Answer:
precision
Explanation:
In simple English precise means exact or something specific
what do we call goods that are no longer available once you have used them??
Answer:
Either limited sources or extinct
Explanation:
Natural resources are things that can easily be replaced by nature. Limited resources are something that cannot be replaced by nature <33
Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.
Answer:
When is this due?
Explanation:
I will write it
A multiuser operating system specifically allows _____.
multiple users concurrently
multiple processes concurrently
only one person at a time
only one process at a time
Answer:
multiple users concurrently
Explanation:
A multiuser operating system specifically allows multiple users concurrently.
What principle of animation helps facial features to be noticed?
A)Arc
B)Exaggeration
C)Solid Drawing
D)Squash and Stretch
the answer is Squash and Stretch we use this when animating faces
-scav
Effective controls protect ______ from workplace hazards.
Answer:
Contact your team leader, supervisor, manager, etc.
Answer:
The Worker I did the TEST and got it right.
2. What is the use of the percent sign (6) and underscore in the LIKE clause? How do they differ in
operation and production of a report?
Answer:
The percent sign % (or per cent sign in British English) is the symbol used to indicate a percentage, a number or ratio as a fraction of 100.
See also: U+2030 ‰ PER MILLE SIGN; U+2031 ...
Answer:
There are two wildcards used in conjunction with the LIKE operator. The percent sign represents zero, one or multiple characters. The underscore represents a single number or character.
Explanation:
There are two wildcards used in conjunction with the LIKE operator. The percent sign represents zero, one or multiple characters. The underscore represents a single number or character.
Give five examples of physical networking.
Answer:
Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN), Personal area network (PAN), Others
Explanation:
Others can be classified as peer to peer, bluetooth
What is the primary language used to write web content and is the default format for Outlook messages?
Rich Text Format
Plain Text
HTML
PHP
Answer:
I think its plain text but I might be wrong
The number of mobile app users in 2022 is expected to reach _____.
178 billion
220 billion
200 billion
258 billion
Answer:
258B
Explanation:
which category of computers would you place an n-series nokia phone
Answer:
under "portable smart phone" I would assume
Explanation:
The N-series Nokia phone will come under the category of portable computer.
What is a computer?A computer is an electronic device that is configured for doing the task automatically after giving the command to the computer system. It automatically performs functions like perform arithmetic or logical functions.
The portable computer is a type of computer system that is handy and can be used from anywhere by carrying it, either in pocket or a bag. Therefore, the N-series Nokia phone is handy and can be carried in pocket anywhere.
Thus, it is a type of portable computer.
Learn more about portable computer, here:
https://brainly.com/question/20385904
#SPJ2
Name three ways you can collect responses from forms
If u know then u know!!!!
Water bucket, steve, water bucket, map
I don't know but okay
who doesn't like reeses
Answer:
I like Reeses. but then sometimes I don't
literally nobody lol
guys tell the answer correctly
Answer:
1st ans: where u can see yellow colored line
2nd ans: currency one
3rd ans: cells
Explanation:
You have learned about the uses of the Internet. Perform online research and identify applications of the Internet in at least four different fields, apart from the ones mentioned in the lesson. Write a short report on your findings.
Answer:
Answer:
Explanation:
Internet is useful in all the sectors and fields of research and business.
a) IT industry
b) Research
c) Efficient logistics
d) Digital marketing
Explanation:
Internet is useful in all the sectors and fields of research and business.
Some of the prominent sectors are
a) IT industry - All the work such as making of website, app, coding, etc. is due to the internet.
b) Research - Students can conduct secondary research online because of the internet and hence their research has now speeded up as compared to the time taken in earlier days
c) Efficient logistics - Be it online shopping, food delivery, parcel delivery etc. every this is driven by internet
d) Marketing on social media platform also known as e marketing is one of the most prominent field of internet application
Select the correct answer. In which item is energy stored in the form of gravitational potential energy? A. a slice of bread B. a compressed spring C. an apple on a tree D. a stretched bow string
Answer:
C. an apple on a tree
Explanation:
Energy can be defined as the ability (capacity) to do work. The two (2) main types of energy are;
a. Kinetic energy (KE): it is an energy possessed by an object or body due to its motion.
b. Gravitational potential energy (GPE): it is an energy possessed by an object or body due to its position above the earth.
