaurant program by serving this menu to the customer:
1. Muffin of the Day
2. Bagel and Cream Cheese
3. Granola, Fruit, and Yogurt
4. Steel Cut Oat with Fruits
5. exit.
===========================================================
requirements:
1. Create 4 classes for each course.
2. Each course will be having ingredients as their Attribute of class. example: Muffin - egg,oil,sugar.
3. First function of the course's menu is printing the steps of making the course by putting it into
functions. (you will just need "print statement" at least).
4. Second function of the course's menu is printing "Dish is served".
5. (you can add more functions for more points of the program).
6. Show the menu to the customer as long as they don't choose menu number 5.
7. When the customer choose a course, build the object and call all the functions that you built.

The efficiency, effectiveness, clarity, completeness and neatness of the program will be assessed.

Answers

Answer:

hi Po konbanwa sayo I'm pilipino I'm live in philippines

He was called "The father of computing c_______ B_______​

Answers

Answer:

computer basics.

Explanation:

because just it is father of computer basics

Answer:

charles babbage

Explanation:

what is a sub folder in ICT​

Answers

Answer:

A sub folder is a folder within a folder.

Explanation:

A subfolder on a computer is a folder inside of another folder. For example, someone may create a main folder for their music and then create subfolders to separate the genres of music.

Additionally, "sub" prefix means "under" or within.

Hope this helps.

Answer:

It's folder that is created from the main folder.

“How does revenue affect profit. How do expenses affect profit

Answers

Answer:

Profit depends on a simple formula: revenue minus expenses. The amount that your business ultimately earns is equal to the amount you have made in exchange for products or services minus the amount you have spent to keep your business running.

As a general rule, an increase in any type of business expense lowers profit. Operating expenses are only one type of expense that reduces net sales to reach net profit.

Explanation:

3 Select all the correct answers. Ana is creating a list of SMART goals. Which aspects should she pay attention to? The goal's success rate is at least 50%. The goal should be relevant to her career plan. The goal's success rate is more than 50%. The goal should be attainable within a given time frame. The goal to be attained should not be time bound. Jhy Reset Next​

Answers

Ana is creating a list of SMART goals the aspects should she pay attention to are The goal should be relevant to her career plan.,The goal's success rate is more than 50% and. The goal should be attainable within a given time frame.

What are the examples?

The intention of turning into an excessive college math trainer is well-defined. Measurable: Success may be measured via way of means of the range of applications, interviews and activity offers. Achievable: The intention-setter may have the precise diploma for the activity.

The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound. Defining those parameters as they pertain to your intention allows for making sure that your goals are manageable within a sure time frame.

Read more about the SMART goals.:

https://brainly.com/question/8986181

#SPJ1

a customer is traveling to a branch office, and the network administrator provides her with a static ip address for her laptop. which should the customer do to use the static ip address

Answers

The customer traveling with a provided static IP address should assign the IP in the network adapter settings. Thus, option B is correct.

What is static IP?

The complete question is: A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address?

A) Run the command "ipconfig configure static"

B) Assign the static IP in network adapter settings

C) Switch the button from dynamic to static on her laptop

D) Disconnect from WiFi and use an Ethernet cable

E) Type the IP address into the browser

A static IP is a setup that is configured manually instead of the DHCP assigned setup. It is a constant and nonchanging IP setup that is used when working remotely.

In the network and sharing system, open the adapter setting and choose the appropriate adapter. Then choose the IPV 4 and check the current internet settings. Choose the desired IP address and then click the OK and save button.

Therefore, option B. static IP is assigned in the network setting option.

Learn more about static IP here:

https://brainly.com/question/18849429

#SPJ1

Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original material

Answers

Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.

What is non-linear editing?

In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.

It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.

Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.

To know more about non-linear editing follow

https://brainly.com/question/15614247

#SPJ4

Question 4 of 25
in which situation would modular design be least beneficial for a game
program?
a. the program is extremely simple.
b. the programmer wants each task to be unique.
c. the program has many different parts.
d. the programmer is concerned about errors.

Answers

A situation which modular design would be least beneficial for a game program is: A. the program is extremely simple.

What is modular design?

Modular design can be defined as a software development technique that involves the separation of the overall functionality of a software into independent and interchangeable software sections or modules.

Also, modular design can be used to break a large code in a software into smaller blocks holding specific functions.

In this context, we can infer that modular design would be least beneficial for a game program when the software program is extremely simple.

Read more on modular design here: https://brainly.com/question/14192464

#SPJ1

Answer:

A. the program is extremely simple.

Explanation:

Explain different characteristics of computer?​

Answers

[tex]\huge\purple{Hi!}[/tex]

The characteristics of computer are speed, accuracy, reliability, Automaticon, Memory

Speed=A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The time taken by computers for their operations is microseconds and nanoseconds.

