Answer:
WHAT SOCIETY?!
Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....
It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.
Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in technology, gaming culture, and overall society affected the market?
Answer:
The answer is below
Explanation:
In my personal opinion what a "successful" console in the future will need to include to sell well is "a big library of games." This feature will help a console supports many games that will appeal to all categories of gamers.
The changes in technology, gaming culture, and overall society has affected the game market in many ways such as:
1. In terms of technology: it has made the game manufacturers both the console and third-party game developers to improve their gaming features. For example, the advancement in gaming pads becoming wireless. The gaming console having internet or online features, where gamers can play with each other around the world from their rooms. Also, the gaming character design looking more and more like the real-life personality it represents.
2. In terms of gaming culture: modern games are no longer for teenagers alone. It is now appealing to adults as well. This is evident in football players and coaches playing the games and talking about it. Even some players tend to influence their ratings in the game by mentioning how good they are in the press in comparison to the rating game developers are giving them.
3. Overall society has now seen gaming consoles as part of everyday life. The parents, researchers, and even feminist groups are now well aware of the gaming industry. And each of the stakeholders involved is influenced by how the game consoles manufacturers market their games through media, sports personalities, celebrities, etc.
Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.
Answer: See explanation
Explanation:
A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.
Examples of Internet entities that may want secure communication include:
i. Two routers
ii. Our laptop and web server.
iii. Connection that exists between two DNS name servers.
Which is a conditional statement?
If it is sunny, we can play ball.
It is sunny today.
It is sunny or rainy.
It is sunny across the street, but not sunny here.
Answer:
it is 1, I know this because i got 100% on my quiz
Explanation:
a good look of a web page depends upon?
Answer:
Depends mostly on your opinion
Q1 To remove filter
Option1: Click the Filter option of the Sort & Filter button in the Editing group on the HOME
Option2: Click the Filter option in the Sort & Filter group on the DATA tab.
Option3: Both 1 and 2
Option4: Pres DELETE
Answer:
Click DATA, Look for "Sort & Filter", Click Filter Box (right above "Sort & Filter"). Done.
Answer:
add a picture pls
Explanation:
What is the first step a user should take toward generating an index?
--finding and marking words or phrases that should be included in the index
--making sure that headers at different levels are using consistent styles
--bolding every word or phrase that should be included in the index
--writing down information about the author and publisher of other books used
Answer:
I think that it's A
Explanation:
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.
The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.
What is an end-to-end Delay?End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.
Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.
Variable queuing delays exist.
The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.
To get more information about End-to-End delay :
https://brainly.com/question/28584250
#SPJ2
a good look of a web page depends upon?
Answer: See explanation
Explanation:
• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.
• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.
• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.
Just took a test and I got 5 wrong and I wanted to know the correct answers
Answer:
I need the pic
Explanation:
It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
Answer:
False
Explanation:
would be blocked from server
What is the definition of trouble shooting.
PLS HELP IN WHATEVER WAY YOU CAN ASAP
the company's Chief Financial Officer recognizes the need for an upgrade to the smart watches but does not understand why the budget proposed request more than the purchase price of the update software how would you respond to this
Answer:
what ever way I can you say
I would respond by explaining that the price may go up or down before we buy them and that it is good to have some wiggle room with the cost. I would also mention that any unused money will come right back and that it is just a precaution.
The single-cycle datapath conceptually described in this section must have separate instruction and data memories, because:________. a. the formats of data and instructions are diff erent in MIPS, and hence different memories are needed. b. having separate memories is less expensive. c. the processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycled. the formats of data and instructions are different in MIPS, and hence different R-type instructions are needed .
Answer:
C. The processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycle
Explanation:
Processors require instructions and data which are retrieved from data memories for processing, but it cannot access two or receive two both processes as only a port is used for accessing data and another for receiving instructions. In fact, a single-cycle or single-clock processor cannot use a resource more than once.
Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter: a list of values (value_list) of various types. The recommended approach for this:
a. create a variable to hold the current sum and initialize it to zero.
b. use a for loop to process each element of the list.
c. test each element to see if it is an integer or a float, and, if so, add its value to the current sum.
d. return the sum at the end.
In python 3.8:
def func(value_list):
lst = [x for x in value_list if type(x) == int or type(x) == float]
return sum(lst)
print(func(["h", "w", 32, 342.23, 'j']))
This is one solution using list comprehensions. I prefer this route because the code is concise.
def func(value_list):
total = 0
for x in value_list:
if type(x) == int or type(x) == float:
total += x
return total
print(func(["h", "w", 32, 342.23, 'j']))
This is the way as described in your problem.
a document contains a list of items that appear in no particular order. what is the best way to format the list
Answer:
bulleted list
Explanation:
Bulleted list is the best way to format the list. As a document contains a list of items that appear in no particular order.
