Select the correct answer.
Melissa is designing a high-end luxury product. Which of these factors would be the most important in designing?
ОА
cost
B.
efficiency
cstyle
D. durability
Reset
Next
entum. All rights reserved.

Answers

Answer 1

Answer:

d

Explanation:


Related Questions

What is the difference between primary memory and the secondary memory?

Answers

Answer:

Computer memory is categorized into primary and secondary memory. While primary memory is the main memory of the computer which is used to store data or information temporarily, whereas secondary memory refers to external storage devices that are used to store data or information permanently.

Explanation:

Answer:

Explanation:

Difference between Primary Memory and Secondary Memory Primary is when a computer which can be directly accessed by the central processing unit, where as secondary memory refers to the external storage

Is it possible to increase watch hours for a channel by making a playlist out of your videos for people to watch? Will it boost your watch hours?

Answers

Answer:

It depends on the person watching

Explanation:

The video that the person is watching has to watched in order for it to count towards your watched hours if one of the videos in that playlist are watched it will get those hours but on the video that has not been watched it will not count it.

Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit, our buying preferences, and so on. Do you think that this is ethical? If not, can you suggest ways to stop this activity? If yes, explain the context in which it is important to us.

Answers

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

How will you reduce the risk of an collision?
A. By always driving with an adult.
B. By becoming more familiar with how your vehicle operates.
C. By playing more video games to keep you sharp.

Answers

Answer:

B

Explanation:

you want to be familiar with the vehicle you are operating such as braking, accelerating, blinkers etc.

Which language is an example of a fifth-generation language?

Answers

Mercury, OPS5 and Prolog

The largest size heading tag-often used to create the main heading of a webpage is

Answers

Answer:

<h1> tag is the correct answer to the given question .

Explanation:

The heading tag is used in the HTML for giving the heading in the webpage there are 6 heading tag is used in the HTML which are used in the different different purpose .

The <h1> tag is used for the  Largest size heading in the main heading of the webpage whereas the <h6> is used for least size heading in the web page.

Following are the example of <h1> tag

<html>

<head> </head>

<body>

<h1 align="center"> Brainly </h1>

<h6> subject </h6>  

</body>

</html>

Output:

Following are the attachment of output.

This career involves answering questions about computer parts and trouble shooting broken computers? Video game designer, computer retail sales associate, we designer, computer programmer

Answers

Computer retail sales associate is my best guess. :)

Which type of operating system is usually used in personal computers?

A [blank] operating system is usually used in personal computers

Answers

Answer:

A GUI based operating system is usually used in personal computers

Explanation:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).

The type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.

What is the Operating system?

An operating system may be defined as s type of system software that significantly regulates all sorts of hardware and software resources of the computer and provides common services for computer programs.

According to the context of this question, the three most fundamental operating systems for personal computers may include Microsoft Windows, macOS, and Linux.

All of these operating systems generally are graphical user interface (GUI) based. These are powerful and extensively used a program that controls and manages the hardware and other software on a computer.

Therefore, the type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.

To learn more about Operating systems, refer to the link:

https://brainly.com/question/22811693

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which type of operating system is usually used in personal computers?

Microsoft Windows.UNIX.LINUX.

What means of preventing security breaches would you expect to find in a network which has attempted to provide protection from hackers and other external security threats?

Answers

Answer:

a firewall

Explanation:

a firewall is a way programmers can attempt to stop breaches, however every code has a zero day. (a bug that had zero days spent fixing it) even Microsoft had a couple zero days

Which term describes the order of arrangement of files and folders on a computer?
A.
I-SPY
B.
CFAA
C.
Digital Millennium Act
D.
SOPA

Answers

Answer:The term that describes the order of arrangement of files and folders on a computer is organization. It is very important the organization of the files and folders to be effective, in order to work with them quickly and efficiently

Explanation:

hope this help sry if it doesn't.

Columns can be added to a page in the page layout tab in the blank grouping
*Themes
*Paragraph
*Styles
*Page Setup

Answers

Answer:

Page Setup Grouping.

Explanation:

In Microsoft Word, Columns break up the page into, at max, 13 columns, and at minumum, 2. The way you go about doing this is

Go to the Layout TabGo to the Page setup GroupingClick on the Columns ActionIn the Dialog Box, choose either from one of the presents, or custom make your own column settings.Click OkayDone!

the answer is page set up!

need some help with this question​

Answers

Answer:

B, Backlight.

