Answer:
whats the mission about??
Explanation:
~evita
n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals
What is the dark, sticky substance that forms when tobacco is burned?
Answer: Tar.
Explanation:
A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.
bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera
Answer:
Hi not able to understand your language
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?
the info needed to log in
-This would show what is protected in the privacy policy and its related to you since it would show personal data.
-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.
4. What is the difference between head tag and heading tag?
Any looping construct can be nested inside another loop is known as
Answer:
nested loop
pls mark me as brainliest
Which of the following is a programming language that translates code one line at a time? (5 points)
a
C:
b
Java
с
Machine
d
Python
Answer:
Python!
Its the only programming language that is an interpreted language
Hope it helped <3
ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT
Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?
List three ICT tools that are commonly used in the education system?
Identify two ways in which ICT has impacted the education sector?
Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)
Explanation:
20 POINTS-
can someone help with this?
Answer:
large storage= data warehouse
data from daily= world wide
data storaage= transactional
online data= relational
I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true
What is the difference between a patent and a copyright?
A copyright protects inventions, a patent protects intellectual property.
B copyright protects intellectual property; a patent protects inventions.
C Copyrights are for music, and patents are for books.
D Patents are for books, and copyrights are for music.
Answer:b
Explanation:
The difference between a patent and a copyright is,
B) Copyright protects intellectual property; a patent protects inventions.
Given that,
To find the difference between a patent and a copyright.
We know that,
Copyrights primarily safeguard original works of authorship, such as literary, artistic, musical, or dramatic creations.
On the other hand, patents are granted to inventors to protect new and useful processes, machines, compositions of matter, or any new and inventive improvement thereof.
So, copyrights are more about creative expressions, like music and books, while patents are focused on protecting unique and innovative inventions.
Option B is true.
To learn more about copyright visit:
https://brainly.com/question/357686
#SPJ4
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
Identify six specific skills that a computer software engineer is expected to demonstrate.
1.) Team work
2.) Disciple
3.). Creativity
4.) Attension To Deatil
5.) Time Mangament
Explanation:
Answer:
A computer programmer needs to demonstrate that they are:
1. A team player
2. Able to meet deadlines
3. Able to solve problems logically and efficiently
4. Able to create programs that fulfill their intended purpose
5. Able to be flexible (do many different types of jobs)
6. Able to adapt to new changes and be able to learn new skills
Explanation:
Computer programmers are tasked with creating software that works effectively with the given hardware and the people using it, and to do that, they have to be very skilled in many areas.
Briefly explain the main difference between how to connect a new office computer in the SHSS office to the internet and how to connect a standalone computer in your house to the internet
Answer:
Once you've set up your computer, you may want to purchase home Internet access, up a home wireless network, commonly known as Wi-Fi, so you can connect multiple. Now that you know about the different types of Internet service, you can do. The primary piece of hardware you need is a modem.
3. Maria is in charge of consolidating the names of the participants of the two-day virtual
seminar. She wants to arrange the names alphabetically using MS Excel. Which of the following is
the correct sequence of steps in sorting text?
1. Click the Sort & Filter command. A drop down menu appears.
11. Choose Sort A to Z.
III. Select the cell range needed to be sorted.
IV. Go to the Editing Styles group of Home Tab.
A. I, II, III and IV
C. III, IV, I and I
B. II, II, IV and I
D. IV, l, ll and I
Answer:
The correct sequence of steps in sorting text is;
III, IV, I and II
Which is option 'C' where the last item is II
C. III, IV, I and II
Explanation:
Sorting is the orderly arrangement of items (data) according to a specified criteria such as arranging a list of items alphabetically or a numerical arrangement of a data collection
Filtering is the selection for display, data that meets a specific condition
To arrange the names of the participants of the two-day virtual seminar alphabetically using MS Excel the sequence of steps are;
1. Select the rows or columns the are to be sorted by using steps for selecting rows and/or columns
2. Go to the Editing group of the Home Tab ribbon
3. Click on (the down arrow besides) the Sort & Filter command icon to display a drop down menu with options for type of sorting and filtering
4. Choose Sort A to Z to sort the contents of the cell range in increasing alphabetical order
Therefore, the correct sequence of steps are;
III. Select the cell range needed to be sorted
IV. Go to the Editing Styles group of the Home Tab
I. Click the Sort & Filter command. A drop down menu appears
II. Choose Sort A to Z.
The correct sequence is III, IV, I and II.
Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages
Answer:
Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.
