Prompt:

Using your favorite browser, search for a definition of proprietary information and then search for how it is used in interior design. Find two sources that discuss that term. In your discussion board post, explain your position on proprietary information in interior design. Do you or do you not feel that it is important? Be sure to provide two good reasons for your position. Since there are no right or wrong answers here, make your reasons count! Also, be sure to provide the sources of your information.

Answers

Answer 1

Answer

safari

Explanation:

yes

Answer 2
Answer:

Proprietary information also known as a trade secret is information a company wishes to keep confidential. This can include recipes, processes and methods used in production. My position on proprietary information in interior design is I support it. This is because a lot of the time interior designers make custom made products or antique for which a duplicate does not exist anymore. Another reason why I support proprietary information is if the interior designer supplied the client with the clients and someone has a bad experience with the vendor, that can reflect poorly on the interior designers.

In conclusion, I support proprietary information because it discloses certain information that the client/customer does not need to know and protects the Vendors from any liability / mismatched expectations.

Related Questions

What is the output?
password = "sdf# 356"
>>> password. isalnum()

Answers

The output is False because the string password contains #.

Answer:

The answer is False.

Explanation:

The answer is false becasue it has other characters than letters and numbers.

Have a great day, I hope this helped.

With the consistency checking file system repair technique, the computer's file system is rebuilt from scratch using knowledge of an undamaged file system structure.
True or False

Answers

False. The consistency checking file system repair technique does not involve rebuilding the computer's file system from scratch using knowledge of an undamaged file system structure.

The consistency checking file system repair technique, commonly known as a file system check or fsck, is a process used to identify and fix inconsistencies or errors in a computer's file system. It does not rebuild the entire file system from scratch.

During a file system check, the operating system examines the file system's metadata, such as the directory structure, file allocation tables, and other critical information. It checks for inconsistencies, such as orphaned files, cross-linked files, or missing pointers. The goal is to repair these inconsistencies and ensure the file system's integrity.

The repair process typically involves updating the file system's data structures and repairing any identified issues. It may involve restoring or reconstructing damaged or corrupted data when possible. However, the repair is focused on fixing specific issues rather than rebuilding the entire file system from scratch.

Overall, the consistency checking file system repair technique aims to identify and resolve file system inconsistencies to restore proper functionality and ensure data integrity, but it does not involve recreating the entire file system based on an undamaged structure.

Learn more about consistency here:

https://brainly.com/question/28272691

#SPJ11

which fields in the contact form is used to control the order in which contacts are displayed in the current view?

Answers

Answer:

The answer is "File As"

Explanation:

The file is a data collection, that is processed either by filename in a single system. It could be a text, an image, a sound or a streaming server, a software collection, an and app, and other data collection. In this, the File As the field is used to order in connections that are displayed in the original understanding was controlled by using the contact-form sector.

when you create a user with the useradd command, what is the immediate state of it?

Answers

When a user is created in Linux using the useradd command, the immediate state of the created account is locked.

The useradd command can be invoked in other to create a new user account using the following command

sudo useradd fast_user

#fast_user is the name of the account created

At this point, the account has been created but it will be locked until the required login details are set. This can be achieved using the line ;

sudo passwd fast_user

Therefore, an account created using the useradd command is in a locked state.

Learn more :https://brainly.com/question/12135504?referrer=searchResults

When you save a new file, you use the ______ dialog box to provide a filename and select a location of the file.

Answers

Answer:

Save As

Explanation:

hope this helps!!

Write a program that hardcodes N and then computes the average (the arithmetic mean) of N integers selected from [0,1000]. This program should run 10 times, and thus provide 10 results.

You should use an outer loop that runs the inner loop (the one which computer the mean) a total of 10 times, printing out the 10 results, one per line.

Answers

Answer:

Explanation:

Program ( PascalABC) and Result:

const N = 25;

 var Summ : integer;

     Num : integer;

     Sa : real;

 begin

   Num := 0;

   for var j := 1 to 10 do

   begin

      Summ := 0;

       for var i:= 1 to N do

           Summ := Summ + Random (1001);    

       Sa := Summ / N;

       Write (' Sa =  ', Sa);

       WriteLn;

    end;

 end.

