Answer:
B or C I don't know
so I guessing
Answer:
I think the answer is A
Explanation:
Define the term editing
Answer:
editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.
Give two reasons why cloud computing could be harmful to an organization?
Answer:
Someone else is looking after your data.
Cyberattacks.
Insider threats.
Government intrusion.
Legal liability.
Lack of standardization.
Lack of support.
There's always a risk
Explanation:
Big brain explanation:
A major risk to business continuity in the cloud computing environment is the loss of internet connectivity. Always ask your cloud provider what controls are in place to ensure internet connectivity. If a vulnerability is identified, you may have to terminate all access to the cloud provider until it is rectified.
Other reasons:
~ No longer in control. When moving services to the cloud, you are handing over your data and information.
~ Doesn't mean you should do away with servers.
~ No Redundancy.
~ Bandwidth issues.
Also, may I have Brainliest? :)
Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
Planning
Filtering
Ordering
Sequencing
Answer: Sequencing
Explanation: I did test!
Sequencing step does she need to review.
What is Sequencing?Sequencing is the act of placing a process's phases in order from start to finish. It is a crucial ability that is employed in math, physics, and other subject areas in addition to reading comprehension.
Look at a few sequence structures that can be used to structure instructions in a passage.
Students simply arrange a series of stages in a process or method in the proper order as part of sequencing activities. They might include topics like how to assemble equipment, set up and name a word processing file, or install an electrical switch.
Therefore, Sequencing step does she need to review.
To learn more about Sequencing, refer to the link:
https://brainly.com/question/30586864
#SPJ3
Leroy wants to keep the bride and groom in a picture, but remove the rest of the family. Which photo-editing tool should Leroy use?
Answer:
He can use Ms paint, Adobe photoshop, Picasa etc.
The photo-editing tool should Leroy use are Ms paint, Adobe photoshop, or Picasa.
What is photo editing tool?
The tool used for editing pictures clicked by the phone or shooting cameras.
Leroy wants to keep the bride and groom in a picture, but remove the rest of the family.
Leroy should use the photo editing tool for the same. The tools popularly used for the purpose are Ms paint, Adobe photoshop, or Picasa.
Thus, the photo-editing tool should Leroy use are Ms paint, Adobe photoshop, or Picasa.
Learn more about photo editing tool.
https://brainly.com/question/14800338
#SPJ2
Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?
Explanation:
userInput = input("Enter Number")
try:
val = int(userInput)
except ValueError:
print("That's not an int!")
MULTIPLE CHOICE
im confused can someone answer + maybe explain
java
1) Note that the correct statement that correctly determines the sum of ALL the numbers in the list is:
int sum = 0; for(int index = 0; index<10; index++){sum +=numbersList[index];} (Option C)
2) The correct statement that shows the subtotal for chocolate bars is :
double subTotal = numChocs*priceList[3]; (Option A)
What is the rationale for the above response?Note that the value of subTotal is calculated by multiplying the number of chocolate bars (numChocs) by the price of chocolate bars (priceList[3]).
It is critical to use double rather than int because the priceList is of type double; if you use int, the decimal component will be truncated.
Learn more about statements in programming:
https://brainly.com/question/13735734
#SPJ1
solve the following problem. it may be helpful to draw a chart on scrap paper to organize the information and write the equation. be sure to show all steps (v.e.s.t.) and work in order to receive full credit. a clerk was asked to change a $10 bill. she returned 9 more dimes than nickels and twenty-one more quarters than dimes. how many coins of each did she return?
A clerk was asked to change a $10 bill. The clerk returned -20/3 nickels, 7 dimes, and 28 quarters.
What do you mean by bill?
A bill is a document that states a specific amount of money that a person owes for goods or services. It may also refer to a legislative document that proposes a law that must be agreed upon by both houses of a legislature before it can become law.
This problem can be solved using the V.E.S.T. approach:
Variables:
N = number of nickels
D = number of dimes
Q = number of quarters
Equation:
N + D + Q = 150
Given Conditions:
D = 9 + N
Q = 21 + D
Substituting the second condition into the first:
N + (9 + N) + (21 + 9 + N) = 150
Simplifying and solving for N:
3N + 30 = 150
3N = 120
N = 40
Substituting the value of N into the second condition:
D = 9 + 40
D = 49
Substituting the values of N and D into the third condition:
Q = 21 + 49
Q = 70
Therefore, the clerk returned 40 nickels, 49 dimes, and 70 quarters.
To learn more about bills refer to:
https://brainly.com/question/30289874
#SPJ4
Can't find the right year for this. (Attachment)
Identifying correction services tasks
what are some tasks commonly performed in correction services jobs? check all that apply.
interviewing law offenders
using weapons, handcuffs, and other tools to control prisoners
transporting people who are sick or injured to hospitals
maintaining order and security in a courtroom
searching prisoners and their belongings
o providing legal advice to inmates
o guarding and counting inmates
The correction services tasks are:
The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.What is the role of the corrections?Corrections is known to be the aspect of criminal justice system that helps to handle individuals who have been found to have done or committed a crime.
Note therefore, that the correction services tasks are:
The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.Learn more about correction services from
https://brainly.com/question/6705028
#SPJ1
Answer:
a.b.e.g
Explanation:
Computer _ rely on up to date definitions?
A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers
Answer: The correct answer is B. Malware Scan
Explanation:
The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.
"Pfizer could, he says, have made ‘way more billions. But we
would stay in history as we didn’t offer the world something. Now,
I feel way better than, beyond any doubt, we didn’t try to profi
We can see that critically evaluating how responsible it is to sacrifice profits for “the reputation of the company”:
The decision to sacrifice profits for the reputation of a company can be seen as a responsible move from an ethical perspective. However, its evaluation depends on various factors and the overall context in which the decision is made.
How responsible is sacrificing profits for “the reputation of the company”?Prioritizing reputation over short-term profits can demonstrate a company's commitment to ethical values and social responsibility. It signifies a willingness to prioritize the greater good over immediate financial gains.
This can enhance trust and loyalty among customers, employees, and stakeholders, which can have long-term benefits for the company's sustainability and success. It can also contribute to building a positive brand image and attracting socially conscious consumers.
On the other hand, sacrificing profits for reputation must be evaluated in terms of its impact on the stakeholders involved. Companies have a responsibility to their shareholders and employees to generate reasonable profits and ensure financial stability.
The given passage is taken from the article, "Billions at stake, endless waiting, an angry Trump: the Pfizer CEO’s great vax hunt"
Learn more about sentence on https://brainly.com/question/28770553
#SPJ4
The complete question is:
“Pfizer could, he says, have made ‘way more billions. But we would stay in history as, we didn’t offer to the world something. Now, I feel way better that, beyond any doubt, we didn’t try to profit … There is something bigger than making a fair profit here.’ The bigger thing? ‘To change forever the reputation of the company.’”
Critically evaluate how responsible is sacrificing profits for “the reputation of the company”?
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it from your email server. What email protocol can you use to do that?
in the case above, the email protocol can you use to do that is known to be POP3.
What are email protocol?There are some protocols that are often used to send or deliver email over the Internet and they are:
The Simple Mail Transfer Protocol (SMTP), The Post Office Protocol (POP), The Internet Message Access Protocol (IMAP).Hence, in the case above, the email protocol can you use to do that is known to be POP3.
See full question below
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it from your email server. What email protocol can you use to do that?
HTTP
POP3
IMAP
SMTP
Learn more about email from
https://brainly.com/question/24688558
#SPJ1
TCP is a(n) ____________________ protocol, which means the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender.
Because TCP is a "reliable" protocol, the sender waits to deliver data to the destination node until the latter confirms that it is indeed listening to it.
