Answers

Answer 1

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)


Related Questions

when organizing a tema to develp anew quality control system managemne twanted to assign team members having characteristics common to effective teams

Answers

Management wanted to assign team members who possess characteristics commonly found in effective teams, such as strong communication skills, collaboration abilities, problem-solving aptitude, and a positive attitude.

What characteristics are commonly found in effective teams when developing a new quality control system?

When developing a new quality control system, it is crucial to form a team with individuals who possess the necessary qualities and skills to work effectively together.

Effective teams often demonstrate strong communication skills, allowing for clear and efficient information exchange.

Collaboration abilities are important to promote teamwork and ensure everyone's contributions are valued.

Problem-solving aptitude is essential to overcome challenges and find innovative solutions. Lastly, a positive attitude fosters a cooperative and supportive team environment, enhancing productivity and motivation.

By considering these characteristics, management can increase the likelihood of creating a successful quality control team.

Learn more about collaboration abilities

brainly.com/question/14295668

#SPJ11

which of the following not an example of written communication?

Answers

A conversation between co-workers is not an example of written communication as it involves verbal communication. The correct option is D.

What is written communication?

The exchange of information or messages via written words is referred to as written communication. All spoken and written communications fall under this category.

Emails, memos, letters, reports, notes, social media posts, and text messages are all examples of written communication.

Because spoken words are involved, a conversation between coworkers would not qualify as a written communication example.

Thus, the correct option is D.

For more details regarding written communication, visit:

https://brainly.com/question/10664960

#SPJ9

Your question seems incomplete, the probable complete question is:

Which of the following is NOT an example of written communication?

Tweets

Blogs

Emails

A conversation between co-workers

Which of the following are reasons someone can be legally fired? Check all of the boxes that apply. An employee is sleeping on the job. An employee is married. An employee has been late to work seven times in a row. An employee was born in a different country.

Answers

Answer:

employee has been sleeping on the job

An employee has been late to work 7 times in a row  

Explanation:

It just it the right answer for career prep edg2021.

Answer:

employee has been sleeping on the job

n employee has been late to work 7 times in a row  

Explanation:

hope this helps

HELP ME PLZ IM AM STUCK ON THIS I NEED AWNSERS

HELP ME PLZ IM AM STUCK ON THIS I NEED AWNSERS

Answers

Answer:

What are your cards?? I may be able to help you if you put your cards. :)

Explanation:

Give 5 advantages of using powerpoint?​

Answers

it can be presented pictorially and thus make it easier to adopt the material

How many modifier / mutator methods are there in class Check?
public class Check
{
private int one, two, total;
public void setNums(int n1, int n2)
{
one = n1;
two = n2;
}
public void add()
{
total = one + two;
}
public int getTotal()
{
return total;
}
}
ANSWERS:
0
4
3
1
2

Answers

There are two modifier/mutator methods in the class Check: setNums(int n1, int n2), and add (). One other accessor method is getTotal().

What does a mutator method's header look like?

Before the method name in its header is the keyword void. A void method that modifies the values of instance variables or static variables is called a mutator method.

What actions constitute "mutators"?

In computer science, a mutator method is a mechanism for controlling changes to a variable. They're also known as setter methods quite a bit. Frequently coming after a setter, a getter (also known as an accessor) returns the value of the private member variable.

To know more about methods visit:-

https://brainly.com/question/30026107

#SPJ1

Study the original and changed passages.

Original passage:

One way to make a document more readable is by controlling the space between paragraphs, which can be done by adding space between and after a paragraph.
Another way to make a document more readable is by keeping the paragraph on one page, which can be done by changing the spaces between the lines in the paragraph.

Answers

Answer:b

Explanation:

Answer:

It's B, The space between the lines of both paragraphs decreased.

Explanation:

On Edge 2021

ASAP Which page layout illustrates the principle of dynamic tension?


the one on the top


both of them


the one on the bottom


neither of them

Answers

The page layout that best illustrates this principle is the one on the top, as it contains elements of both opposition and balance. The correct answer A.