Explanation:
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Answer:
Sistemas de autenticación y seguridad de la información.
Explicación:
La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.
Which of these devices features D-pads and analog sticks? ASAP PLEASE
A. smartphones
B. portable consoles
c. PDAS
D. feature phones
E. tablets
Answer:
b. portable consoles
Explanation:
hope that helps :)
Answer:
b - portable consoles
Explanation:
PLATO
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
Examine the weather map.
A weather map of the United notes. The following are shown on the map: major cities with high and low temperatures; high and low pressure systems; types of precipitation, fronts.
Which weather forecast would be accurate based on this weather map?
Rain is expected in Billings.
It will be cold in Atlanta.
Miami will have sunny weather.
Minneapolis will be stormy.
Answer:
A. Rain is expected in Billings.
Explanation:
Rain is expected in Billings would be accurate based on this weather map.
What is Weather map?
A weather map is a map of the world or a portion of it that uses symbols to depict the weather conditions at a given time, including temperature, pressure, wind speed and direction, humidity, clouds, visibility, and type and amount of precipitation.
The trained observers record the temperature, pressure, wind speed and direction, cloud cover, and precipitation amounts in observatories and meteorological stations. Using symbols, these observations are entered on a weather map. '
'
As a result, a weather map shows the weather factors for a region at a specific time that are denoted with recorded symbols. It makes the current weather conditions clear.
Therefore, Rain is expected in Billings would be accurate based on this weather map.
To learn more about weather map, refer to the link:
https://brainly.com/question/1674348
#SPJ3
In which phase of website design does the designer create a mock-up aimed at the target user? A. learning B. planning C. design D. development E. testing and delivering
Answer:
C. design
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.
In the design phase of a website design, the website designer create a mock-up aimed at the target user. A mock-up is a graphical representation or illustration of a graphic design and as such isn't responsive.
This ultimately implies that, a mock-up or model can be used by a website designer to illustrate or show the target user the look and feel of a website, so as to help these users have a better understanding of the specific elements and structure associated with it.
also have a good day people !!
Answer:
Thx u2!!
Explanation:
Everyone have a good day!
Answer:
You too and thank you for 50 points!!
Explanation:
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
What is an "Expert System"?
If you can’t answer pls leave It
Answer:
program that use artifical intelligents
Explanation:
Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.
Scanning devices translate information processed by the system unit and present the information
on paper
Answer:
True
Explanation:
It is TRUE that Scanning devices translate information processed by the system unit and present the information on paper.
This is because the scanning device otherwise referred to as a scanner uses Optical Character Recognition software to capture the scanned document which is then processed into files accessible by predefined application, such as image viewer
Sasha has just gotten a new job in a nearby city. After
comparison shopping, she found that renting a nice two-
bedroom apartment would cost around $800 per month.
Her utilities would cost about $150 per month.
Sasha has enough money saved for a down payment, and
she found that she can buy a three-bedroom house or
condo with a mortgage payment of $1,000 per month,
including taxes and homeowner's insurance. Her utilities
would cost about $200 per month.
Sasha's new.company has told her that she will be
required to move at her own expense in two years.
What should she consider before making her decision?
The monthly costs of renting and buying
The extra expenses needed for maintenance while
she lives in the house.
The amount of the down payment she will need to
make
The expense of selling the home when she leaves
the city
where is the question??
Explanation:
z 1
-- = --
7 21
solve
Answer:
[tex]z= \frac{1}{3}[/tex]
Explanation:
Given
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Required
Solve
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Multiply both sides by 7
[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]
[tex]z= \frac{1}{21} * 7[/tex]
Rewrite as:
[tex]z= \frac{1 * 7}{21}[/tex]
[tex]z= \frac{7}{21}[/tex]
Simplify fraction
[tex]z= \frac{1}{3}[/tex]
What is your definition of Digital Safety?
Answer:
Digital Safety is being knowledgeable in the areas of Internet safety, device security, etc. and keeping yourself safe when using the Internet.
Explanation:
When you know how to stay safe on the Internet and keep yourself safe, you know Digital Safety.
How many passes will it take to find 12 using a binary search? 8, 10, 12, 14, 16, 18, 20
1 3 4 2
Answer:
3 passes
Explanation:
Binary search halves and halves an ordered list of numbers until the value being searched is found.
14 is the middle number. it is larger than 12 so we look at the left side
10 is the middle number of the left side it is smaller than 12 os we look at the right side
12 is the middle number between 10 and 14 and it is also the number we are trying to find.