arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo​

Answers

Answer 1

Answer:

2/3, 0, -7

Explanation:


Related Questions

Suppose Alice downloads a buggy browser that implements TLS incorrectly. The TLS specification says that, during the handshake, the browser should send a random 256-bit number RB. Instead of picking RB randomly the browser always sends all zeros. Describe an attack that is possible against this buggy browser and how to update the browser so that this attack is no longer feasible.

Answers

Solution :

It is given that Alice downloads the buggy browser which implements a TLS incorrectly. The specification of a TLS states that during a handshake, the browser sends a 256 bit number of RB randomly.

So in this case, a man-n-the-middle attack is possible. It can compromise the confidentiality of Alice. Updating the browser by visiting the website and checking its latest version of the browser or installing some other browser which has a more trust in the market for its security features.

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure?

Answers

Answer:

show archive in folder list

Answer:

d

Explanation:

What are the vertical areas of the spreadsheet?

a
Verticies
b
Ventricals
c
Columns
d
Rows

Answers

Answer:

Columns

Explanation:

A spreadsheet may a explained as a tabular arrangement or arrays of cells which allows users to enter both numeric and string data for storage, manipulation and analysis. The spreadsheet program has both the vertical and horizontal cell arrangement with the vertical areas being reffered to as THE COLUMN which are labeled using alphabets arranged from A - AZ, AA - AZ, and so on to make up a total of 16384 columns on the Microsoft Excel spreadsheet program. Cells are located using a combination of column and row address. With row representing the horizontal area of the spreadsheet and labeled with digits. Therefore cells are usually refereed to as A1, (column A row 1) and so on.

What type of information is best suited for infographies?​

Answers

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

What is the proper order for the fetch-execute cycle?

Answers

Control Unit – controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle as follows:

Fetch – gets the next program command from the computer’s memory

Decode – deciphers what the program is telling the computer to do

Execute – carries out the requested action

Store – saves the results to a Register or Memory

Arithmetic Logic Unit (ALU) – performs arithmetic and logical operations

Register – saves the most frequently used instructions and data

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.

A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?

Answers

Answer:

The correct approach is "Shrink partition". A further explanation is given below.

Explanation:

Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.

Thus the above is the correct answer.

Three reasons Why we connect speakers to computers

Answers

1. Some computers do not have speaker therefore we connect speakers

2. Some speakers don’t have clear audio so to fix that we connect new ones

3. What do you do if your speaker inside the computer is broken..... connect new speakers

Answer:

we connected speakers with computers for listening voices or sound .. because the computer has not their own speaker..

Explanation:

12. But not parallelism, it is achievable to have concurrency in operating system threading?

Answers

Answer:

Yes, it is possible to have concurrency but not parallelism. Concurrency: Concurrency means where two different tasks or threads start working together in an overlapped time period, however, it does not mean they run at same instant.

Explain what an IM is,

Answers

Answer: Stands for "Instant Message." Instant messaging, or "IMing," as frequent users call it, has become a popular way to communicate over the Internet

Explanation:

Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply.

David has the physical strength to lift products on high shelves.
Alessandra analyzes and interprets information she gathered from surveys.
Eve is good at presenting and explaining information to others.
Franklin is a strong leader who is able to motivate others.
Gene is very organized and tracks information accurately and carefully.
Claire is confident and persuasive, which makes her good at selling products.

Answers

Answer:

2,3,5

Explanation:

Answer: the answer is 2 3 and 5

Explanation:

6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1

Answers

Answer:

the output in the cell will be 0,2500

how do i work this out? does anyone do programming?

Answers

Answer : No sorry ..

Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L

Answers

Answer:

17.0

Explanation:

I ran it for you. You could also try that (go to replit).

my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )


input_year = int(input())

if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")

elif input_year % 100 == 0:
print(input_year, "- leap year")

elif input_year % 400 ==0:
print(input_year, "is a leap year")

else:
print(input_year, "- not a leap year")

Answers

Answer:

Explanation:

The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75

input_year = int(input())

if input_year % 4 == 0:

   if input_year % 100 == 0:

       if input_year % 400 == 0:

           print(input_year, "is a leap year")

       else:

           print(input_year, "- not a leap year")

   else:

       print(input_year, "is a leap year")

else:

   print(input_year, "- not a leap year")

Write a program that asks the user to enter an international dialing code and then looks it up in the country_codes array (see Sec 16.3 in C textbook). If it finds the code, the program should display the name of the corresponding country; if not, the program should print an error message. For demonstration purposes have at least 20 countries in your list.