Accuracy=Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.

Reliability=A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.

Automation=Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.

Memory=A computer has built-in memory called primary memory where it stores data. Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to store data.

The goal of this task is to perform a web crawl on a URL string provided by the user. From the crawl, you will need to parse out all of the images on that web page and return a JSON array of strings that represent the URLs of all images on the page. [Jsoup](https://jsoup.org/) is a great basic library for crawling and is already included as a maven dependency in this project, however you are welcome to use whatever library you would like.
Required Functionality
We expect your submission to be able to achieve the following goals:
- Build a web crawler that can find all images on the web page(s) that it crawls.
- Crawl sub-pages to find more images.
- Implement multi-threading so that the crawl can be performed on multiple pages at a time.
- Keep your crawl within the same domain as the input URL.
- Avoid re-crawling any pages that have already been visited.
Extra Functionality
No individual point below is explicitly required, but we recommend trying to achieve the following goals as well:
- Make your crawler "friendly" - try not to get banned from the site by performing too many crawls.
- Try to detect what images might be considered logos.
- Show off your front-end dev skills with Javascript, HTML, and/or CSS to make the site look more engaging.
- Any other way you feel you can show off your strengths as a developer ????
PLEASE do not send us a submission with only a basic JSoup crawl and only a couple lines of code.** This is your chance to prove what you could contribute to our team.
Your project will be due exactly 48 hours after you receive this project. To submit, zip up your project (`imagefinder.zip`) and email it back to me. **Please include a list of URLs that you used to test in your submissions.** You should place them in the attached `test-links.txt` file found in the root of this project.
Structure
The ImageFinder servlet is found in `src/main/java/com/eulerity/hackathon/imagefinder/ImageFinder.java`. This is the only provided Java class. Feel free to add more classes or packages as you see fit.
The main landing page for this project can be found in `src/main/webapp/index.html`. This page contains more instructions and serves as the starting page for the web application. You may edit this page as much as it suits you, and/or add other pages.
Finally, in the root directory of this project, you will find the `pom.xml`. This contains the project configuration details used by maven to build the project. If you want/need to use outside dependencies, you should add them to this file.
Running the Project
Here we will detail how to setup and run this project so you may get started, as well as the requirements needed to do so.
Requirements
Before beginning, make sure you have the following installed and ready to use
- Maven 3.5 or higher
- Java 8
Setup
To start, open a terminal window and navigate to wherever you unzipped to the root directory `imagefinder`. To build the project, run the command:
>`mvn package`
If all goes well you should see some lines that ends with "BUILD SUCCESS". When you build your project, maven should build it in the `target` directory. To clear this, you may run the command:
>`mvn clean`
To run the project, use the following command to start the server:
>`mvn clean test package jetty:run`
You should see a line at the bottom that says "Started Jetty Server". Now, if you enter `localhost:8080` into your browser, you should see the `index.html` welcome page! If all has gone well to this point, you're ready to begin!
## Submission
When you are finished working on the project, before zipping up and emailing back your submission, **PLEASE RUN ONE LAST `mvn clean` COMMAND TO REMOVE ANY UNNECESSARY FILES FROM YOUR SUBMISSION**. Please also make sure to add the URLs you used to test your project to the `test-links.txt` file. After doing these things, you may zip up the root directory (`imagefinder`) and email it back to us.
## Final Notes
- If you feel you need more time to work, you are free to ask for it.
- If you are having any trouble, especially with the setup, please reach out and we will try to answer as soon as we can.
- The ideas listed above on how to expand the project are great starting points, but feel free to add in your own ideas as well.
- Try to follow some good-practice principles when working on your code, such as meaningful and clean variable/method names and other good coding practices.
- The code we have provided is to allow you to hit the ground running. You are free to use whatever web service you would like (as long as you use Java 8 and it is runnable from the command line).
- We look forward to seeing what you can do, so good luck and have fun

Answers

The goal of this task is to perform a web crawl on a URL string provided by the user by the Add one or numerous URLs to be visited.

What is a multithreaded internet crawler?

The internet crawler will make use of a couple of threads. It may be capable of moving slowly all of the precise internet pages of a website. It may be capable of documenting again any 2XX and 4XX links. It will take withinside the area call from the command line. It will keep away from the cyclic traversal of links.

Here are the primary steps to construct a crawler:

Step 1: Add one or numerous URLs to be visited.

Step 2: Pop a hyperlink from the URLs to be visited and upload it to the Visited URLs thread.