With p = 1 000 000 the result is naturally close to the middle of the interval (0 - 1000), that is, the number 500

 

Write a program that hardcodes N and then computes the average (the arithmetic mean) of N integers selected
Write a program that hardcodes N and then computes the average (the arithmetic mean) of N integers selected

PLEASE HELP DUE IN 2 MINUTES Which TWO are examples of the internet reducing the use of paper?

making wall posters of your favorite sports stars
bank statements sent to your email address
movie tickets made available on cellphones
printing out an e-book to read when you are traveling

Answers

Answer:

printing an e book and making wall posters

________ tells users how to use software and what to do if software problems occur.

Answers

Answer:

Documentation tells users how to use software and what to do if software problems occur.

Explanation:

Documents and Standard Operating Procedures (SOPs) help users use the software that they want to use. This is an advantage to whoever is selling the software so that they don't receive customer complaints and people continue to buy their product.

What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E? a) 1 b) 2 c) 3 d) 4

Answers

Answer:

The answer is "Option c".

Explanation:

In the given question the device A is connected by 3 wires, contributing all of them, which also includes several connector paths. When all the wires of A are broken down, and if all of this leaves no routes that can be used. Even so, if it is done to E, it's also linked to four different routes. Its solution would've been C because its value will be the MINIMUM.

Answer:

c

Explanation:

When does a router automatically enter setup mode? when a router component fails POST 0 when it can not locate an IOS image 0 when a configuration file can not be located when directed to enter setup by a configuration file

Answers

Hi! A router automatically enters setup mode when a configuration file cannot be located.

This typically occurs when the router is powered on for the first time or after a factory reset. In these cases, the router needs to be configured, so it enters setup mode to allow the user to provide the necessary configuration details.

To know more about routers, please visit:

https://brainly.com/question/13600794

#SPJ11

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

you have added a new printer to the office. the printer is used by members of the accounting department for printing forms and reports. the printer was not auto-detected, so you need to add the printer manually. the print server role service has been installed on corpfiles16 already.

Answers

To add the new printer to the office manually, follow these steps:Connect the printer to the network and turn it on.

On a computer, open the Control Panel and navigate to Devices and Printers.Click on Add a printer.Select Add a network, wireless or Bluetooth printer.Wait for the computer to search for available printers on the network.If the printer is found, select it from the list and click Next. If the printer is not found, select The printer that I want isn't listed.Select Add a printer using a TCP/IP address or hostname and click Next.Enter the IP address of the printer and click Next.Wait for the computer to install the necessary drivers for the printer.Assign a name to the printer and select whether to set it as the default printer.Click Finish.Once the printer has been added to the computer, members of the accounting department should be able to print to it as they would any other printer. If there are any issues with printing, ensure that the correct drivers have been installed and that the printer is properly configured on the print server.

To know more about printer click the link below:

brainly.com/question/31358220

#SPJ11

I
What is a Watermark?

Answers

it is a way to show your brand or logo on a video is photo
A watermark is a little way of showing your logo of something

Which properties of the word "readability” changed? Check all that apply.

Answers

Answer:

case

color

size

style

Explanation:

Why is it so important to have an education plan for the
employees in cyber security?

Answers

Having an education plan for employees in cybersecurity is important because cybersecurity is becoming more and more critical in the current age. Cybersecurity breaches are becoming increasingly widespread and sophisticated, and the threats they pose are significant.

Companies can protect their networks and data only if they have an educated workforce. Companies can use employee cybersecurity education programs to help prevent cyber-attacks. The importance of having an education plan for employees in cybersecurity is as follows:

Employee awareness of risks: Employee training programs teach employees how to recognize and avoid cybersecurity threats, reducing the chance of accidental data breaches. This helps to protect sensitive data, financial resources, and personal information from being compromised.Knowledgeable Staff: Employee training programs allow companies to improve their overall cybersecurity posture by providing employees with the knowledge and skills necessary to identify and mitigate security risks. Employees who receive cybersecurity training are more likely to be aware of security threats and best practices, allowing them to act as a line of defense against cybercriminals.Reduction in Security Breaches: Organizations that invest in employee cybersecurity training can reduce the likelihood of security breaches and data theft. Cybersecurity breaches can lead to significant financial losses, legal ramifications, and reputational damage. In some cases, it can even lead to business failure.Legal Compliance: Organizations that handle sensitive data are required to comply with a wide range of cybersecurity laws and regulations. Organizations that have an employee cybersecurity training program in place will be better equipped to comply with these regulations.