Transmission Control Protocol, or TCP for short, is one of the foundational IP (Internet Protocol) protocols. It offers data delivery that is dependable, well-organized, and error-checked between hosts that are executing IP-based applications. TCP ensures that data sent by the sender reaches the target node in the right sequence and error-free. This is made possible via a system of retransmissions and acknowledgments that guarantees the integrity of the data being transmitted. Data is not sent until the sender has confirmation from the recipient that they are prepared to receive it in the form of an acknowledgment. This guarantees that the data is received consistently and correctly, regardless of network failures or congestion.
learn more about data here:
https://brainly.com/question/13650923
#SPJ11
Which science topics would be suited for this organizational aid? Check all that apply.
looking at similarities and differences of certain types of vegetation
persuading someone of the importance of a certain scientific position
writing an analysis on how rocks are formed
listing the events in the life of a famous scientist
comparing two different types of landscapes
Answer:
A- looking at similarities and differences of certain types of vegetation
and
E- comparing two different types of landscapes
Explanation:
Got it right on edge
The science topics suited for this organizational aid are:
Looking at similarities and differences of certain types of vegetation.Comparing two different types of landscapes.What is vegetation?Vegetation is known to be a term that connote the life of a plant in a specific region.
Conclusively, Note that it is also seen as the ground area that has been provided by plants, and as thus, its description fits the science topics that is suited for this organizational aid
Learn more about landscapes from
https://brainly.com/question/7027022
Apex corporation is designing a database for all its employees first of the designer want to see the passport size photograph of each employee to their respective name can you suggest which data type should be used
Answer:
Image datatype
Explanation:
Since the image is passport sized, the general assumption is that the passport size won't be large.
So, it's advisable that the designer store the image directly on the database.
To do this, the designer should make use of image data type( or its equivalents in other database type).
What do the blocks in the looks category do?
Answer:
if u have a question can I see it
Explanation:
so I can know the answer choose
You should periodically perform basic computer maintenance on your computer.
True
False
Answer:
the answer will be true ......
Give at lesat 3 examples of how is NLG (Natural Language Generation) beneficial and unbeneficial (pls support your points)
NLG (Natural Language Generation) is beneficial isuch as automating content creation, personalizing user experiences, and generating insights from data but have limitations including potential biases in generated content and difficulties in capturing nuanced human language.
How is NLG beneficial and unbeneficial?NLG offers numerous benefits including the ability to automate the generation of content across different domains, such as news articles, product descriptions, and weather reports. This helps save time and resources by eliminating the need for manual content creation.
NLG systems may have limitations. One concern is the potential for biased content generation as the models are trained on existing data that may contain biases. This can lead to the generation of discriminatory or misleading content.
Read more about Natural Language
brainly.com/question/14222695
#SPJ1
NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience
NLG, or Natural Language Generation, is the method of generating natural language text using computer algorithms. It is a subfield of artificial intelligence that focuses on creating human-like texts, thereby making it easier for humans to interact with machines. Natural Language Generation is beneficial in many ways, but it also has its limitations. In this response, we will discuss the benefits and drawbacks of NLG in detail. Benefits of Natural Language Generation (NLG):
1. Efficient content creation: NLG algorithms can generate content faster than human writers, making it easier for businesses and publishers to create large amounts of content in less time. This is particularly beneficial for news and sports articles, where quick updates are required.
2. Consistent quality and tone: NLG can ensure that the content is written in a consistent tone and style, maintaining the brand's voice and values. In contrast, human writers can experience mood changes, which may influence the quality of their writing.
3. Personalization: NLG algorithms can create personalized messages and content, providing a better user experience for customers and clients. It can also be used for chatbots to provide human-like interactions with customers, improving customer satisfaction.
Unbeneficial of Natural Language Generation (NLG):1. Limited creativity: NLG algorithms can generate text based on the data it is fed. However, it lacks creativity and may fail to produce the same level of creativity as human writers. NLG cannot replace human writers' creativity, which is required in fields such as literature and poetry.
2. Dependence on data quality: NLG requires high-quality data to generate effective texts. Low-quality data may result in incorrect information and errors in the generated text.
3. Lack of empathy: NLG algorithms lack human empathy and understanding of social and emotional contexts. This may cause problems in situations that require a high level of emotional intelligence, such as counseling, medical diagnosis, and human resources. Therefore, NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience. However, it has its limitations and cannot replace human creativity, empathy, and emotional intelligence.
For more questions on articles
https://brainly.com/question/25276233
#SPJ8
When you accelerate to avoid a collision which step of the IPDE process are you using?
The step of the IPDE process that should be used When you accelerate to avoid a collision is an execute.
In the term of computer and technology, IPDE stands for Identify, Predict, Decide, and Execute. IPDE process or IPDE strategy also should be used in off-road driving. IPDE process including several activities, such as Identify any objects or conditions that may cause you trouble while driving and also Predict activity through what results might occur when you encounter the object or condition. IPDE has a function to help us to provides a means of arriving at the diagnosis of major categories.
Here you can learn more about IPDE https://brainly.com/question/2624496
#SPJ4
inserting merge fields in the letter
steps required
plz
Answer:
Click or tap where you want the merge field.
Choose the down-arrow under Insert Merge Field, and select a field.
Insert Merge Field menu of available fields
If you don’t see your field name in the list, choose Insert Merge Field.
Choose Database Fields to see the list of fields that are in your data source.
Choose Insert.
Answer:
Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.
WindowsmacOS
Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.
Data pulled into mail merge fields
The Address Block and Greeting Line fields are collections of merge fields.
Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.
Explanation:
Hope it's answer you plz mark as Brainlist
list four pointing devices and describe the four pointing devices
Answer:
Common pointing devices
Mouse.
Trackball.
Joystick.
Pointing stick.
Explanation:
Hope this helps
The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.
That question is for my photography class.
Answer:
72 dpi
Explanation:
72 DPI is standard for social media posts and others. It is not 300 DPI which is standard for print.
The standard dots per inch (DPI) used for blogs, social media, webpages, and emails can vary depending on the specific platform and device.
A common standard for these digital mediums is 72 DPI.
DPI refers to the resolution or sharpness of an image on a digital display. A higher DPI means more dots or pixels per inch, resulting in a clearer and more detailed image. On the other hand, a lower DPI means fewer dots per inch, resulting in a less sharp image.
For digital content displayed on screens, a DPI of 72 is often used because it strikes a balance between image quality and file size. This resolution is considered sufficient for viewing images online without causing excessive loading times or using excessive bandwidth.
It's important to note that when printing physical copies, a higher DPI is generally recommended to achieve better print quality. In print media, resolutions like 300 DPI are commonly used to ensure sharp and detailed prints.
Know more about dots per inch,
https://brainly.com/question/32108345
#SPJ3
The Event Viewer (Microsoft Windows) or Console (Apple Mac OS X) is used for what purpose?
to view and manage events scheduled in one or more user calendars
to configure system security features such as firewalls and antivirus scanners
to view incidents recorded in the Application, Security , and System logs
to manage user names and passwords on a network
Answer: Its C
Explanation:
The Event Viewer is a practical heritage feature in Windows 10 that collects event logs from programs and system components into a simple structure that you can then examine to diagnose and repair software or hardware issues with your computer. Thus, option C is correct.
What Event Viewer role in Microsoft and macOS?A monitoring application called Microsoft Windows Server Event Viewer displays a log of events and can be used to diagnose problems on Windows-based systems. Information concerning application-related, security-related, system-related, and setup events is shown in the Event Viewer.
Crescendo is a real-time event viewer for macOS that leverages the ESF to display process executions and forks, file events, share mounting events, kernel extension loads, and IPC event data.
Therefore, to view incidents recorded in the Application, Security , and System logs is used for purpose.
Learn more about Event Viewer here:
https://brainly.com/question/25675228
#SPJ2
****Please do not copy and paste. I want a unique answer
****Please use the keyboard to answer
Classify the following accounts into the tree sections of cash
flow statement.(4 marks)
No.
Accou
The statement of cash flows is an essential financial statement that shows how changes in balance sheet accounts affect a company's cash equivalents.
It breaks down the cash inflows and outflows into three sections: operating activities, investing activities, and financing activities.The operating activities section consists of cash inflows and outflows from a company's main business activities. Investing activities include the cash inflows and outflows related to long-term assets, such as property, plant, and equipment, and investments in the securities of other companies. Financing activities involve cash inflows and outflows related to the company's debt and equity financing.
Some examples of each section are:
Operating Activities: Cash received from customers, cash paid to suppliers, salaries paid to employees, and taxes paid to the government.
Investing Activities: Cash received from the sale of long-term assets, cash paid to purchase long-term assets, and cash paid to acquire the securities of other companies.
Financing Activities: Cash received from issuing bonds, cash received from issuing stock, cash paid to pay off debt, and cash paid as dividends.
To learn more about cashflow:
https://brainly.com/question/30086086
#SPJ11
folding domains show how structure relates to function because:
Folding domains show how structure relates to function because they are compact regions within proteins that fold independently and perform specific functions.
Proteins are complex molecules made up of chains of amino acids. The specific folding of these chains into a three-dimensional structure is critical for their function. Folding domains are compact regions within a protein that can fold independently and maintain their specific shape and function. By studying folding domains, scientists can gain insights into how the structure of a protein directly influences its function. Understanding the relationship between protein structure and function is essential for comprehending various biological processes, such as enzyme activity, receptor binding, and molecular interactions. By examining folding domains, researchers can investigate how changes in protein structure affect its function and ultimately contribute to the understanding of biological systems.
To know more about Folding domains click here,
https://brainly.com/question/29414614
#SPJ11
b)what information is kept in the process table? how many areas of the operating system are using the process table to store data?
System monitoring utilities and tools also use the process table to show users data about active processes.
What details are stored in an operating system's process table?Each item in the table, which is frequently referred to as a context block, provides details about a process, including its name, state (described below), priority (discussed below), registers, and any pending semaphores (discussed later). Depending on the operating system, a context block's precise contents will vary.
Which information is kept in the process tables?The Linux kernel has a data structure called the process table that contains details about every process that is currently active. Process IDs, memory use statistics, and file descriptor usage are all listed in the process table process IDs, memory use, file descriptor usage, and other information are all contained in the process table.
To know more about data visit:-
https://brainly.com/question/29555990
#SPJ4
The Federal Trade Commission FIP principle of Notice/Awareness states that
1) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
2) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
3) there is a mechanism in place to enforce FIP principles.
4) Web sites must disclose their information practices before collecting data.
Answer:
Option 4) is correct
Explanation:
The Federal Trade Commission is an agency that is headed by 5 Commissioners such that each of the commissioners has served a seven year term.
Missions of the Federal Trade Commission are as follows:
1. Implementation of civil U.S. antitrust law
2. Encouragement of consumer protection
The Federal Trade Commission FIP principle of Notice/Awareness states that websites must disclose their information practices before collecting data.
So,
Option 4) is correct
What is threat actors who violate computer security for personal gain?
Threat actors are Mass scammers and hackers, including cybercriminals also, who try to harm computer security for personal gain and financial success.
An individual or organization that engages in an activity with the intent to harm the cyber sphere, including computers, devices, systems, or networks, is referred to as a threat actor or malicious actor. These threat actors use different tools to retrieve the personal data of the victims so that they can get monetary compensation.
Learn more about threat actors here
https://brainly.com/question/14741575
#SPJ4
Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis
Since Ned is trying to decide how he wants to connect the nodes on the network he created, the two options that he has are option b and C:
b. Through hard cabling or wireless radio waves.
c. Through ethernet cables or Bluetooth.
What kind of cable does a computer system typically use to connect to a network?A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.
Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.
Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.
Learn more about ethernet from
https://brainly.com/question/28156384
#SPJ1
A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide your answer in newtons.
If the load weighs 350 N, the effort that is required to lift the weight is 70 N
To answer the question, we need to know what mechanical advantage is.
What is mechanical advantage?The mechanical advantage of the hydraulic lift M.A = L/E where
L = load and E = effort.Effort required to lift the weightMaking E subject of the formula, we have
E = L/M.A
Given that
M.A = 5 and L = 350 N,substituting the values of the variables into the equation, we have
E = L/M.A
E = 350 N/5
E = 70 N
So, the effort that is required to lift the weight is 70 N
Learn more about mechanical advantage here:
https://brainly.com/question/26440561
#SPJ1