Step 3: Fetch the page's content material and scrape the records you are interested by with the ScrapingBot API.

Read more about the web:

https://brainly.com/question/14680064

#SPJ1

What does data warehousing allow organizations to achieve?

Answers

What does data warehousing allows organizations to collect only the current day's data from their various databases.

What is the role of Data warehousing?

The role of data helps to boast the the speed and efficiency of accessing a lot of data sets in an organization.

What does data warehousing allows organizations to collect only the current day's data from their various databases.

Learn more about  Data warehousing from

https://brainly.com/question/25885448

#SPJ1

What does business informWhat does business information management do?
A.
identify information requirements for coworkers
B.
identify information requirements for different management levels
C.
create project plans for the project management team
D.
produce sales turnover summary for the sales professionals
E.
create financial documents for the finance departmentation management do?

Answers

Answer:

B) identify information requirements for different management levels

Explanation:

Business information management is based off of identifying the needs of a company. (This is also a plato answer)

What does a primary key allow a user to do in a database?

PLEASE HELP

Answers

A primary key is the field (or fields) that is often employed to specifically identify each record in a table.

What is the role of this key?

The Primary key is known to be the key that helps a user to be able to form a specific identifier for each row in one's table.

Note that  it helps a person to link your table to other tables and as such, a  primary key is the field (or fields) that is often employed to specifically identify each record in a table.

Learn more about  primary key from

https://brainly.com/question/12001524

#SPJ1

Answer: its A

Explanation:

which one of the following will reach every element in the array a? 1. for(int i = 0; i <= a.length; i++) 2. for(int i = 0; i < a.length; i++) 3. for(int i = 1; i <= a.length; i++) 4. for(int i= 1-1 ; i < a.length; i++)

Answers

Answer:

You can simplify the problem down by recognizing that you just need to keep track of the integers you've seen in array that your given. You also need to account for edge cases for when the array is empty or the value you get would be greater than your max allowed value. Finally, you need to ensure O(n) complexity, you can't keep looping for every value you come across. This is where the boolean array comes in handy. See below -

public static int solution(int[] A)

{

int min = 1;

int max = 100000;

boolean[] vals = new boolean[max+1];

if(A.length == 0)

return min;

//mark the vals array with the integers we have seen in the A[]

for(int i = 0; i < A.length; i++)

{

if(A[i] < max + 1)

vals[A[i]] = true;

}

//start at our min val and loop until we come across a value we have not seen in A[]

for (int i = 1; i < max; i++)

{

if(vals[i] && min == i)

min++;

else if(!vals[i])

break;

}

if(min > max)

return max;

return min;

}

What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element array

Answers

The max nukber of elements visited will be 6.

What sound(s) will you hear when this program is run
A. Just “meow”
B. A “Moo” and a “Baa”
C. Two “Moos” and three “Baas”
D. A “Moo” a “Baa” and “Hello”

Answers

The answer would be D. Because it says play moo, and play baa and say hello

privacy principles need to be balanced against the ___ benefit that comes from the automated collection of private information. select 2 options.

corporate
political
ethical
societal
financial​

Answers

The privacy principles need to be balanced against the corporate

the political benefit that comes from the automated collection of private information.

What is the privateness coverage of the employer?

A privateness coverage is a file that explains how an employer handles any consumer, consumer or worker records accumulated in its operations. Most websites make their privacy guidelines to be had to web website online visitors.

The greater glad clients are, the longer they live with a business enterprise and offer sufficient enterprise to make certain increase and profitability. While setting collectively techniques for higher consumer service, a business enterprise ought to make certain that the stability among consumer expectancies and enterprise desires is maintained sustainably.

Read more about the information:

https://brainly.com/question/25689052

#SPJ1

"The actual use and implementation of computer started after third generations". Justify this statement in your own words.​

Answers

After three generations from when technology started people realized the use of technology was helpful and started to implement it in their daily lives

Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations

Other Questions
A wagon is pulled with a force of 1000 n and it moves 25 m. How much work is done? BRAINLIEST!!!!!!!!!!!!!!!!!!When should you apply the reading strategy of scanning to a text?a.Before you read the textc.After reading a textb.During the reading of a textd.none of the abovePlease select the best answer from the choices providedABCD After sales tax, a $600 antique clock costs $642. What is the sales tax percentage? Starting in 2019, the hanford site will begin to . to do so, workers at the site will use a process called . this process will allow radioactive waste at the site to be . Let f(x)=20/5+6e^0.1x What is (5)? Round your answer to 4 decimal places. What is "direct action" Find the amplitude of this function. I WILL GIVE BRAINLIEST My mother pays my brother twice as much allowance each week as she pays me because he cleans the bathrooms. Together we get $24 each week. How much is my brother's allowance each week? A. $4.00 B. $8.00 C. $16.00 D. $24.00 discuss three negative consequences of irresponsible use of social media? In which triangle is the value of x equal to cos1(StartFraction 4.3 Over 6.7 EndFraction)? (Images may not be drawn to scale.)A right triangle is shown. The length of the hypotenuse is 6.7 and the length of another side is 4.3. The angle between the 2 sides is x.A right triangle is shown. The length of the hypotenuse is 6.7 and the length of another side is 4.3. The angle opposite to side with length 4.3 is x.A right triangle is shown. The length of the hypotenuse is 4.3 and the length of another side is 6.7. The angle between 2 sides is x.A right triangle is shown. The length of the 2 sides are 6.7 and 4.3. The angle opposite to side with length 4.3 is x. Discuss the importance of following a well-integrated change control process on IT projects. What are the consequences that can result from not following the best practices? The final step in critiquing art is to evaluate it. The evaluation part of this process is simply the putting together based on what you have described, analyzed, and interpreted so far. This is what you need to do: Give some reasons on whether it is good/important/worthwhile or bad/trivial/not worth examining. That is it! If you have been able to describe, analyze, and interpret the work, then maybe it is worthwhile. If you have had trouble, maybe it is not. The most important things about this step are: You do not have to love it for it to be worthy. You do not have to buy it for it to win first place. You could absolutely love it and it be considered a bad piece of art. self portrait of Vincent Van Gogh 2005 clipart.com Look at the example below about Van Gogh's self-portrait. This piece of art is worthy, important, and good because the use of lines, colors, repetition, and emphasis made me focus on the sad, lonely face of Van Gogh. My reaction to this art is to find out more about Van Gogh because he makes me wonder why he is so sad. Do you see how short and simple this should be? This is evaluation - the final step in critiquing art. pencil Sketchbook Activity: Using the following piece of art, carefully evaluate it using the explanation of evaluation above. Remember- this is your opinion. Your opinion is right as long as you give reasons. Mona Lisa Mona Lisa by Leonardo Da Vinci 2005 clipart.com Label this page "Evaluate." Give reasons for your evaluation of this artwork. Make sure to use some of the terms you have learned throughout this course. pen - rubric iconHow will my art evaluation be graded? sketched eyesAssignment: Your assignment is to critique the following work of art: young woman in hat by Rubens On a piece of white paper describe, analyze, interpret, and evaluate the artwork. Make sure to label each section with describe, analyze, interpret, and evaluate. pen - rubric iconHow will my art critique be graded? mouth Discussion In the Discussion area of the course write two paragraphs using complete sentences: Did you have a hard time critiquing the art above? If so, what made it hard? If not, what made it easy? Discuss your critique of the art above. Post your discussion to the discussion area of the course. Read what others are saying about their critiquing experience during this project and respond to at least one other student. pen - rubric iconHow will my discussion be graded? Use the text Law of the Land to answer the question. Law of the Land Which part of the text can you use to discover the role of the Congress? (1 point) the picture captions the picture captions the entire article the entire article the blue boxes at the end of the article the blue boxes at the end of the article the red headlines follow the steps to construct a diagram: 1:create points A, B, and C in order on a horizontal line with a distance of four units between successive points. 2:draw Circle with center that passes through b, and two tangents to the circle passing through C.3:locate the points of intersection of the tangents with the circle, and labeled them D and E.4: draw the radii AD and AE to create central angel EAD.Take a screenshot of your construction, and paste it below. Identify an instance of satire in "The 1,000,000 Bank-Note" that hasn't yet been aAs Asdiscussed in this lesson and explain its meaning in the text. Identify the category of obstacle that best describes each example.Eleanor wanted to become aVeterinarian, but has lost interest in it.Celeste didn't earn enough moneyat her job to pay for a year of college.Sienna wasn't accepted into the collegeprogram she applied to.Corbin has a sick family memberwho requires significant time and care.Mateo is concerned, because tourismis declining in his area.00000financial obstacleeconomic obstacleeducational obstacleother demands on timechanges in motivation Compare/contrast Feudal Japan and Feudal Europe. HELP NEED DONE ASAPP BEFORE 11:59PM!!!!Predict the total pressure in Container C if the initial pressure in Container A was tripled and. Container B was reduced by one-third then mixed in Container C.Container A Oxygen 287 kPaContainer B Nitrogen 429 kPaContainer C Oxygen + NitrogenPressure=P total solve these algebraic fractions please with explanation would be great 1. (c) explain why the ecosystem has not been able to recover quickly after the change: