Answer:
Management
Credit / Resource:
This problem has already been solved, if you would like to view more about this please click the question link below.
https://brainly.com/question/5495374
Which type of storage disk and disk drive can you use in the given situation?
Amy wants to borrow an interesting movie from Bruce so that she can watch it in her leisure time. Amy can hand over a (BLANK) to Bruce to copy 900 MB file. Bruce needs to have a (BLANK) drive to record data on the used DVD.
BLANK 1
CD
hard disk
DVD
BLANK 2
DVD-RR
DVD-recordable
DVD-RW
I : DVD
II:DVD-R
A DVD-RW would work too.
The types of storage disk drives that can use in the given situation are as follows:
Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD. What do you mean by Storage disk?Storage disk may be defined as a type of hardware device that can be used to store and save digital data and applications which may be in the form of images, video, audio, etc. For example, CDs, DVDs, hard disks, pen drives, etc.
Hard disks generally store a large quantity of data like 120GB to 30.72 TB. But here the data required to be stored is only 900 Mb, so DVD is the most accurate choice for this storage. It stores 500Mb of data to 8.5 Gb. A single-layer HD-DVD stores up to 15GB of storage capacity.
Therefore, Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.
To learn more about Storage Disk, refer to the link:
https://brainly.com/question/14762201
#SPJ2
Which is the correct expansion of the term Internet?
Answer:
international network is the answer
Answer:
http (hypertext transfer protocol)
Explanation:
its an application tool for distributed, collaborative, and hypermedia informations system and foundation of data for world wide web. HTTP is used to fetch and transmit the web page.
Which term describes unjust behavior due to a person’s gender or race
Answer:
Discrimination
Explanation:
Answer:
Discrimination
Explanation:
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
List any ten keyboard symbols.
Answer:
Esc- Esc (escape) key.
F1 - F12 What are the F1 through F12 keys?
F13 - F24 Information about the F13 through F24 keyboard keys.
Tab Tab key.
Caps lock- Caps lock key.
Shift- Shift key.
Ctrl - Control key.
Fn- Function key.
Alt- Alternate key (PC only; Mac users have an Option key).
Spacebar- Spacebar key.
Hope this helps, have a great day/night, and stay safe!
Wires,plugs,speakers, chis are all examples of what
Answer:
Ch1kenT3nders
Explanation:
Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.
WILL GIVE BRAINLIEST!! 20 PNTS!!
A tree that shows how a webpage is laid out is called a-
A. Family Tree Document.
B. Diagram Object Model.
C. Document Object Model.
D. Document Graphic.
Answer:
B :)
Explanation:
.........
Hello! Thank you for asking this question on Brainly!
Your question is:
“A tree that shows how a webpage is laid out is called a-
A. Family Tree Document.
B. Diagram Object Model.
C. Document Object Model.
D. Document Graphic.”
The answer to your question would be B. Diagram Object Model.
According to Visual Paradigm, “An object diagram is a UML structural diagram that shows the instances of the classifiers in models. Object diagrams use notation that is similar to that used in class diagrams. Class diagrams show the actual classifiers and their relationships in a system.”
Have a great day!
<3
What is the average rate of change of h(x)=2^{x+1}h(x)=2 x+1 h, (, x, ), equals, 2, start superscript, x, plus, 1, end superscript over the interval [2,4][2,4]open bracket, 2, comma, 4, close bracket?
Answer:
Average Rate = 12
Explanation:
Given
h(x) = 2^(x + 1)
Interval = [2,4]
Required
Determine the average rate of change
The average rate of change of h(x) is calculated using.
Average Rate = (h(b) - h(a))/(b - a)
Where
[a,b] = [2,4]
Meaning a = 2 and b = 4
So, the formula becomes:
Average Rate = (h(4) - h(2))/(4 - 2)
Average Rate = (h(4) - h(2))/2
Average Rate = ½(h(4) - h(2))
Calculating h(4)
h(4) = 2^(4+1)
h(4) = 2⁵
h(4) = 32
Calculating h(2)
h(2) = 2^(2+1)
h(2) = 2³
h(2) = 8
So, we have:
Average Rate = ½(h(4) - h(2))
Average Rate = ½(32 - 8)
Average Rate = ½ * 24
Average Rate = 12
Hence, the average rate of change is 12
1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow
A workspace that an employee accesses using a Web browser fits the definition of a _____.
•mobile device
•Wifi-enabled device
•collaborative environment
•virtual workspace
Answer:
virtual workspace
Explanation:
I hope I've helped
what is something a computer scientist would do
Answer:Computer scientists solve problems using technology. They write and program software, create applications for mobile devices, and develop websites. Their primary objectives are to validate and to develop mathematical models capable of computer interaction between people and other computers.
Explanation:
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
This road sign means
O road work ahead
vehicle breakdown
O service stations
O construction zone has ended
Answer:
A
Explanation:
Uh, yeah, I sure hope it does (to everyone who watched vine)
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.
Answer:
the gps and a map
Explanation:
Answer:
I think. it could be GPS and maps to but I may be wrong so yeah
Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables people to collaborate without the extra cost of paying a service provider; however, there is an increased opportunity for cybercrime. Lack of regulation speeds up the process of invention, but requires individuals to back up their own data. Lack of regulation encourages open innovation, but is not always secure. Lack of regulation encourages greater collaboration, but can lead to increased cost from price increases.