Answers

Answer:

Explanation:

The following code is written in Python, it prompts the user for a country code, look it up and if found prints out the corresponding country name. If not it prints out an error message stating "Code not found"

country_codes = {"Argentina": 54, "Bangladesh": 880,

        "Brazil": 55, "Burma (Myanmar)": 95,

        "China": 86, "Colombia": 57,

        "Congo: Dem. Rep. of": 243, "Egypt": 20,

        "Ethiopia": 251, "France": 33,

        "Germany": 49, "India": 91,

        "Indonesia": 62, "Iran": 98,

        "Italy": 39, "Japan": 81,

        "Mexico": 52, "Nigeria": 234,

        "Pakistan": 92, "Philippines": 63,

        "Poland": 48, "Russia": 7,

        "South Africa": 27, "South Korea": 82,

        "Spain": 34, "Sudan": 249,

        "Thailand": 66, "Turkey": 90,

        "Ukraine": 380, "United Kingdom": 44,

        "United States": 1, "Vietnam": 84}

user_code = int(input("Enter Country code: "))

keys = list(country_codes.keys())

vals = list(country_codes.values())

if user_code in vals:

   print(keys[vals.index(user_code)])

else:

   print("Code not found")

jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.

Answers

Answer:

I'm a little confused...

Explanation:

Can you reword this please?

If you are insured with third party insurance, it will cover which costs?

A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack

Answers

Answer:

c.

Explanation:

Answer: D (costs related to lawsuits, and penalties due to a cyberattack)

Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.  

Number the steps to describe how Tristan can complete
this task.
Cut the Television and related equipment row.
Paste the Television and related equipment row.
Click the plus sign on the left side of the table between
the last two rows.

Answers

Answer:

Cut the Television and related equipment row.Click the plus sign on the left side of the table between  the last two rows.Paste the Television and related equipment row.

Explanation:

In order to move the row, Tristan should first select the row and then cut it. This will ensure that the row will be moved completely instead of copied.

Tristan should then hover with the mouse between the last two rows and click on the plus sign on the left side. It will add a new row to the sheet. between the last two rows.

Tristan should then select the topmost cell and click paste. The television row will be pasted there and Tristan would have successfully moved it.

Answer:

2 3 1 Your Welcome

Explanation:

Which factor distinguishes IOT devices from standard computing devices such as laptops and smart phones?

Answers

Answer:

PLS help me I'm tried

Haa plsssssss

Programming a computer to win at chess
has been discussed since the
A. 1940's
B. 1950's
C. 1960's

Answers

I believe it was the 1960s but u should seach it up to double check

Answer:

B.

Explanation:

Which step should you follow to copy a worksheet after clicking Format in the Cells group?
O Under Arrange Sheets, click Cut or Copy Sheet.
O Under Organize Sheets, click Move or Copy Sheet.
O Under Arrange Sheets, click Select and Move Sheet.
O Under Organize Sheets, click Arrange and Copy Sheet.

Answers

Answer:

Under Organize Sheets, click Move or Copy Sheet should you follow to copy a worksheet after clicking Format in the Cells group.

Explanation:

When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off. secondary storage the central processing unit (CPU) software primary memory

Answers

Answer:

it could either be the R.A.M or the hard drive

Explanation:

Answer:

Secondary Storage

Explanation:

Secondary storage is permanent, therefore, it fits the context of what the question is asking for.

what is a software house​

Answers

Answer:  a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.

this should be the answer

hoped this helped

While all pages use HTML code, not all pages are written in

Answers

Is this a question?

*Answer: not much information to answer with*

Answer:

Code Form

Explanation:

This unit is used to print the picture on a paper

Answers

Answer:a printer

Explanation:

It prints things

Can two computers be assigned to one IP address

Answers

Answer:

two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses

Explanation:

Answer: maybe

Explanations: two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses.

What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?


Pixel


Lens


Focus


Shutter

Answers

dnt listen to the link stuff

how does such editing affect courtrooms where visual evidence is often presented?​

Answers

Can hurt others..!! yw

briefly explain 5 software which is either free or fee​

Answers

Answer:

65

Explanation:

Answer:

65

Explanation:

