Answer:
Rules for Naming VariablesThe first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.#Markasbrainlessplease✅
Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?
Answer:
it will help in future by a situation if you want to do software engineers in that situation it will help you and also
write a programme to print the following series or pattern 1,22,333,4444,55555
Answer:
hey here is your req answer.
CLS
FOR i = 1 TO 5
FOR j = 1 TO i
PRINT i;
NEXT j
NEXT i
END
any problem the comment it and let me know
hope this helped you
Wesellyoubuy, a consumer electronics company, received consumer complaints about its employees not being able to communicate with consumers properly. After investigating the prime reason behind these complaints, the management found that the consumer service employees were following the same strategy to address all types of consumer issues. The management immediately started a new training program for the consumer service employees where they were trained to respond to every possible query a consumer might have. Eventually, their service ratings and sales showed improvement. In this scenario, the consumer service team improved _____.
Answer:
customer satisfaction
Explanation:
The consumer electronics company started a new training program for the consumer service employees as the company found that the consumer service employees were following the same strategy to address all types of consumer issues due to which they were not able to communicate with consumers properly.
This leads to improvement in service ratings and sales.
In this scenario, the consumer service team improved customer satisfaction
What is the status of this account?
A)Current
B)Current, but closed
C)Potentially negative
D)Potentially negative, but closed
D)Potentially negative, but closed
we know this due to this
-scav
The given account is Potentially negative, but closed. Option D is correct.
What is the Potentially negative account?A closed account with a “Potentially negative closed” designation has a history that a lender would find unfavorable.
Negative account are the information includes things like missed payments on credit cards and loans, charge-offs, collections, bankruptcies, short sales, deeds in lieu of foreclosure, and foreclosures.
The given image clearly indicated that the account is under the debt and it is called as the Potentially negative, but closed account. The section under “Potentially negative items” will contain a list of all accounts that could be seen negatively by lenders or other people looking at your credit history.
Therefore, option D is correct.
Learn more about the account, refer to:
https://brainly.com/question/29108212
#SPJ2
Which character is used to create an absolute reference to a cell?
Answer:
$ - The dollar sign
Explanation:
The dollar sign creates an absolute reference in a cell. Absolute reference refers to an actual fixed location on a worksheet in Excel.
Which of the following is constantly changing and advancing?
Innovation
Cell phones
Technology
Computers
Answer:
Technology
Explanation:
This is because Cell phones ,Innovation ,and Computers ARE changing although they are in the same group of "Technology" so it would be technology.
Any questions?
1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is a_____
modem
keyboard
visual display unit
printer
So this is called a modem we use it to send and receive info over telephone lines
Hope this helps
-scav
name the default Package of java
Answer:
java.lang package
Explanation:
Java compiler imports java. lang package internally by default. It provides the fundamental classes that are necessary to design a basic Java program.
A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
A. It prevents users from accessing frequently used files when there is no Internet connectivity.
B. It prevents users from accessing infrequently used files when there is no Internet connectivity.
C. It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D. It prevents users from accessing infrequently used files when there is reliable Internet connectivity.
Answer:
B
Explanation:
The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection
The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.
What is Software development?Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.
While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.
Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.
Therefore, The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.
To learn more about Software, refer to the link:
https://brainly.com/question/985406
#SPJ6
A bank uses a computer program during the night to tell if the alarm should be rung. Sensors in the bank set the following Boolean variables:
vaultClosed: set to true if the bank vault is closed; otherwise false
heardNoise: set to true if a microphone heard noise; otherwise false
sawMovement: set to true if a camera saw movement in the bank; otherwise false
The automatic alarm should notify the police if there is noise and movement in the bank, or if the bank vault is open.
Which of the following boolean expressions can be used in a selection statement to ring the alarm?
A. NOT vaultClosed OR (heardNoise AND sawMovement)
B. heardNoise AND vaultClosed
C. NOT vaultClosed AND sawMovement
D. heardNoise AND sawMovement
Answer:
A. NOT vault Closed OR (heard Noise AND saw Movement)
Explanation:
Boolean expression is an expression which has logical or relational operator and they operate on boolean variables. In the given scenario the the expression used will be NOT vault closed or heard noise and saw movement. This will notify the police when the vault is opened or is tried to be opened. When there is any movement in the vault or when there is some noise the automatic alarm will ring and notify the relevant officials.
What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^
Answer:
Serial Advanced Technology Attachment (SATA).
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.
Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.
Generally, SATA comprises of two ports and these are the power and data connector.
Why might an algorithm created to assist in hiring decisions be biased?
