grouping keywords into separate lists for different sections for a website is known as

a. researching
b. comparing
c. organizing
d. brainstorming

Answers

Answer 1

Answer:

C

Explanation:

A is when you surf the web for facts.

B is just finding the difference between 2+ things.

D is when you think of a bunch of ideas firsthand before officially planning anything.

Brainliest? (❁´◡`❁)


Related Questions

You send a friend a private message about something personal that is going on with you. Without permission, she forwards your text to everyone on her contact list.

What would you do? Why?

Answers

Answer:

Ask the person to remove the imagePut pressure on the person to remove the message though their peer group and carers.Tell a trusted adult about what is happening and explain the situation, they might have advice tailored to your specific situation.Report it to the social networkIf appropriate then tell the police

Explanation:

Start up a dialogue with the person to find out if they would be willing to take down the message, and find out why they did it as this could prevent a similar situation happening in the future.

Applying pressure though their peer group to conform to your standards is also a good measure to take as they would not want to feel left out.

If any images that you have taken are being shared then you can try to have them taken down under copyright. If personal information was shared then did that breach the laws in your or their jurisdiction?

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA also allows you to:
A) use multiple dependent measures in a single analysis.
B) control for a third variable that might be related to your dependent measure prior to
investigating the independent variable of interest.
C) determine whether the effects of one factor depend on the other factor.
D) partition out the variability due to individual differences and the variability due to
measurement error.

Answers

Answer:

C) determine whether the effects of one factor depend on the other factor.

Explanation:

ANOVA is analysis of variance which helps to understand whether the population mean are equal or not. It is statistical model which is used by the businessmen to analyze their business performance. ANOVA also determines whether the effect of one factor are related or dependent on other factor.

Which element is the first thing you should complete when making a movie?
A script
A storyboard
Opening credits
A video segment

Answers

Answer:

storyboard!!!

Explanation:

its important to have the concept in mind before starting

I think it’s a story book

A local pharmacy added a new regulation about wearing gloves when in contact with any drug. It also bought a new insurance policy. The pharmacy then replaced the pill counting machine that was incorrectly dispensing medications. Which best explains the actions the pharmacy has taken to promote safety?

Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.

Answers

Answer:

First option.

Wearing gloves reduces risk.

The insurance policy shares the risk.

The new machine is a quality improvement strategy that will reduce the probability of errors.

FREE POINTTTTTTTTTTTTTTTTTTT

Answers

Answer:

THXXXXXXXXXX

Explanation:

1. Let’s assume you have a folder named “stuff” and you wish to make “stuff” readable and writable for the owner, readable by groups and others, how would you do this?



2. Interpret these permissions: dr-xrw--w-

Owner:

Group:

Other:

Answers

Answer:

it is owner

Explanation:

what is a major difference between cyber vandalism and online priacy

Answers

Answer:

There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Answer:

Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Explanation:

a p e x

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

What are some other sites similar to brainly? By similar I mean being able to ask a question and answer them based on categories.

Answers

Answer:

jiskha.com

Explanation:

Answer:

Quora and Yahoo answers are alright

you would use conditional formatting on a cell when you want to _____

Answers

Answer:

to format a cell based on the value in it

Explanation:

you would use conditional formatting on a cell when you want to format a cell based on the value in it.

Reason -

Conditional formatting allows you to format a cell based on the value in it.

For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.

How would you highlight cells with negative values in it?

You can use conditional formatting.

Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming

Answers

-D. Scamming- like when a telemarketer called you and tries to get you to give personal information

Answer:

its D

Explanation:

ive done this before i remeber i got d

Ummmm pls helppp



Which are the features of conditional formatting?
Conditional formatting enables you to_______
and_______

Answers

Answer:

A conditional format changes the appearance of cells on the basis of conditions that you specify.

Explanation:

If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates to True or False).

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

The process of editing includes which of the following?
(A) Transferring photos to a computer
(B) Combining media
(C) Naming Files
(D) Keeping files secure

Answers

The answer should be

(B) combining media

Which of the following statements are true of
software engineers? Check all of the boxes that
apply.
They are responsible for writing programming
code.
They are usually strong problem-solvers.
They spend most of their work hours running
experiments in a laboratory.
They must hold advanced degrees in
computer science.