You can learn more about cybersecurity at: brainly.com/question/30409110

#SPJ11

Businesses today suceed or fail based on their ability to

Answers

Answer:

their ability to Innovate with technology to meet their customers needs

Explanation:

Gina is using Outlook in the default cached mode and is connected to an Exchange server. What is the default file type used to store a cached version of Gina’s mailbox?

PST
OST
MSG
XML

Answers

Answer:

Its C. MSG

Explanation:

On edg

Answer:

c

Explanation:

took the test

a business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and services.'

Answers

A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and services is known as a thin client or a client-server system. In this setup, the client computer relies on the server to provide the necessary resources and services for its operation. This allows the client to be less powerful and less expensive since most of the processing is done on the server. The client-server system is commonly used in businesses to centralize data and resources, making it easier to manage and maintain.

A thin client or client-server system is a business computer that heavily depends on another system, usually a server, to operate most of its programmes, activities, and services.

In this configuration, a central server gives access to a variety of resources, including databases, programmes, and storage, through a client machine that is built to communicate with it.

The majority of the operations that the client computer performs are dependent on the server, and without it, it might not be able to work effectively.

As the server does the majority of the computation, the client computer can be less expensive and powerful.

The client-server system is frequently used in enterprises where numerous users must have access to shared resources because it makes software and data management and controls simpler.

Businesses can cut costs, increase productivity, and make it simpler to administer and maintain software and data by centralizing data and resources on a server.

In general, firms aiming to simplify their IT infrastructure and enhance overall operations frequently turn to client-server architecture.

Learn more about the client-server system :

https://brainly.com/question/29856817

#SPJ11

Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController

Answers

od. adding a segue fro. the last viewcontroller

Who has helped the most people on brainly? who has the most answers? anybody know?

Answers

Answer:

Woah this was in 2020.  Time flies.

1/19/2021

samsam has 800m people helped

The page that appears when you first open your Internet browser is the _____.


opening page
opening page

launch page
launch page

home page
home page

first page
first page

Answers

Answer:

i think it's opening page

Answer:

i think its also opening page

Explanation:

Which of these languages is used primarily to create web pages and web applications?
HTML
C++
Javascript
Python

Answers

Answer:

javascript

Explanation:

What could the Analytical Engine be used for?

Answers

Answer:

The Analytical Engine was to be a general-purpose, fully program-controlled, automatic mechanical digital computer. It would be able to perform any calculation set before it. There is no evidence that anyone before Babbage had ever conceived of such a device, let alone attempted to build one.

They cannot be used for general arithmetical calculation. The Analytical Engine is much more than a calculator and marks the progression from the mechanized arithmetic of calculation to fully-fledged general-purpose computation.

What guidance is available for marking sensitive compartmented information cyber awareness.

Answers

The guidance for marking sensitive compartmented information (SCI) are:

Mark the sensitive compartmented information (SCI) documents appropriately.The listing of information in an alphabetical order.The use of an approved sensitive compartmented information (SCI) fax machine.

What is a sensitive compartmented information?

A sensitive compartmented information (SCI) can be defined as a United States program that was established to segregate and categorize classified (highly sensitive) information concerning or derived from methods, analytical processes and intelligence sources, into distinctive compartments for added protection when disseminated or distributed across board.

In accordance with cyber awareness, the dissemination of all sensitive compartmented information (SCI) documents must be handled within formal access control systems only and under the directives of the Director of National Intelligence.

Based on national intelligence, the guidance for marking sensitive compartmented information (SCI) include:

Mark the sensitive compartmented information (SCI) documents appropriately.The listing of information in an alphabetical order.The use of an approved sensitive compartmented information (SCI) fax machine.

Read more on SCI here: https://brainly.com/question/25194168

Answer:

security classification guide

Explanation:

Read the following code:
X = totalcost
print(x / 2)
What value will this code calculate? (5 points)
A. Double the total cost
B. Half the total cost
C. Quarter of the total cost
D. Two percent of the total cost

Answers

B. Half the total cost

A string is stored at memory starting from the location $1000. Assume that the array ends with $0. Write HCS12 assembly language code to convert the lower case letters with upper case letters. Subtracting $20 from the ASCII code of the lower case letters can convert them to upper case letters - see the ASCII code in slides. You should check if an array element is a lower case letters or not. If it is not lower case, do nothing. If it is lower case, subtract $20.