Which is an example of an effective study skill?

Answers

Answer:

the making note cards and quizzing yourself

Explanation:

Have Notes and call over a friend and test each other

The 2 main parts of Aerospace Engineering are aeronautical and astronautical

Answers

Answer:

that is ture

Explanation:

Aerospace engineering is the primary field of engineering concerned with the development of aircraft and spacecraft. It has two major and overlapping branches: aeronautical engineering and astronautical engineering.

Digital signatures are as legally acceptable as written signatures.
Digital signatures contain information such as birth date and Social Security number.
Digital signatures can be retrieved easily if they are lost.
Digital signatures show the handwriting of the signer as physical verification.
What is an advantage of using digital signatures?

Answers

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

As compare to the electronic signature the digital signature is more secure then that of.The signer's signature is seen on the digital signatures as the physical proof.Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

Think about a time when someone made a biased judgment about you or acted unfairly toward you because of your age, skin color, clothes you were wearing, gender, the way you speak, where you live, how much money your family has, or some other reason.
Why do you think those assumptions were made about you?
How did that experience make you feel?
How do you think you should have been treated in that situation?

Answers

I feel like people are judge mental on their self so they do it to other people to make them feel better and it really hurts because you don’t know what that other person been through I feel like you should be treated fairly in that situation.

The icon below represents the ____________.

Reading view
Slide sorter view
Slide Show view
Normal view

Answers

It’s either the 2nd or 3rd one

Answer:

B. slide sorter view

Explanation:

i got it correct when i took the test. have a great day peeps :]

Compared to a bricks and mortar shop project, an online shop project would not need to worry about the feasibility of
fitting in with the company's strategic plan
timelines
commercial zoning laws for precincts
resource allocation

Answers

Answer: Commercial zoning laws for precincts

Explanation:

A is incorrect: All businesses must follow a strategic plan.

B is incorrect: All businesses must follow timelines.

D is incorrect: All businesses must know when and where to allocate resources.

Answer:

Answer: Commercial zoning laws for precincts

Explanation:

Which option is most likely used to create many-to-many relationships in Access?

inner join
outer join
junction table
parameterized query

Answers

Answer:

Junction table.

Explanation:

Junction table is most likely used to create many-to-many relationships in Access.

A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.

Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.

In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.

Answer:

c

Explanation:

why would you use a custom filter?

Answers

Answer:By specifying conditions, you can create custom filters that narrow down the data in the exact way that you want. You do this by building a filter. If you've ever queried data in a database, this will look familiar to you. Point to either Number Filters or Text Filters in the list.

Explanation:

Which of the following is an accurate explanation of what this paragraph means?
Radiation from the sun is the main cause of global warming.
(6)
Radiation is the heat that the sun releases onto the surface of the earth.
Solar panels get very hot because they are absorbing radiation from the sun.
ee
Solar panels can make the carth cooler because they absorb heat instead of the earth.​

Answers

Answer:

The answer is: Radiation is the heat from the sun relaeased onto the surface of the Earth.

Explanation:

Which one of the following options is incorrect in Presenter View?
Move to the previous or next slide
View all the slides
Hide or unhide the current slide
Writing option not available

Answers

Answer:

Writing option not available

Explanation:

Use the drop-down menus to complete statements about animation options.

Using the ANIMATION PANE, animations can be RECORDED and previewed.
The EFFECT OPTIONS dialog box is used to customize animations, such as adding sound or adjusting the TIMING .

Answers

Answer:

✔ Animation pane

✔ reordered

✔ Effect Options

✔ timing

Explanation:

hope this helps :)

The complete statements about animation options are as follows:

Using the animation pane, animations can be recorded and previewed.The effect option dialog box is used to customize animations, such as adding sound or adjusting the timing.

What is Animation?

Animation may be defined as a type of methodology through which photographing successive drawings, models, or even puppets, etc. are created in order to present an illusion of movement in a sequence. It involves the arrangement of multiple images in an ordered sequence.

According to the context of this question, on the Animations tab, in the Advanced Animation group, select Animation Pane where you will get all such kinds of functions for the animation. Computer animation is the process typically utilized for digitally generating animations. These animations are generally prepared for specific periods of time duration.

Therefore, the complete statements about animation options are well mentioned above.

To learn more about Computer animations, refer to the link:

https://brainly.com/question/28879938

#SPJ2

Name all the keys of the home row.