Answer:
3.) Lack of regulation encourages open innovation, but is not always secure.
Explanation:
Got it right in Introduction to Careers in Arts, A/V Technology and Communications
Who benefits from digital technology?
Answer:
Well, the answer is simple. Everybody!
Explanation:
Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, right, left again center, right, center, right center, right, left, center again
Answer:
left, center, right, left again.
Explanation:
Generally, in accordance with the highway traffic laws and regulations, it is important and necessary that when entering an intersection even with a green traffic light signal, all drivers should check left, center, right, then left again so as to do a confirmation that there isn't any danger from oncoming vehicles or anyone else. If this is strictly adhered to by road users such as drivers, there would be a great reduction in the number of road crashes or accidents.
In a nutshell, before entering an intersection, the safest searching process is to search left, center, right, then left again.
Safety is very important. Before entering an intersection, the safest searching process is to search Left, Center, Right, and Left.
There is a safe process to take when entering an intersection. When you have obeyed or yield to the sign facing you on the Intersection , you must then slow down and maybe stop if possible to let the other vehicles or pedestrians cross first and later on you drive ahead.
An intersection is also know as at-grade junction. This is simply the junction where two or more roads converge, diverge or meet and they are often at the same height. Looking Left, Center, Right, and Left is important before crossing an intersection.
Learn more about Road intersection from
https://brainly.com/question/24945907
For which discipline is it most important to study computer technical support and networking?
Answer:
Studying computer technical support would contribute most to the disciplines of computer engineering and information technology.
have an amazing day! =)))
Images, symbols, and diagrams are types of
art objects
Graphs
graphics
presentation objects
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is :
Graphics
Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.
While other options are not correct because:
Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.
You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random
Answer:
from math import dist
Explanation:
The dist() method is a part of the math module. So, to include it you have to use the following line of code:
from math import dist
hope this helped :D
The line which will allows you to enter the following code in IDLE is from math import dist.
What is dist() method?The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.
The dist() method is a part of the mathematics module. Then, for
>>>dist([2.5).(5.9))
5.0 ,
we have to use code in IDLE as;
from math import dist
Thus, the line which will allows you to enter the following code in IDLE is from math import dist.
Learn more about dist() method.
https://brainly.com/question/25373810
#SPJ2
what is a feature only used in powerpoint
I think powerpoint is the only presentation maker in which you can use 3D objects
Answer:
Slide transitions
Explanation: cause i got right
i'm sure 100%
Complete the sentence.
A ___________search can be done on a list that is not ordered.
Answer:
Well, a binary search has to be ordered. So ima just say linear search..
Explanation:
I think its linear..
A binary search can be done on a list that is not ordered.
What is a binary search?Binary search is a fast technique that finds an item from a sorted list of objects with a run-time complexity of O(log n), where n is the total number of elements. Divide and conquer concepts are used in binary search.
When performing a binary search on an array in computer programming, the array must be sorted in ascending order, i.e. from the least to the highest with respect to the data value.
The primary benefit of using binary search is that it does not scan every element in the list. Instead of scanning each element, it searches the first half of the list. As a result, a binary search takes less time to find an element than a linear search.
Therefore, the correct option is b, Binary.
To learn more about binary search, refer to the link:
https://brainly.com/question/28391940
#SPJ2
The question is incomplete. Your most probably complete question is given below:
•Linear
•Binary
Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT
Answer:
C. The energy used to create and maintain technology
#Carry on learning po
Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.
True or False, A variable can be called or referenced before it has been defined.
Answer:
false?
Explanation:
im 99% sure
Which position would a photographer typically use to make the viewer feel like an observer?
from below?
from the side?
from above?
from the front?
Answer:
From the side.
Explanation:
When the subject is faced away from the camera entirely, it’s easy to feel more like an unseen observer rather than an active presence. The further the distance between the camera and subject, the more the effect is intensified.
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
William is working on a term paper. He finds an online article on the same subject as his paper. He downloads the article and paraphrases a portion of it in his paper. He does not include the article in his list of references because he did not use the exact wording of the article. What illegal and unethical conduct is William guilty of?
A.
software piracy
B.
plagiarism
C.
patent infringement
D.
trademark violation
Answer:
B. Plagiarism
Explanation:
Answer:
B. Plagiarism
----------------------------------------------------------------------------------------------------------------
Explanation:
It's pretty simple--
- Software piracy is the unauthorized downloading, copying, use, or distribution of software, so it would not be A.
- Patent infringement is when someone sells, imports, uses, or makes a product that someone else invented without permission, so it is not C.
- Trademark infringement is a violation of the exclusive rights attached to a trademark without the authorization of the trademark owner or any licenses, so it wouldn't be D.
- It is plagiarism because William is taking someone else's work and passing it off as his own. He did not credit the original author of the article so it counts as Plagiarism. Hope this helped you out a bit :D
Describe the scope of the variables in this code.
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
class petCarrier:
size = 'medium'
color = 'red'
The scope of petName ______.
The scope of color is ______.
Accessible to the entire program
limited to the petCarrier class
limited to the pet class
(both of the blanks need one of those answers)
The scope of petName is local to the class pet.
The scope of color is accessible by all parts of the program.
How to interpret programming variables?The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.
The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.
Read more about programming variables at; https://brainly.com/question/9238988
#SPJ2
Answer:
The scope of petName limited to the pet class
The scope of color is accessible to the entire program
Explanation:
edge