Answer:
A. SmartArt
Explanation:
SmartArt is a graphical tool used to visually communicate information.
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.
Answer: library
Explanation:
A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.
It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
Answer: cannot emit light and has speed limitations
Explanation:
Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.
Gallium arsenide has technical advantages over silicon as its electrons
move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.
Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.
They have requested a 1- to 2-page memo that describes the hospital's protections against a ransomware attack.
18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up
Answer:
Dial up
Explanation:
Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.
write a program to generate following series in qbasics 100,81,64,....1
Answer:
[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]
it's square root number you multiple times by 2
Human Resources can be classified into four groups namely________, ________, _______ and _____________.
A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz
Answer:
Option D
Explanation:
Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.
A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.
Explanation:
oi.........................
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Answer:
Salting
Explanation:
Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.
Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks
The salt for each user is a unique value that is stored along with the username in a database
You should avoid having other people in portraits with children. True False
Answer:
You should avoid having other people in portraits with children.
✓ False
Explanation:
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects
Answer:
Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.
What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools
Answer:
A resource that offers dozens of canned reports built around marketing best practices
Explanation:
Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.
The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from
Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices
When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output
Answer: round-trip time
message byte size.
Explanation:
Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.
When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.
The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement
Answer:
to package a repeated task as a function even though the task does not yield a value.
Explanation:
In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.
Some of the notable characteristics of a function includes;
I. The name and arguments of the function must be specified by a function.
II. The implementation of a function is usually designed to be hidden from the caller.
IIII. A function define specific tasks that reusable at many points in a program.
A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.
The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.
Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:
Answer:
Families are systems
Explanation:
first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.
explain the following terms
copyleft:
creative Commons:
GNU/GPL:
Answer:
Explanation:
copyleft:
Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.
creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.
Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.
6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned
kamusta Bagong user Ako dito
Answer:
kamusta Bagong user Ako dito = hello New user I'm here
True or False? Using your traffic analytics report, you can see the source of traffic to your website
Answer:
True
Explanation:
Choose all of the items that are important factors to consider for effective web design.
purpose
top-level domain name
content
visually appealing
audience
html
easy to use
Here's a list of the important factors to consider for effective web design:
PurposeTop-level domain nameContentVisually appealingAudienceHTMLEasy to useWhat is Web Design?Clever web design takes into account a range of factors, such as the objective of the website, the domain name, the quality of the content and the aesthetic elements, the intended audience, the HTML framework, and the ease of use. '
Having a clear comprehension of the goal of the website is crucial in determining the appropriate design strategy; in addition, a fitting domain name can positively impact branding efforts.
Compelling content captivates visitors. The visual aspect is a crucial factor in catching attention and improving the user's experience. Having an understanding of the intended viewers allows for customized creation and material presentation. The fundamental basis for organizing web pages is provided by HTML.
Read more about web design here:
https://brainly.com/question/25941596
#SPJ1
__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies.
write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit
Answer:
total = 0
for i = 1 to 7
input temp
temp = temp * 1.8 + 32
total + = temp
average = total/7
print average
Explanation:
[Initialize total to 0]
total = 0
[Iterate from 1 to 7]
for i = 1 to 7
[Get input for temperature]
input temp
[Convert to degree Fahrenheit]
temp = temp * 1.8 + 32
[Calculate total]
total + = temp
[Calculate average]
average = total/7
[Print average]
print average
A professional educational institution maintains a dedicated web server and database cluster that hosts an exam results portal for modules undertaken by its students. The resource is idle for most of the learning cycle and becomes excessively busy when exam results are released. How can this architecture be improved to be cost-efficient
Answer:
Answer to the following question is as follows;
Explanation:
A dedicated website and database cluster are maintained by a professional academic institution to host an academic results website for modules completed by its students. During the majority of the learning cycle, the resources are inactive, but when test results are issued, they become extremely busy.Configure virtualized architecture utilising AWS Lambda functions to make this architecture more cost-effective.
Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stand?
A.
one-third
B.
left-third
C.
two-third
D.
one-fourth
I think the answer is one fourth.
Because usually only that part is visible in a stand. It usually contains the name of the magazine and a little bit of illustration gives an idea about what it is about.
Answer please in order
Answer:
analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.
Explanation:
Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.
Generally, it travels faster through solids than it does through either liquids or gases.
Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
Answer:
HIDPSs
Explanation:
The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.
A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?
Answer: b is good
Explanation:
B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers
Answer:
web portals
Explanation:
B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.
B2B (business-to-business) model focuses on facilitating sales transactions between businesses.
Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.
B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.
Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.
what is computer engineering
Answer:
Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.
Explanation:
Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.
Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.
In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology
which one will be the correct answer
pls tell
Answer:
option c clean boot. it is correct.