Dynamic tension is an art principle that is based on the idea of creating an image that is in balance but also contains elements of opposition.

The page on the bottom does not display dynamic tension, as all the elements on the page are in harmony with each other and do not create a sense of tension. Neither of the page layouts illustrate dynamic tension.

Learn more about dynamic stress:

https://brainly.com/question/12977661

#SPJ4

What is the current through R1?

What is the current through R1?

Answers

I = V/R. So the answer is 9/200 = 0.045A = 45mA which is B

Name two sensors which would be used in a burglar alarm system

Answers

kind of sensors used in a burglar alarm system:-Passive Infrared SensorsTomographic Motion Detector.Microwave Detectors.Ultrasonic Detectors.Photoelectric Beams.Glass Break Detectors.

1. Passive Infrared Sensor

This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.

2. Photoelectric Beams

This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.

It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.

Within a major students can choose to study a specific area within major. For example a journalism student may study military journalism or business journalism the specific area is called

Answers

Answer:

Specialization

Hope this helps!

Answer:

Specialization

Explanation:

William Shakespeare is credited for writing the five acts of Hamlet, Prince of Denmark. This play was published in 1630.

Answers

This assertion is untrue. Early in the 17th century, Shakespeare authored "Hamlet, Prince of Denmark," which was first printed in 1603 and 1623, not in 1630.

In 1603 who published Hamlet?

James Roberts added Hamlet to the Stationers' Register on July 26, 1602. In 1603 Valentine Simmes produced the first "bad" quarto for Nicholas Ling and John Trundell.

Who was King Hamlet's murderer?

Shakespeare's tragedy Hamlet1 recounts the following incidents: King Hamlet of Denmark dies unexpectedly and his brother Claudius a few weeks later marries the widow, his sister-in-law, Queen Gertrude; according to According to the official account, a snakebite caused his death.

To know more about Shakespeare visit:-

https://brainly.com/question/8912844

#SPJ1

You have completed an extensive investigation of the question Who invented the computer? You have gathered sufficient evidence, and the moment has come to report your findings!

Step 1: Write a one sentence summary of your conclusion to the question Who is the inventor of the computer?

Step 2: Choose one of the following methods as evidence to support your claim:

Paragraph: In a minimum of 5 complete sentences, provide specific evidence from a variety of sources.

Answers

Answer:

give me like 35 mins i will write my answer in the comments

Explanation:

Which of the following is the necessary equipment in order for skilled hackers working from within a
corrections facility to gain access to store account information? (Select all that apply.)
Internet connection
password detectors
computer
PIN detectors

Answers

The necessary equipment for skilled hackers working from within a corrections facility to gain access to store account information includes an Internet connection and a computer.

How is this so?

An Internet connection is essential for hackers to connect to the target system and retrieve/store account information.

A computer is needed to perform the hacking activities and execute the necessary tools and techniques. Password detectors and PIN detectors are not mentioned as necessary equipment in this context.

Learn more about hackers at:

https://brainly.com/question/23294592

#SPJ1

Which best describes the arts, A/V technology, and communication cluster?

careers that are focused on performing for and communicating with others
careers that combine technologies to make video recordings possible
careers that report information to the public
careers that allow people to express themselves through art
please hurry its timed thank you

Answers

Answer:

A. Careers that are focused on performing for and communicating with others.

Explanation:

The best description of the arts, A/V technology, and communication cluster is careers that are focused on performing for and communicating with others. The correct option is A.

What is a communication cluster?

Using Fiber Channel and SAS adapters, traditional networking interfaces like IP-based networks and storage interface communication are used for cluster communication.

The following four professional paths make up the information technology cluster: interactive media, network systems, programming, and software development. Information support and services are also included.

A pool of high-performance computing (HPC), GPU, or optimized instances connected by a high-bandwidth, ultra-low-latency network is referred to as a cluster network.