Answers

Answer:

A, S, D, and F and your right hand are J, K, l, and ; along with space bar for your thumbs

Explanation:

Select three potential disadvantages that apply to using online video and audio for business.
e need for special equipment
technical difficulties
w travel requirements
kun limited range distribution
un necessity of digital literacy
high cost

Answers

Answer:

limited range

high cost

difficulties

Three potential disadvantages that can apply to using online video and audio for business are technical difficulties, Kun limited range distribution, and high cost. The correct options are b, d, and f.

What are online audios and videos?

The terms audio and video are often used to refer to the time-based media storage format for sound/music and moving image data. An AV work is made up of sound, a sequence of images, or both.

Motion pictures, videos, audiocassettes, CDs, and DVDs are examples of AV works. AV should not be confused with multimedia, which may incorporate several sorts of AV elements but adheres to separate standards.

Although audio refers to sound, the term is frequently linked with computers and other electrical equipment.

Therefore, the correct options are B, technical difficulties, D, kun limited range distribution, and F, high cost.

To learn more about online audio and videos, refer to the link:

https://brainly.com/question/9979289

#SPJ5

Please hurry

Question 6 of 10
Who is most likely able to help you accomplish goals?
Teachers
Parents or caregivers
Friends
All of the above

Answers

Answer:

All of the above

Explanation:

Answer: all of the above!

Explanation: brainliest? <3.

What is an LMS and how is it used?
software used in education to deliver online courses
an online repository used to save files on servers
a small portable computer operated by a touch screen
external hardware that store all types of files

Answers

Answer:

software used in education to deliver online courses.

Explanation:

A Learning Management System (LMS) is a software application used in education to deliver online courses. The LMS is typically used for administering, documenting, managing, tracking and automatically delivering of educational courses, training initiatives and development courses online by using multimedia contents.

Examples of Learning Management System (LMS) are; Lessonly, Litmos LMS, Easy LMS, Moodle, Teachable, TalentLMS, CANVAS LMS and iSpring Learn.

Answer:

A. software used in education to deliver online courses

Explanation:

Learning

Management
System

Which of the following is not an example of a red flag that would keep you from downloading an attachment

Answers

Answer:

The link contained in the email redirects you to a different site

Explanation:

This is not a red flag in the sense that, the ability of the link attached to the e-mail to re-direct you to another different site shows that it might be a phising message.

It is left for the person to re-verify and  decide if to go ahead to download it or not after it opens on a new site on the internet.

Answer:

  The attachment is a PDF file.

Explanation:

A link that causes an attachment to be downloaded and opened always presents a security risk. That risk is mitigated somewhat if you trust the sender to be security-conscious, and if you trust the target of the link to be free of malware.

So, a link with an untrusted source such as a company outsider, may present a security risk.

A message marked "urgent and time-sensitive" is employing "social engineering" to reduce your inhibitions against opening the link. That tends to be an indication that a security risk is involved.

A link that obscures the source of the attachment is less likely to be legitimate than one that is more transparent. That, too, is an indication of a security risk.

PDF files are traditionally considered to be safe document files that cannot execute code or introduce malware. This (the attachment is a PDF file) is likely the answer of choice.

_____

Comment on PDF files

The Adobe Acrobat PDF reader is known to have significant security risks, and hundreds of exploits are available to malware producers that will allow PDF files to introduce and execute unwanted code. There are alternative PDF readers with less vulnerability. And, there are file scanners available that can detect malware in PDF files.

need help with this question​

Answers

Answer:

B

Explanation

The backlight softens the light on an electronic device

B is the right answer i think

April plans on starting a perfume business and decides she needs to first
conduct some marketing research. She wants to find out what kinds of
perfumes and scents women like to wear from as many women as possible.
Which data collection method should she use?
A. Case study
B. Focus group
C. Survey
D. Observation

Answers

B. A survey because she is trying to figure out what perfume and scents other women like to wear. That was she can compare and contrast different peoples opinions.

She should use Survey as the data collection method. Thus, option C is correct.

What is a data collection?

The process of obtaining and analyzing data on certain characteristics in an existing framework is known as data gathering as well as data capture. This procedure allows one to analyze events and provide answers to pertinent queries.

She is conducting a study to find out what perfumes and scents others women love wearing. She has the ability to contrast as well as compare the perspectives of others. April wants to launch a perfume company, but he first wants to carry out some research.