Previous decisions were flawed.
Previous data has no effect.
The algorithm used incomplete source data.
Answer:
Previous decisions were flawed
Explanation:
An algorithm depends entirely on the data input into the system in the decision making process.
As such, when there are conclusions in the data set used by the algorithm for decision making which are distorted, such as the association of less individuals that drink and drive in the rich cities than can be found in poorer communities due to the presence of less bars uptown and as such drivers from uptown areas are given preference may include a bias that is due to conclusion on which the previous decisions were made and used in the algorithm which may have been flawed or need more detailed analysis
HELP PLEASE 100 POINTS
Use the drop-down menus to complete the steps to access the Compact & Repair tool.
1. Open the database.
2. Go to the
✔ Backstage
view.
3. Click Info and then_________
OR
1. Open the database.
2. Click the_____ tab.
3. In the Tools group, click ________
The program then reduces the size of the database.
Answer:
Explanation:
This is for MS Access:
1. Open the database.
2. Go to the
✔ Backstage
view.
3. Click Info and then__Compact and Repair__
OR
1. Open the database.
2. Click the__Database Tools__ tab.
3. In the Tools group, click ___Compact and Repair Database___
The program then reduces the size of the database.
What is the relationship between optical drives and WORMs?
Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck
What electronic appliances at your home / school can be controlled remotely? Name any 4
with its uses.
Answer:
Hi how are you doing today Jasmine
I need help getting earbuds please help
My mom wants reasons to get wireless earbuds and i'm out.
I need someone to give me some good things about wireless earbuds and bad things about wired earbuds.
(and i got in truble with bluetooth headphones)
Answer:
Wireless earbuds are a lot harder to break.
Explanation:
Normally if something goes wrong with wired earbuds/headphones it's due to the cord. Wired earbuds can break more easily and can possibly break off in the headphone jack (which is not fun to deal with, believe me. I had to deal with it a few weeks ago). Furthermore, wireless earbuds can't get tangled because they don't have a cord. Wired earbuds cords tend to get tangled and it's a pain to fix it every time it happens. Good luck getting your earbuds.
well im going to play devil's advocate here
reasons why you should not get wired earbuds they produce more greenhouse gas not just to make them but they take constant power and Bluetooth so this causes more greenhouse gas
you may think you need to replace them less but when you factor in the outright cost you still pay more
Hope this helped
-scav
Select the correct answer.
Raoul is an IT professional. His job involves identifying and mitigating threats to his employer's computer systems by controlling user access
Implementing risk management solutions.
Which certification would help Raoul advance his career?
О А.
Microsoft Office Specialist
B. Oracle Certified Professional
C. CompTIA Security
D. Cisco Certified Internetwork Expert
Answer:
D.
Explanation:
The Cisco Certified Internetwork Expert (CCIE) is a certification course offered by Cisco Systems. The certification is designed to assist senior networking professionals in building, designing, implementing, troubleshooting, and maintaining networking risks.
In the given case, Raoul would advance career by taking up the CCIE certification. As it will help him to tackle networking risks.
Therefore, option D is correct.
Answer:
CompTIA Security+
Explanation:
plato
The purpose of project management is _____. executing a requirement improvement working toward a common goal completing a project
Answer:
working toward a common goal.
Explanation:
Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.
Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement a project plan.
Furthermore, the main purpose of project management is working toward a common goal.
This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.
The fundamentals of Project Management which are universal across all fields and businesses includes;
1. Project initiation.
2. Project planning.
3. Project execution.
4. Monitoring and controlling of the project.
5. Adapting and closure of project.
In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.
Question 3 of 10 A compressed file containing visual data is called O A. a track O B. a video O C. an audio file . O D. an image file
it's called an image file
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
D. An image file.
ThanksHope it helpsPls mark as brainliestExercise 2. Sequence of Steps.
Directions: Refer to the Exercise l. write the numbers of the following pictures according to its
functions and importance. Discuss your answer.
C. Assessment/Application/Outputs (Please refer to DepEd Order No. 31, s. 2020)
Directions: Write True if the statement is correct and write false if it is not correct.
7. Rules must be followed all the time to avoid fatalities.
2. Rinse digging tools with a garden hose and use a wire brush or putty knife to get rid of
caked-on dirt.
3. Air release valves are incorporated into drip irrigation systems to release cir trapped
within the system.
4. Don't forget to take care of the wood handles as well.
5. Sprinkler irrigation is more or less the opposite of drip irrigation. Instead of supplying water
directly to the roots, the water is supplied overhead, usually in the form of downpour provided
by sprinklers
6-20.Discuss the advantages and disadvantages of the different types of irrigation systems
in farming.
21-25. Make a sample of incident report,
D. Suggested Enrichment/Reinforcement Activity/ies
Directions: Why do application of irrigation systems plays a vital role in farming? Discuss
your answer in a paragraph form.
References: Cuniculum Guide, MELC's, varied internet sources.
Explanation:
irrigation stabilizes farm production by protecting against drought and by increasing crop yields and quality when rainfall is insufficient.
Which of these examples demonstrate portfolio income?
Answer:
Explanation:
is money that describe when a car house is sold
New technology is NOT vital to businesses in which of the following ways?
Add to a product portfolio
Decrease market share
Help businesses stay competitive
Attract new customers
Answer:
The only option that would best fit this situoaion is Decrease market share, both Help businesses stay competitive and Attracting new customers are kind of similar and depend on new tech about 60-80% of the time usually, the first option dose no have any major connection with new technology.
hope this helps :)
Edhesive 11.4 code practice
Answer:
<!DOCTYPE html>
<html>
<body>
<h2>Billboard Hot 100 Songs 1980</h2>
<p>1. Blondie - “Call Me“</p>
<h2>Billboard Hot R&B/Hip-Hop Songs 1980</h2>
<p>1. Michael Jackson - “Rock with You“</p>
<h2>Billboard Hot Country Songs 1980</h2>
<p>1. Kenny Rogers - “Coward of the County”</p>
</body>
</html>
Mainly for edhesive users
100% on edhesive code practice 11.4
PLEASE HELP Write a program that loads one three-digit number and prints the root of its largest
digits in python.
Answer:
num1 = float(input("Enter first digit of number: "))
num2 = float(input("Enter second digit of number: "))
num3 = float(input("Enter third digit of number: "))
if (num1 > num2) and (num1 > num3):
largest = num1
num_sqrt = num1 ** 0.5
elif (num2 > num1) and (num2 > num3):
largest = num2
num_sqrt = num2 ** 0.5
else:
largest = num3
num_sqrt = num3 ** 0.5
print("The square root of largest digit of the three digit number is",num_sqrt)
Explanation:
num1 = float(input("Enter first digit of number: "))
num2 = float(input("Enter second digit of number: "))
num3 = float(input("Enter third digit of number: "))
if (num1 > num2) and (num1 > num3):
largest = num1
num_sqrt = num1 ** 0.5
elif (num2 > num1) and (num2 > num3):
largest = num2
num_sqrt = num2 ** 0.5
else:
largest = num3
num_sqrt = num3 ** 0.5
print("The square root of largest digit of the three digit number is",num_sqrt)
Which of the following is true of how packets are sent through the Internet?
Packet metadata is only included on important packets to indicate they should get access to faster paths through the network
Packet metadata is used to route and reassemble information travelling through the Internet
Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream
Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata
Packet metadata is used to route and reassemble information travelling through the Internet
-scav
The Scratch blocks are organized into 9 color-coded categories. Select all that apply.
Question 14 options:
Motion
Control
Group
Stack
Operators
Events
Sound
Loop
Looks
More Blocks
Data
Sensing
PLTW activity 2.1.5 PLEASE HELP I NEED STEP 5
FAKE ANSWER WILL NOT BE GIVEN POINTS
Answer:
Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes and development of both hardware and software. It has scientific, engineering, mathematical, technological and social aspects.
Hope it helps u
What spreadsheet tool could be used to add together the numbers in a
selected group of cells?
Answer:
=SUM(range)
example:
=SUM(A3:A9)
Explanation:
- range refers to a selected group of cells
- SUM is a function (predefined formula) for adding up cells or range
If the cell to the right of the cell you are typing in is ________, the data can "bleed" over that cell.
A. Full
B. Numerical
C. Empty
D. Formatted
**ATTENTION** If you send me a file, or a link for something to download your answer will be reported. Please answer through text. Thank you!
Which block is an example of sequencing
Answer:
B. go to x: -100 y: -100
glide 2 secs to x: 0 y: 0
say Let the show begin! for 2 secs
play sound snap until done
Explanation:
Algorithms in computer programming are step-by-step processes that show how problems can be solved. To accomplish this, Sequencing, Selection, and Iteration are methods applied. Sequencing specifies the correct order in which activities are to be performed to obtain the right results. Failure to adhere to that order or reverse the steps will cause a deviation from the true result.
In the example above, the steps to perform an operation are specified to the computer. When the steps are correctly followed, the right results will be obtained.