Therefore, the correct option is A. careers that are focused on performing for and communicating with others.

To learn more about communication clusters, refer to the link:

https://brainly.com/question/28716835

#SPJ6

3. Light and shadow are used to create. And.

Answers

Light and shadow are used to create visual depth and contrast in art and photography.

By manipulating the direction, intensity, and color of light sources, artists and photographers can create a range of effects, from dramatic chiaroscuro to soft and subtle shading. Light and shadow can also be used to convey mood, emotions, and narrative. For example, in film noir, low-key lighting with deep shadows is used to create a sense of danger and suspense. In landscape photography, the direction and quality of light can create a sense of time and place, with the golden hour light of sunrise and sunset conveying a sense of warmth and nostalgia. Overall, the use of light and shadow is an essential aspect of visual art and photography, allowing creators to shape the perception of the viewer and bring their ideas to life.

To learn more about Light click the link below:

brainly.com/question/9325569

#SPJ4

What is a user data?

Answers

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

4. How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use "coding" or creating programs outside of computer science and explain how it uses coding-related concepts.

Answers

Answer:

a production plant

Explanation:

"Coding" brings with it a linear way of thinking and problem solving, where one step needs to be taken before moving on to the next step. This can be applied to a wide range of real-life scenarios and industries. For example, a production plant starts with an initial input, that input is taken and used in a set of instructions (method), those instructions take that input and create a new output. Once the new output is created it is then passed on to another set of instructions that takes that output as an input to create a new output. Just like a computer program, a power plant repeats this process in order to a fully working and realized product.

What type of space is often the main focal point of the composition in graphic design?

What type of space is often the main focal point of the composition in graphic design?

Answers

Answer:

Positives

Spaces

Explanation:

It’s positive spaces I got it correct.

give brainliest if you tell me the can tell me the most random thing

Answers

Mood

Explanation:

Because it gets changed by the time you are happy or sad. Same that while you are reading if you like your. mood gets good but if you dont find this ans satisfied your mood gets changed.

A combination check is a data validation rule that tests to ensure that a data item fits the required data type.
a. True
b. False

Answers

Answer:

its a

Explanation:

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

A programmer is developing an action-adventure game that will require the player to defeat different types of enemies and a boss on each level. Which part of the game design document should include this information?

Answers

The part of the game design document that should include this information is demographic. The correct option is D.

What is programming?

Programming is the process of creating a program that contains a set of instructions that form a system to run on a computer. These programs are the working base of the computer.

Games are developed with proper programming and here an adventure game is to be made by programming language. These programming languages are java, C++, Python, etc. Demographic game design should be used here.

Therefore, the correct option is d, Demographic.

To learn more about programming, refer to the link:

https://brainly.com/question/14409192

#SPJ1

Answer:

Project highlights

2.4.2 just did it

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F

Answers

Answer:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Answer:

False

Explanation: I took the test and passed!!

PLS HELP ASAP Which is NOT a component of a packet?
trailer (footer)
protocol
body (payload)
header

Answers

Protocol. Hope this helps!

When comparison shopping, all of these hint at a good deal EXCEPT_____________________.

Answers

Answer:

lower-priced models offer more features

Explanation:

Which logical address is responsible for delivering the ip packet from the original source to the final destination, either on the same network or to a remote network?.

Answers

Source and destination IP logical address is responsible for delivering the IP packet from the original source to the final destination, either on the same network or to a remote network.

The IP packet field holding the IP address of the workstation from which it originated is known as the source IP address. The IP packet field holding the IP address of the workstation to which it is addressed is known as the destination IP address. An IP address is a logical address that is given by router or server software, and that logical address may occasionally change. For instance, when a laptop starts up in a different hotspot, it is likely to receive a new IP address. The IP addresses for the source and destination can match. That merely denotes a connection between two peers (or client and server) on the same host. Ports at the source and destination may also match.

