Answer:
Marketing
Explanation:
my dad told me
another weekly question (I need to stop these)
Who is your favorite lets player or animator
Answer:
jaiden
Explanation:
Answer: wat dat mean
Explanation:
Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.
b
Provide only her name and date of birth.
c
Provide only her name and address.
d
Provide the requested information to receive the discount.
Answer:
a
Explanation:
sis is gonna get scammed
Answer:
a
Explanation:
You dont know who is getting your information and it is not someone you know. STRANGER DANGER!
how has social media changed my journalism looks like?
A. journalists use poor grammar online
B. journalist can be everyday people
C. Only journalists from major news stations report the news
D. Journalists can dress down while reporting the news
This is for a test, so I need to get answers fast.
Please help me
Answer d
Explanation:
1. Why is it important to know how to create a slide?
2. How can you utilize the knowledge in making a slide as a student?
in own sentence pls
Answer:
1. Because slides help in improving visual aids. It improves understanding when teaching student.
2. You can make projects, shows, teach others, and play with it just for fun
Explanation:
A large company has extensive downtown office space with many conference rooms. To lower their electric bill, the company has installed a new system that automatically turns off the heat and lights in a conference room when no one is in the room. What is the simplest explanation for how the system works?
A camera in each room is connected to the security desk. When the officer on duty sees that a room is empty, they turn off the heat and lights in that room.
A small robotic device on wheels knows the building layout. It roams the offices, peeking into each conference room to see if anyone is using it. If not, the robot turns off the lights and heat.
A sensor detects and reports on movement in the room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.
Every hour, the system emits a loud sound in each room. Pressing a large red button in the middle of the table turns off the sound in that room. If nobody does so within 30 seconds, the system turns off the heat and lights.
The simplest explanation for how the system works is option C: a sensor detects and reports on movement in the conference room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.
What is the office space about?The system that automatically turns off the heat and lights in a conference room when no one is in the room is commonly referred to as an occupancy sensor. An occupancy sensor uses various technologies, such as infrared or ultrasonic, to detect the presence or absence of people in a room.
Therefore, Once the sensor detects that no one is in the conference room, it sends a signal to the control system, which then turns off the heat and lights. When someone enters the room again, the sensor detects their presence and sends a signal to turn the heat and lights back on. This system is designed to save energy by ensuring that heating and lighting are only used when needed.
Learn more about office space from
https://brainly.com/question/28885269
#SPJ1
Why isn't my brainly post being answered?
Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.
1. A virtual network of websites connected by hyperlinks is called
A. a browser
B. a URL
C. the internet
D. the World Wide Web
2. The Domain Name System translates the URL into
A. a client
B. an IP address
C. a website
D. a web browser
the answer of the first McQ is a and second one is b
Answer:
1 Option D is correct: World wide web
2 Option B is correct: Ip addresses
In 2-4 sentences, explain the difference between the “save” and the “save as” commands.
Save and Save As would be that Save aims to update the current content of the last stored file, whereas Save As aims to save a new folder or to save an existing file to a new place with the identical name or another title
Answer: The difference between save and save as is that save is a command in the File menu of Microsoft Word that enables a user to store a document back to the file or folder from where it came in the first place. Meanwhile, save as is a command that enables a user to store a new document in a new location.
2.
What does LAN stand for?
Little area network
Large area network
Local area network
O Locally available network
Answer:
Local Area Network
Explanation:
A computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km.
Hello can you please help with this if you want to thank you!
what will the total for the month be if the revenue is 9,450 and the fixed expenses are 9,000
A short story, but i remember in 1nd - 5th grade at my elementary school here is the list from first to last for being cool at school
1. Lego and Pokemon cards
2. Having lunchables and good stuff while i had that whole wheat bread pb and stuff
and tuna that i don't even like and stuff (unless it's a field trip)
3. Yu-gi-oh cards
4. Slime
5. Nothing that much but showing your new phone and where you went over the weekend, while i stayed at home doing mostly nothing productive
We all live similar lives don't we.
Help me! I'm timed!!!
IF I GIVE YOU BRAINLIST FOR THIS QUESTION YOU GIVE ME SOME TO OK what's the capital of Georgia
Answer:
Atlanta
Explanation:
hope this helps
Answer:
Atlanta
Explanation:
Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?
A.
Creative Commons
B.
word processing program
C.
Weebly
D.
web-based publishing software
The BEST type of program for Anthony to use to create the items he needs for his business are word processing program.
What is the word processing program?Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.
To learn more about word processing program.
https://brainly.com/question/14718387
#SPJ1
Which is the best approach to debugging?
A.
Don’t worry about it at all until after the program is written.
B.
Be sure the program will work perfectly before writing it.
C.
Anticipate errors before they happen, and find and fix errors that happen.
D.
Use an HTML encoder.
1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?
Answer:
The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.
Explanation:
There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.
Your brother used your computer to complete his homework last night, and now your login password no longer works. What question frames your problem into a question to help reach a solution? What is wrong with my brother? Did this computer get a virus? Why is this computer broken? Did my brother change the password? IF CORRECT 5 STARS AND A THANKS
Answer:
Chances are your brother probably changed the password to mess with you. so i would recommend to interrogate the heck out of him and hope for the best.
Explanation:
Answer:
Did my brother change the password?
hope this helps :)
Using AI to predict future crimes might be considered
bias
fair
helpful
smart
Answer:
helpful
Explanation:
Answer:
I think using Al to predict future crimes might be considered HELPFUL
Tonya is creating a program that will allow the user to input their work address. Which kind of variable should Tonya use for this?
A.
a syntax variable
B.
a float variable
C.
a string variable
D.
an alphabetic variable
Answer:
B.
a float variable is the answer
Explanation:
becouse it is float variable
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
Norah is presenting a summary of her animation to get support from some investors. What is the short version of her story’s plot called?
aesthetics
synopsis
pushing the expression
storyboard
What two types of devices have a keyboard integrated into the screen?
Question 1 options:
laptops and smartphones
tablets and electric typewriters
typographers and tablets
tablets and smartphones
Answer:
tablets and smartphones
Explanation:
In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
helpppppppppppppppppppppppppppppppp
What was most monumental decision in making a trip to Oregon?
The amount of food to take on the journey
The season for leaving on the journey
The number of people in your wagon train
The type of animals used for the journey
Please help, I can't find the answer but I understand the topic.
Question:
Fill in the missing parentheses to have x equal 15.
int x = _ 2 + 3 _ * 3;
Console.WriteLine(x);
Answer:
x=(2+3)*3;
Explanation:
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
If you used a shift right 3 Caesar Cipher to encrypt the following message, what would the output be?
HELLO
Upon doing so, the amount of letters are still 5. but your result would be...
KHOOR on shift 3.
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2