Other Questions
How many inches is 9 Yards Have 3. Find the area of a semicircle with a diameter of30 inches. 4) What is the subject of the east pediment at theParthenon? What is the area of the irregular figure below?A figure can be broken into a parallelogram and triangle. The parallelogram has a baes of 4 inches and height of 6 inches. The triangle has a base of 4 inches and height of 6 inches.36 Inches squared48 Inches squared144 Inches squared288 Inches squared The functiona f(x) and g(x) are shown on the graph.What is g(x)?f(x)10-5g(x)A-10A. 9(x) = -x2 - 4B. g(x) = -x + 4c. g(x) = (-x) - 4D. g(x) = (-x)2 + 4 External and Internal Conflict in ACROSS THE NIGHTINGALE FLOORFor this response, you will analyze two primary conflicts that drive the plot of your novel. First, choose ONE internal and ONE external conflict. For each conflict, label it as Man v. [?]. Then, explain who is involved, how the conflict begins, the events the conflict leads to, the impact on other characters, and how the conflict contributes to your understanding of the novels message and/or characters. Example:Novel Title: Fahrenheit 451Internal ConflictMontags internal conflict is the struggle with his newfound realizations about his life, that his life and society are not what he thought they were. This Man v. Self conflict drives the entire novel. The conflict begins when Montag meets Clarisse because When he encounters the woman who dies with her books, this reinforces his struggle because This internal conflict leads to and impacts Montags marriage, his friendship with Faber, and because Ultimately, we see Montag pursue ... , which contributes to the authors message of because ... At the end of the novel, Montag is not fully reformed but is ...External and Internal Conflict in ACROSS THE NIGHTINGALE FLOOR This is the Project - International Organizations Post WWII, I got a 100%, don't plagiarize :))For this assignment, you will read three primary and three secondary sources about the development of 20th-century international organizations, such as the European Union, the United Nations, the World Bank, the World Trade Organization, and the World Health Organization. You will use your textbook, online sources, and the six documents provided to answer questions about the causes and effects of these organizations. You will also answer questions to practice the skills of HIPP, which align to DBQ practice. Finally, you will respond to the prompt by writing an introductory paragraph that includes a thesis statement and uses contextualization. in the context of myers-briggs type indicator of personality, the _____ preference represents perception or information gathering. Which of the following is an exothermic reaction?a solid to a liquida gas change to a liquida liquid to a gasa solid to a gas Which of the following statements is false. Group of answer choices When seeking to identify the theme of a poem, the critic should consider the poem's form, voice, tone, langauge, images, allusions, sound--all the elements that comprise the poem. There is only one theme to or for each poem or short story or novel or play. The theme of a work of literature is its central or dominant idea. The theme of a poem is more than the subject of the poem; theme refers to the ideas the poet explores. A car weighing 1,500kg possesses 20 000 units of momentum. What would be the car's new momentum if it's velocity was tripled Given the following acceleration function of an object moving along a line, find the position function with the given initial velocity and position. a(t)=5 sin 4t; v(0) = 1, s(0)=6 s(t)= ________ (Type an expression using t as the variable.) Choose the correct statement about best-fit lines.a.A best-fit line is close to most of the data points.b.A best-fit line describes the exact coordinates of each point in the data set.c.A best-fit line always has a positive slope.d.A best-fit line must go through at least two of the data points.Please select the best answer from the choices providedABCD ohn Baker, a cash basis calendar year taxpayer, paid the following during the year:Social security tax (withheld from wages) $4,500Real estate taxes $3,200State income tax $3,400Special assessment for installation of sidewalks $1,140Penalty on tax underpayment $300Flat fee for automobile registration $90What itemized deduction may John claim for taxes on his return professor fisher states that men are better than women at math, which is why you see more men in the science and math departments. rosales, who is a student, replies that __________. 9. What is the distance along the x axis from order pairs -8, 6 and 4,6a. 4 unitsb. 8 unitsc. 16 units d. 12 units A vase contains 9 balls: 3 blue, 3 red and 3 green ones. Draw 3 random balls from the vase and don't put them back in. Consider the events: A = the 3 balls drawn have the same color, B = the 3 balls drawn have different colors. a)Calculate P(A). b)Calculate P(B). c)Are A and B independent? Light of wavelength 656 nm and 410 nm emitted from a hot gas of hydrogen atoms strikes a grating with 5300 lines per centimeter. a) Determine the angular deflection of both wavelengths in the 1st and 2nd order. Does the Anthropocene represent the beginning of the end, or the apocalypse, for life as we know it? Each unit of food A contains 120 milligrams of sodium, 1 gram of fat, and 5 grams of protein. Each unit of food B contains 60 milligrams of sodium, 1 gram of fat, and 4 grams of protein. Suppose that a meal consisting of these two types of food is required to have at most 480 milligrams of sodium and at most 6 grams of fat. Find the combination of these two foods that meets the requirements and has the greatest amount of protein. 1) Define your variables. 2) Create an organizational chart of information. 3) Create an objective equation (what is to be maximized or minimized). 4) Write constraint inequalities. Don't forget the non-negative restrictions if applicable. 5) Graph the constraints in order to identify the feasible region. 6) Find the vertices of the feasible region. 7) Test all vertices in the objective equation to identify the point of optimization. 8) Write the complete solution with clear and concise language.