Mathematically, gravitational potential energy is given by the formula;
[tex] G.P.E = mgh[/tex]
Where;
G.P.E represents gravitational potential energy measured in Joules.
m represents the mass of an object.
g represents acceleration due to gravity measured in meters per seconds square.
h represents the height measured in meters.
In an apple on a tree, energy is stored in the form of gravitational potential energy.
Cindy, our company’s Chief Technology Officer (CTO), suspects that someone is trying to hack into the company, and she’s heard that you have some cybersecurity skills that could prove useful. Cindy suspects that there are some hackers who are using SQLi to launch attacks and steal information from one of the databases and also to hijack users’ sessions and take over certain accounts. Can you use your cybersecurity penetration testing skills with SQLi to track down the hackers?
Cindy will need for you to submit a report with recommendations on your findings, which is pretty typical for others in your industry with this type of role.
Write a security assessment report that will be sent to the technical team and senior management, and specifically Cindy, the CTO. Your report should be approximately 3 pages and address the following:
Summary of Findings (overview of vulnerabilities found)
Types of tests used (with details on outcomes)
Impact of Threats
How any parts of the CIA Triad could be compromised with the vulnerabilities
Does OWASP have any recommendations that you can apply?
Executive Summary (what recommendations would you give to the CTO)
Present potential solutions, mitigations, or other
suggestions for reducing or eliminating the vulnerability
Answer:
I'm a cyber security enthusiast
Explanation:
How do you want the report delivered to you?
Luis saves an attachment that he received from Kevin. Where will the attachment save by default?
on the desktop
in the documents directory
in the Outlook Archive
in the downloads directory
The folder (path) where the attachment would be saved by default is: B. in the documents directory.
What is a folder?A folder is also referred to as a directory and it can be defined as a document that is typically used for storing and organizing an attachment or file on a computer system.
The type of folders.In Computer technology, there are different type of folders and these include:
Downloads folderDocuments folderQuick file folderMain folderSearch folderIn this scenario, the attachment that Luis received from Kevin would be saved in the documents directory by default.
Read more on folder here: https://brainly.com/question/7697887
Answer:
in the documents directory
Explanation:
got it right on edge hope this helps
Decimal numbers are based on __________.
letters (a and b)
16 digits
10 digits
two digits (1s and 0s)
Answer:
They are based on 10 digits.
Explanation:
I just did the test and got the answer right.
In Java:
Assume the availability of an existing class, ICalculator, that models an integer arithmetic calculator and contains:
a private instance variable currentValue that stores the current int value of the calculator
a getter method for the above instance variable
methods add, sub, mul, and div
Each method in ICalculator receives an int argument and applies its operation to currentValueand returns the new value of currentValue. So, if currentValue has the value 8 and sub(6) is invoked then currentValue ends up with the value 2, and 2 is returned.
Write a public subclass, ICalculator1, based on ICalculator. The class ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify currentValue. Instead, it simply returns 1, 0 or -1 depending on whether currentValue is positive, zero, or negative respectively.
Answer:
A subclass?
Explanation:
A public subclass for ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify current Value. Instead, it simply returns 1, 0 or -1 depending on whether current Value is positive, zero, or negative respectively.
What is public subclass?A member's access is declared to be public with the Java keyword public. All other classes can see members of the public class. This implies that a public field or method can be accessed by any other class. In addition, public fields can be changed by other public subclass or classes unless they are marked as final.
Further a subclass is defined as a class that is descended from another class (also a derived class, extended class, or child class). A superclass is the class from which a subclass is descended (also a base class or a parent class).
A public subclass for ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify current Value:
In Java,
public class ICalculator1 extends ICalculator {
public int sign() {
if (getCurrentValue() > 0)
return 1;
else if (getCurrentValue() == 0)
return 0;
else
return -1;
}
}
Therefore the availability of an existing class, I-Calculator, that models an integer arithmetic calculator, above public subclass has been made.
Learn more about public subclass:
https://brainly.com/question/15992142
#SPJ12
How many cubic millimeters are present in 0.0923 m3?