What is meant by Bulleted list?A bullet list is simply a list of items with dotted dots separating each item and a heading at the top. These lists are flexible and may be used for whatever you need them for, from something as informal as an agenda to something as serious as a business strategy for your place of business.
A bullet list is used when making a list of two or more items, where the order of the items is not important. A retailer may display a list of items you want to buy in the form of a bullet list, for example.
Use a number list if you're composing a list of actions or instructions when the order is important.
Thus, it is Bulleted list.
For more details about Bulleted list, click here:
https://brainly.com/question/17359798
#SPJ2
A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence
Answer:
D
Explanation:
because it is a sequence it does more than one thing
Answer:
B
Explanation:
I took the test
I NEED HELPS!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! UWU
jeremy has a handful of resisters and all of them except one have for bands the exception has three why?
Answer:
The 3 band resistor does not specify the tolerance.
Ususally this means the tolerance is 20%, which is not great.
Explanation:
The last band is typically the tolerance band, i.e., the lower the tolerance the more accurate the value as indicated by the other bands. In case of a 3 band code, there is no tolerance specified and you have to assume the default of 20%.
you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?
Answer:
Do not use such labels because they may be misleading and are unethical.
Explanation:
Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.
While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.
Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.
There are different instructions that comes with labeling, lithium metal label is quite different from Lithium-ion labels and as such one cannot use one for the order.
What one should you do is to never use the lithium metal labels in place of Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.
One has to comply with the regulations regarding batteries and the packaging of lithium batteries.
Lithium Metal Batteries are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.
They have high energy density than other lithium batteries. They can be found in Watches , Calculators etc.
Lithium-ion batteries are known to be secondary battery. That is, they are said to be rechargeable in nature. They can be found in Mobile phones, Laptops etc.
When shipped, any packages that has lithium-ion batteries must be labeled with UN3480 or UN3481.
When shipped, any packages that has lithium metal batteries must be labeled with UN3090 or UN3091.
Learn more about Batteries from
https://brainly.com/question/24876978
I have put the question in twice and I cannot get a answer for it .. this site isn’t great in my view..
write a C++ program that ask the user for the number of cookies eaten and display the calorie consumption
Answer:
#include <iostream>
using namespace std;
int main()
{
int cookies;
cin >> cookies;
cout << "The calorie consumption is: " << cookies * 142 << endl;
return 0;
}
Explanation:
First line: include basic library of C++(input and output).
using namespace std;
Says to compiler we are using std.
int main() Main function
int cookies, cookies variable, of int type
cin >> cookies
get the number of the cookies from user
cout Print the text and calories(one cookie have 142 calories)
Have a nice day ;)
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
Answer:
I think is None of this ,
According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.
What is the use of auto-responder?If you use an auto-responder, all your customers will receive a standardized reply. That will make it clear for them that their message has not been read yet. However, even if your message states that you will eventually read and respond properly to every single email.
It is likely that customers will doubt it. They do not expect an automatic response upon contacting you - quite the contrary, they expect their issues to be addressed specifically and immediately.
An email message is a text that is transmitted or received over a computer network and is often short and casual. Email communications are often only text messages, but they can also contain attachments (such spreadsheets and graphic files). Multiple people can receive an email message at once.
Therefore, According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.
Learn more about Email communications on:
https://brainly.com/question/30262540
#SPJ3
What is the purpose of a poster frame?
to allow the contents of an embed code to be displayed
to insert a downloaded video for offline playback and editing
to create the frame in which a screen recording will be inserted
to capture a portion of a video clip to show as a preview image
Answer: the last one
Explanation:
Here is the answer::
What is the most effective way to identify improvement opportunities for value log
Answer:
Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities
Explanation:
Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities.
In other words, Value stream mapping is a strategy that is used to break down situations into pieces such as people, information, and materials involved in delivering services.
To do this, a distinct categorization is made into a value-adding category and a non-value-adding category. This helps to determine which elements add value to customers or not.
Thereby, removing unnecessary processes or steps which in turn increases productivity and value.
An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won’t fulfill their request due to an unsure reputation of that business.
A)Negative
B)Positive
Answer:
ooof
Explanation:
Answer:
B) negative
Explanation:
the evidence shown "unsure reputation of that business"
PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?
Answer:
Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.
Which of the following is considered an input device?
Answer:
Keyboard
Mouse
Light pen
Microphone
Touch pad
Why is it useful to have more than one possible path through a network for each pair of stations?
Answer:
Because if one path is crowded, then there is always another path to make it less crowded and it is more convenient
Explanation:
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer
The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.
In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.
The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.
On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.
The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.
Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.
For more questions on Reviewer, click on:
https://brainly.com/question/30517194
#SPJ8
Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False
Answer:
True
Explanation:
which is the best software application to be used by a hotel manager
Answer:
Cloudbeds
:))
hope it helps