Answers

Iterate through the string in memory, check if an element is a lower case letter, and subtract $20 from its ASCII code to convert it to upper case.

How can you write an HCS12 assembly code to convert lower case letters to upper case?

In order to convert lower case letters to upper case using HCS12 assembly language, you need to iterate through the string stored in memory, starting from location $1000. Each element of the array needs to be checked to determine if it represents a lower case letter. This can be done by comparing the ASCII code of the element with the ASCII values that correspond to lower case letters. If an element is identified as a lower case letter, you can subtract $20 from its ASCII code to convert it to upper case. If an element is not a lower case letter, no action is required.

By following these steps, you can successfully convert lower case letters to upper case in the given string using HCS12 assembly language.

Learn more about assembly language

brainly.com/question/31227537

#SPJ11

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

Beginners’ computer science!
Language- Java

Details of assignment-

3) As a coder at a pharmaceutical company,
you've been tasked with writing a program that will determine how long a particular drug may stay on shelves to be sold in
stores. Assume this drug loses 12% of its effectiveness every month (save into a
variable, but you don't have to get this value from the keyboard), and must be
discarded when effectiveness dips below 50%. Write a program that prints how many months the drug can remain on
shelves.

Please leave a comment if you would like a sample run!

Answers

Answer:

public class Drug {

   public static void main(String[] args) {

       int effectiveness = 100;

       int months = 0;

       while (effectiveness > 50) {

           effectiveness *= 0.88;

           months += 1;

       }

       System.out.println("The drug can remain on shelves for " + months + " months");

   }

}

please let me know if this is correct! :D

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height
Other Questions
Which helps enable an oligopoly to form within a market? are two types of ironies when creon pronounces his edict? that is, what do we know that creon doesnt know? QUESTION 23 Meacham Enterprises bonds currently sell for $1,100 and have a par value of $1,000. They pay a $100 annual coupon and have a 15-year maturity, but they can be called in 5 years at $1,075. Need the value of X. Thank you! What economic growth theory examines the factors that determine why? technology, research, and innovation are undertaken and how they? interact?A. New investment theoryB. New growth theoryC. Production possibilities theoryD. Expected growth theory Clara was thrown from an automobile during a crash and had heades.Now she can remember things from before the crash but can't seem to makeany new memories What might have been damaged in the crasheA. Her corpus callosumB. Her hippocampusO C. Her arrygdalaD. Her limbic system N/2-11 Galilea is putting a border around her Science Fair display board. How many inches of border does she need? What are some of the possible criteria for judging policy making? HEY PLEASE SOLVE THIS MATH PROBLEM FOR ME :)! Gary has $4.40 in nickels and dimes he has 10 more nickels than dimes how many of each kind of coin does he have Whether supplier bargaining power represents a strong or weak source of competitive pressure is affected by? Toyota was the first auto manufacturer to introduce a self-parking feature that it called Intelligent Parking Assist. Originally it was available as an option o the Toyota Prius in the Japanese market. Toyota was trying to change consumer attitudes about the vehicle by Select one: a. reducing the perceived risk of the product. b. changing the perceived importance of a specific attribute. c. providing stimulus generalization to prospective buyers. d. adding a new attribute. e. changing beliefs about the extent to which a brand has a specific attribute. He just gived the book at the librarian.There's 2 errors which one is it and rewrite Ryan wrote a total of 8 pages over 2 hours. How many hours will Ryan have to spend writingthis week in order to have written a total of 48 pages? Assume the relationship is directlyproportional Noor, Layla, and Diego play a trivia game. Noors score is -2. Laylas score is 3/4 of Noors score. Diegos score is 2/3 of Laylas score. What is Diegos score? Find the derivative of the trigonometric function. See Examples 1, 2, 3, 4, and 5. y = (2x + 6)csc(x) y' = A junk box in your room contains fourteen old batteries, six of which are totally dead. You start picking batteries one at a time and testing them. Find the probability of each outcome. a) The first two you choose are both good. b) At least one of the first three works. c)The first four you pick all work. d) You have to pick five batteries to find one that works. a) The probability that the first two you choose are both good is (Round to three decimal places as needed.) Each shape below is divided into equal parts. Select the shapes that haveshaded.Check all that are true.Help??? :((( What answer is correct? The audio is just reading the question.