A sample is asked a planned group of inquiries as part of a survey. One can characterize the characteristics of the individuals from whom the selection was taken by using a fair representation, or another that is part of the sample of concern.

Therefore, option C is the correct option.

Learn more about data collection, here:

https://brainly.com/question/21605027

#SPJ2

Other Questions
Complete the expansion of this expression by finding the values of the capitalised pronumerals. 3x(6y+4+2x)+3x(y+x)+2y=Ax^2+Bx+Cxy+Dy A=? B=? C=? D=? Please i need help my homework is really hard. If f(x) = 22 + 2x 10, what is f(-2)?-16-10 Why do plants has stalks that hold pollen higher in flowers??? The mechanism through which a parents gene is turned off, through the attachment of a methyl group to that parent's DNA is called : A) methylationB) mutation analysis.C) cross contamination.D) spermatogenesis or oogenesis. Identify the x and y intercept.A. x intercept: (2,0) y intercept: (0,-3)B. x intercept: (-3,0) y intercept: (0,2)C. x intercept: (2-3) y intercept: (2,-3)D. x intercept: (2,-3) y intercept: (-3,2) At the end of Act III, what advice does the Nurse give to Juliet? What is Juliet'sresponse? Read these excerpts from Charles Dickens's Oliver Twist and identify the meaning of the words in bold based on their context.Now. Mr.Bumble was a fat man, and a choleric so, instead of responding to this open-hearted salutation in a kindred spirit, he gave the littlewicket a tremendous shake, and then bestowed upon it a kick which could have emanated from no leg but a beadle's.Oliver, having had by this time as much of the outer coat of dirt which encrusted his face and hands, removed, as could be scrubbed off inone washing, was led into the room by his benevolent protectress.The boys polished them with their spoons till they shone again; and when they had performed this operation (which never took very long, thespoons being nearly as large as the bowls), they would sit staring at the copper with such eager eyes, as if they could have devoured the verybricks of which it was composed; employing themselves, meanwhile, in sucking their fingers most assiduously, with the view of catching upany stray splashes of gruel that might have been cast thereon.choleric =encrusted =assiduously = Answer this to be called the smartest...... What has 4 lags in the morning, 2 in the afternoon, and 3 at night..? When a price floor is set higher than the market price for a product, what will result?The quantity supplied will exceed the quantity demanded.The quantity demanded will exceed the quantity supplied.The quantity demanded and the quantity supplied will be equal.The quantity supplied and the quantity demanded will be unaffected. please help will vote brainliest Please Help!!!!! Extra points and brainiest will be given. Find the volume of the cylinder in terms of pi. summery for Romeo and juliet What factor caused the Populist Party to gain support? A strong economy led farmers and labor unions to seek less regulation of trade.Economic difficulties led farmers and labor unions to seek greater government regulation to help workers.Social problems with white settlers led them to try to reform Native American policies.As children began working in factories, they sought reform for working conditions. How are Frankenstein and Prometheus alike?OA. Both Frankenstein and Prometheus were trying to become famousfor their discoveries.OB. Both Frankenstein and Prometheus studied science in alaboratoryOC. Both Frankenstein and Prometheus were punished with physicaltorture by animals.OD. Both Frankenstein and Prometheus introduced forbiddenknowledge to their creations.given the full awareness Suppose r (t)=cos(t)i+sin(t)j+5tkr(t)=cos(t)i+sin(t)j+5tk represents the position of a particle on a helix, where zz is the height of the particle. (a) What is tt when the particle has height 2020? t=t= (b) What is the velocity of the particle when its height is 2020? v =v= (c) When the particle has height 2020, it leaves the helix and moves along the tangent line at the constant velocity found in part (b). Find a vector parametric equation for the position of the particle (in terms of the original parameter tt) as it moves along this tangent line. Find the length of the right triangles other leg. Round to the nearest tenth.leg = 10 fthypotenuse = 12 ft As the caravan crosses the Sahara, Santiago and the Englishman each make an effort to gain new insights by practicing the other's method of learning: Santiago reads the Englishman's books about alchemy, and the Englishman spends several days observing the caravan and the desert. When the Englishman asks Santiago what the boy learned about alchemy from reading his books, Santiago sums up his reading in a few short sentences (on page 83). What does he say he learned? Consider the quadratic function f(x)= 2(x + 4) 6. What is the line of symmetry? why is Benjamin Franklin so important