Answers

Answer:

Option A - They are responsible for writing programming

Option B - They are usually strong problem-solvers

Explanation:

A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.

Hence, both option A and B are correct

Answer:

A & B

Explanation:

The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.

Answers

Answer:

(a): Replace

(b): Hyperlinks

(c): Document Inspector

(d): Compatibility checker

(e): Accessibility checker

Explanation:

You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.

However, further explanation is as follows;

(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.

(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.

(c): Document inspector checks hidden data such as personal information.

(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.

(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.

The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;

REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKER

A) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.

B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.

C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.

D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.

E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.

Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179

will give brainliest

The height or amplitude of a wave is related to the input of ________

a. energy
b.matter
c.energy and matter

Answers

Answer:

a. energy

Explanation:

The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.

Hope this helped!!!

condition of watering a plant

Answers

Answer:

Hydration?

Explanation:

~50 points~
how do you merge shapes in powerpoint

Answers

Answer:

Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...

On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.Explanation:

What is a System software that serve as a platform/supports other programs/software in a computer system

Answers

Answer:

Operating system.

Explanation:

An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.

Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options

mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing

Answers

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

O*NET is the short for Occupational Information Network and it is a comprehensive online database that is uniquely designed to provide information about job requirements, staff competencies, work styles, abilities, skills and other resources. Thus, O*NET is the primary source of occupational information for the private and public sector of the United States of America. Also, it helps to identify and develop the work styles, skills, activities and abilities of various occupations of the American workforce.

According to O*NET, some common skills needed by Accountants include the following;

I. Mathematics: an accountant is required to have a good knowledge of different mathematical concepts such as arithmetic, calculus, algebra, statistics, etc., as well as their application to the field of accounting.

II. Reading comprehension: he or she should be able to read and understand the informations contained in all work-related documents.

III. Active listening: accountants are required to pay adequate attention to the informations that are given by the customers without interjections.

IV. Writing: they should be able to compose well-written and clear textual informations about work-related activities.

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

What is the "thinking work" of the computer? How does it help the computer?

Answers

Answer:

El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción

Explanation:

Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.

C++

Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message and prompt again for a valid data point. If entry has no comma Output: Error: No comma in string. (1 pt) If entry has more than one comma Output: Error: Too many commas in input. (1 pt) If entry after the comma is not an integer Output: Error: Comma not followed by an integer. (2 pts)

Answers

Answer:

In Python:

entry = input("Sentence: ")

while True:

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

   else:

       ind = entry.index(',')+1

       if entry[ind].isnumeric() == False:

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

       else:

           break

print("Valid Input")

Explanation:

This prompts the user for a sentence

entry = input("Sentence: ")

The following loop is repeated until the user enters a valid entry

while True:

This is executed if the number of commas is 0

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

This is executed if the number of commas is more than 1

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

This is executed if the number of commas is 1

   else:

This calculates the next index after the comma

       ind = entry.index(',')+1

This checks if the character after the comma is a number

       if entry[ind].isnumeric() == False:

If it is not a number, the print statement is executed

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

If otherwise, the loop is exited

       else:

           break

This prints valid input, when the user enters a valid string

print("Valid Input")

Note that: entry = input("Sentence: ") is used to get input

31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure

Answers

Answer:

31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;

a) Something the individual knows;

The Personal Identification Number (PIN)

The password to an account

Answer to a (complete) set of questions

b) Something the individual possesses

An ATM card

A SIM card

Other examples includes;

Physical keys to a lock

Smart cards

Electronic Key-Card used for physical entrance into an apartment

c) Something the individual is (Static biometrics)

The fingerprint

Face recognition

Retina recognition

d) Something the individual does (dynamic biometrics);

Recognition of typing rhythm

Characteristics of the users handwriting

Voice pattern recognition

32) a) Specific account attack

A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password

Countermeasure;