Learn more about Destination here-

https://brainly.com/question/12873475

#SPJ4

a company uses dhcp to manage ip address deployment for employee workstations. the it department deploys multiple dhcp servers in the data center and uses dhcp relay agents to facilitate the dhcp requests from workstations. which two udp ports are used to forward dhcp traffic? (choose two.)

Answers

DHCP traffic is forwarded on UDP ports 67 (server) and 68. (client). Using these ports, DHCP relay agents transmit DHCP messages from the client to the server.

When does an organization's IT department deploy IP addresses for employee workstations using DHCP?

A business manages the IP address distribution for employee workstations using DHCP. In order to facilitate DHCP requests from workstations, the IT department sets numerous DHCP servers in the data centre and makes use of DHCP relay agents.

What is the name of the DHCP process that can give a client machine an IP address?

DHCP. DHCP is a mechanism that uses the network to automatically allocate TCP/IP addressing information to workstations (see IETF draught standard RFC 2131, 2132, and 2133).

To know more about DHCP visit:-

https://brainly.com/question/10097408

#SPJ1

Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive maintenance plans are developed: (2 Marks) Select one or more: Computer Software Specification Computer Hardware Specification Computer location or environment Computer Use Computer Speed

Answers

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

Other Questions
I need help coming up with ideas for this question. I need to find examples of figurative language used in the short story "Shrinks" by Pagan Kennedy that helped the author achieve her purpose. Any help would be very appreciated! 100 points!**I will attach the story as a PDF file to help. Total Resistance of Circuit (2) 80 20 40 60 Resistance of R2 (2) In the laboratory, two resistors, R1 and R2, are connected in series in a circuit. The total measured resistance of the circuit, Rr, is varied, and the results are plotted above. Which of the following is closest to the resistance of R1? 175k 100k 80k 0.93k 11,000k e) In a resting neuron, both the electrical and chemical gradients favor Na+ moving into the cell. f) In a resting neuron, both the electrical and chemical gradients favor K+ moving out of the cell In Saudi Arabia, women do not have access to basic rights without the permission of a _____ guardian. The formation of new organisms is called Highest Common Factor of 150 and 375 12. Use Russian Peasant Multiplication to perform the following problem. Explicitly show your addition. 49 x 65 Solve for x and y3x + 2y = 167x + y = 19 'If there is a ton of corn in a tank, and 500 pounds of corn are removed, what is theweight of the remaining corn in the tank? Think about the arrangement of the Period Table and the information it provides. Explain how various properties can be used to identify elements. your friend bartholomew loves parasitology and was thrilled to find he had both fluke and tapeworm infections a month ago. unfortunately, he was upset to find that his doctor prescribed a commonly used medication and was only able to obtain one of these parasites for his collection. what medication likely was prescribed? which parasite did he collect and why only that one? how long can a shark live out of water. item20 2.5 points time remaining 56 minutes 53 seconds00:56:53 ebookitem 20 time remaining 56 minutes 53 seconds00:56:53 which of the following statements is correct? multiple choice a company is required to withhold various employee taxes from amounts paid independent contractors. the accountant who performs the independent audit for a company is an employee of the company. all employees must be paid no more than the minimum wage rate set by the fair labor standards act. disability benefits for the worker and the worker's dependents are provided by the federal insurance contributions act. a literary genre that has the purpose of amusing but may be critical, using satire Find the area of the figure. Use 3.14 as pi Jonah has the choice of paying Rita $10,000 today or $40,000 in 10 years. Assume Jonah can earn a 12 percent after-tax rate of return. Which should he choose? Use Exhibit 3.1.10,000 today40,000 in ten years Which holiday is capitalized correctly? A Fourth of july B valentine's Day C Cinco de Mayo D arbor day . cos("*) =O A. V32O B.132C.1D.NI Which of the ratios below is equivalent to 2:1? Select all that apply.A) 6:4B) 8:4C) 10:5D) 6:12E) 6:3 The Cobb familys natural gas bill was 85.50 for 95 cubic feet of gas, What is the unit rate? (Cost per cubic foot of gas?)