92300000 is the answer.
when converting meter to millimeter we multiply 1000
when converting m³ to cm³ we multiply by 1000000000(1000 x 1000 x1000)
What is presentation
Answer:
Presentation is the giving of something to someone, especially as part of a formal ceremony.
Explanation:
• In determining the GCF of 3 and 1, case I applies because 3 is evenly
divisible by 1. The GCF of 3 and 1 is 1, and therefore the GCF of 7 and 3
is also 1.
hots
(a) The gcf method returns the greatest common factor of
parameters a and b, as determined by case I and case II. Write
the gcf method below. You are encouraged to implement this method
recursively
/** Precondition: a and b are positive integers.
Returns the greatest common factor of a and b, as described in part (a).
*/
public static int gcfint a, int b)
Answer:
I've added the complete code as a text attachment
Explanation:
This declares two variables as integer for input
int f1, f2;
Prompts the user for two positive integer inputs
System.out.print("Enter two positive integers: ");
This gets the two integer input from the user
f1 = input.nextInt(); f2 = input.nextInt();
If both inputs are positive, the function is called and the gcf is printed
if (f1 >0&& f2 > 0){
System.out.printf("G.C.F of %d and %d is %d", f1, f2, gcf(f1, f2));}
If otherwise, a message is printed stating that only positive input is required
else{ System.out.print("Positive inputs only"); }
}
The function begins here
[tex]public\ static\ int[/tex] gcf(int a, int b) {
If the second number (b) is 0, the function returns the first number (a)
if ([tex]b == 0[/tex]) { return [tex]a;[/tex] }
If otherwise, the function is called recursively
else { [tex]return[/tex] (gcf([tex]b[/tex], [tex]a \% b[/tex])); }
}
In this exercise we have to use the knowledge of computational language in C to describe the code, like this:
We can find the code in the attached image.
The code can be written more simply as:
int f1, f2;
Prompts the user for two positive integer inputs
System.out.print("Enter two positive integers: ");
f1 = input.nextInt(); f2 = input.nextInt();
if (f1 >0&& f2 > 0){
System.out.printf("G.C.F of %d and %d is %d", f1, f2, gcf(f1, f2));}
else{ System.out.print("Positive inputs only"); }
}
See more about C+ at brainly.com/question/25870717
I need the answer ASAP. I’ll mark brainliest if right
Answer:
copy or repeat
Explanation:
hi my name is jef and sug fdbdsghfda zkuiga gy jb dfsg sadHGa
I totally agree with what you're saying, man. How they haven't placed you upon a golden throne in a kingdom made of steel is something that nobody will ever find out.
The Healthcare Innovation and Technology Lab would most likely be interested in which of the following app types?
an app to use for budgeting
an app to read books
an app to help people decide on a home insurance policy
an app to send data from an insulin pump to a data collection point
Answer:
No. 4: An app to send data from an insulin pump to a data collection point.
Explanation:
Healthcare Innovation and Technology Lab would not mainly be focused with budgeting, book reading, and home insurance policies. Answer number 4 includes health and technology.
fortnight on sat 530-10 my name is TTV BTW laggking_12
Answer: lma o
Explanation:
Answers for 1-6 on 9.3 Lesson Practice Edhesive?
Answer:
1.two
2.row, columns
3.will
4.realize
5.fabric
6.bandana
Explanation:
If this is the quiz after the videos here are the answers that got me through it
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
A. The MP4 video format is a free open-source solution that is compatible with all browsers.
B. The OGG video format is a free open-source solution that is compatible with all browsers.
C. The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
D. The OGG video format is natively supported by Internet Explorer 9 and does not require a plug-in.
Answer:
The answer is "Option C".
Explanation:
MP4 is a digital video filesystem that was firstly introduced in 2001. That very many platforms or applications throughout the digital market support MP4. Sound signals, video clips, yet still images, and text could be stored in an MP4 format, therefore internet Explorer 9 accepts the MP4 video format it does not have to have a plug-in.
List three differences between word and excel
Answer:
Word: A word processor
File extension is .doc
Images, texts, and graphic styles can be added
Exel: A spreadsheet software
Comprises rows and columns which combine to form cells
File extension is .xls
I hope i helped! xoxo