Limiting the number of password guesses

The use of strong passwords having over 8 characters that includes special characters

Use of multi-factor authentication

b) Workstation Hijacking

The attacker takes advantage of an logged-in unattended workstation

Countermeasure;

The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device

c) Password Guessing

Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password

Countermeasure;

The use of a two or more of authentication method also known as a multi-factor authentication MFA

Explanation:

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

help Which of the following triangles can be proven similar through AA?
Question 1 options:

A)

image

B)

image

Answers

A as in Ate my food ya know

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

Other Questions
HELP I'LL GIVE YOU 50 PONITSFrom the French Revolution to modern uprisings and revolutions in other countries, the documents and principles of the US government have inspired people to overthrow or change their oppressive governments. Using the information from tasks 1 and 2, compose a three-paragraph essay (approximately 300 to 350 words) in which you inform a peer that the principles on which the United States were founded are still alive today. Be sure to explain how these ideas are present in your community. As you write, include the following in your response:an introductory paragraph with a clear topic sentenceat least three specific facts from the information you analyzed or found in your research for this activitya formal tone appropriate for schooltransitions between ideas and paragraphscorrect grammar and spellingreferences to your research in your writing, including direct quotes, using citations where Please help due today Which is bigger 1/4 or 3/5 A positive number with an absolute value less than 5. A line that includes the point (2,7) has a slope of 8. What is its equation in point-slope form?Use the specified point in your equation. Write your answer using integers, proper fractions, and improper fractions. Simplify all fractions. PLEASE HELP. ANYONE. The amount of fence Farmer Thomas needs around her vegetable garden can be modeled by the formula:V = 8w + 3lwhere V = the perimeter of the vegetable garden; w = the width; l = the lengthWhich formula best represents l in terms of w and V ?A- l=v-8w-3B- l=3v-8wC- l=v-8w/3D- l=v-8w+3 Why did reformers want to pass the Seventeenth Amendment?A: To pay for new Government B: To give citizen a greater say in choosing their representatives C: To protect woman and children from problems caused by alcohol D: To give woman the equal rights they deserved A new savings account is opened with $400 and gains 3% every year. What is the value of the account at 32 years? During the New Deal, the main purpose of theAgricultural Adjustment Act was to which statement is correct about the rocks in this location Read the excerpt from Act III, scene v of Romeo and Juliet.Lady Capulet: But much of grief shows still some want of wit. Juliet: Yet let me weep for such a feeling loss.80 Lady Capulet: So shall you feel the loss, but not the friend Till thou shalt know the reason of my love: Which you weep for. Juliet: Feeling so the loss, I cannot choose but ever weep the friend. Lady Capulet: Well, girl, thou weep'st not so much for his death,85As that the villain lives which slaugher'd him. Juliet: What villain, madam True or false A sample space can be written as an organized list, a table or a tree diagram. List the importance of:8. Liao9. JurchenPLZ ANSWER ASAP!!!!first gets brainliest What is the tone of poem The Hill We Climb by Amanda Gorman?? In the workplace, it is important to listen to others opinions, communicate effectively, and lend a helping hand when needed. These are . Which of the following is a difference in the outcome of the distribution of seats in the United Kingdom andNigeria in 2018?O In the United Kingdom the Labour Party was part of the ruling government, and in Nigeria the APC was part of the rulinggovernmentO A minority coalition government ruled in the United Kingdom, and a single-party majority government ruled in NigeriaThe majority party in each country formed a governmentO In both countries small parties received a large percentage of the vote but received relatively few seats. When discussing evolution, adaptation is *A. An inherited trait evolved through natural selectionB. A skill that an organism has learned to help them surviveC. An adjustment in the physical appearance or behavior of an organism that happens over a short period of time 53 POINTS!!!!!!!!!!!!! Point B has coordinates (4,1). The x-coordinate of point A is -4. The distance between point A and point B is 10 units. What are the possible coordinates of point A? If a farmer sells 9.8 KL of apples and pears at the farmers market. 4/5 of this weight is apples,and the rest are pears. How many kl of pears did they sell the farmers market