Answer:
An employer always looks over a candidate's resume (pronounced "reh-zoo-may" before deciding to hire them.
Explanation:
HOW CAN YOU GET THE COOLEST FONTS ON GOGGLE SLIDES???
Hint: Im looking for like bubble letters or like stuff to like install for goggle slides, now mind u i do have a/am using a Chromebook so ya
Answer:
mhmm. you can go to www.bubbleimages.com
Explanation:
write 3 things that can't be done without technology.
Answer:
Hacking Online Orders Math
Explanation:
Which of these statements regarding real-time strategy games is true?
A.
They only allow one player to move at a time.
B.
They do not work well on tablets.
C.
They feature memorable characters.
D.
They do not work well on mobiles.
E.
They offer plenty of time for players to reflect.
Answer:
E
Explanation:
Answer:
e
Explanation:
define file in context of computer programming
the best answer it requests services, data and other resources available on the server
Answer:
Explanation:
?
Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to upload this picture wothout the mirrored effect.
To correct the mirroring text, Philip can (flip, crop, distort) the picture (vertically, horizontal, diagonally).
Answer: flip the picture vertically
Explanation: horizontally would make it upsidedown. And diagonally isn’t right either.
What is the velocity of a 0.100kg car with a momentum of 5 kgm/s?
Answer:
v = 50 m/s
Explanation:
p = mv
5 = 0.1v
v = 50
What is the HTML code symbol to the !nstagram Facts Part 2?
FIRST ONE GETS BRAINEST!!
¶^↑↓→← html code symbol
Where was basketball invented?
Answer:
Springfield, Massachusetts
Basketball was invented by James Naismith on or about December 1, 1891, at the International Young Men's Christian Association (YMCA) Training School, Springfield, Massachusetts, where Naismith was an instructor in physical education. who invented James Naismith
Explanation:
Springfield College
Basketball is built into the fabric of Springfield College. The game was invented by Springfield College instructor and graduate student James Naismith in 1891, and has grown into the worldwide athletic phenomenon we know it to be today.
have a good day
When a 30-year-old physical education teacher from the International YMCA Training School in Springfield, Massachusetts created a game that could be played indoors in between the football and baseball seasons, basket ball was born in the winter of 1891.
What is physical education?Physical education is a subject that is taught in schools all over the world. It is frequently abbreviated as Phys Ed or P.E. In order to enhance health and physical fitness, it is typically taught in primary and secondary education.
It emphasizes psychomotor learning by employing a play and movement exploration context. Football, netball, hockey, rounders, cricket, four square, racing, and several other kid-friendly games are among the exercises included in physical education.
Additionally, nutrition, healthy practices, and individual needs are taught in physical education. The world over, there are several physical education curricula.
When taught properly, physical education classes can have a favorable impact on students' behavior, health, and academic achievement. The dissemination of knowledge about illness prevention, control, and treatment is a component of health education.
Physical educators must encourage and reinforce students' growing motor abilities and give kids and teenagers a foundational skill set that expands their movement repertory.
Learn more about physical education, here
https://brainly.com/question/28271935
#SPJ6
1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this statement? Provide evidence to support your position, (2 points)
Answer:
true
Explanation:
everything is computerized. banks, shopping, financial business records, ect
Give 3 features and uses of
Desktop
laptop
palmtop computer
Answer:
A Palmtop or hand-held personal computer is small enough to hold in one hand and operate with the other. Also called a handtop, these ultra-small computers may have specialized keyboards or keypads for data entry applications or have small qwerty keyboards.
• Palmtops are also called PDAs, hand-held computers and pocket computers.
• Palmtop or hand-held personal computer, lightweight, small, battery-powered, general-purpose programmable computer. It typically has a miniaturized full-function, typewriter like keyboard for input and a small, full color, liquid-crystal display for output. In addition to an operating system that is compatible with that of a desktop computer, a palmtop will typically contain a word processor, a spreadsheet program, and a calendar and phone book. A variety of other programs can be loaded and executed, and data can usually be transferred to and from a desktop computer. Although some palmtops are like personal digital assistants in that they accept handwritten or touch screen input, they generally differ in that the palmtop has more memory, a keyboard, and a greater variety of available programs.
Explanation:
8. (a) Identify two advantages and four limitations of the Speech recognition devices.
Explanation:
Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it
Which step comes last?
Gather data from the user.
Process the data.
Check for accuracy.
Output the result.
Answer: Process the data
Explanation: i took the test
Answer:
The answer is Check for accuracy
Explanation:
How can I hide my cracked phone screen? or How can I fix it myself without my parent finding out? or How can I fix my phone without going to a repair shop?
Which is not the protocol?
(i)TCPAP
(ii) IPX/SPX
(lii) NETBIOS/NETBUI
(iv) Client
Answer:
2. IPX/SPX
is not the protocol.
If an application holds more data than what it was designed to hold, which incident can occur?
Answer: I think the best answer is B.
Explanation:
I am not complely sure, sorry.
Hope it helps though!!
Would be easier to divide/fold a rectangular sheet of paper into 22 equal pieces or 24 equal pieces? Explain your answer. Please help !!!!!
Answer:
24 equal.
Explanation:
A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos being played more times than can be represented with 32 bits, the website is planning to change to 64-bit integers for the counter. which of the following best describes the result of using 64-bit integers instead of 32-bit integers? a. 2 times as many values can be represented. 32 times as many values can be represented. 2^32 times as many values can be represented. 32^2 times as many values can be represented. I know the answer is 2^32 but can someone explain it to me?
Answer:
2³² times as many values that can be represented
Explanation:
A 64 bit register can hold 2⁶⁴ different values, while a 32 bit register can hold 2³² different addresses
Therefore, a 64 bit can represent 2⁶⁴ ÷ 2³² = 2³² times as many values as can be represented by 32-bit
Therefore, the 64 bit can represent 2³² times as many values that can be represented by a 32 bit integer
Hey Yo, i need some help, Whats 2+2?
Answer:
4
Explanation:
___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
Answer:
Viruses
Explanation:
virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. What happens if any transaction data is changed or modified in the earlier existing blocks?
Answer: hello your question lacks the required option, below are the missing options
A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.
B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.
C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.
D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.
answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )
Explanation:
What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.
Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.
Write an advert to recruit teachers for a given Senior High School. The advert should cover tittle, job description, employees specifications, mode of application condition of service, closing date
Answer:
Hey! Have you ever wanted to work with kids? Do you know a lot about mathematics? Well I've got the job for you! You can be a Senior High School teacher! The job is simple, all you have to do is teach your students about mathematics every day. Let us know by July 31st if you would like to be a teacher for this upcoming fall semester.
Explanation:
Fill in the blank with the correct response. Wanting to become a better archer is a what?
you must regularly do this on your computer to prevent a virus from infecting it
Answer; Install Anti-Virus/Malware Software. ...
Keep Your Anti-Virus Software Up to Date. ...
Run Regularly Scheduled Scans with Your Anti-Virus Software. ...
Keep Your Operating System Current. ...
Secure Your Network. ...
Think Before You Click.
Explanation:
i took the test
Answer:
Clean out unneeded folders, scan your pc with an anti virus, use a vpn, and download from trusted websites
Explanation:
while
norma
mean
cinta
to the user
a.) Define the term microcomputers.
Explanation:
Microcomputers are computers designed around a microprocessor, smaller than a minicomputers or a mainframes.
Hope it will help :)❤
The rules on the Internet for how messages are addressed and passed on are called ____ .
What does a WLAN use to transmit data to clients
Here's link to the answer:
tinyurl.com/wpazsebu
What is the pencil tool in photoshop
Answer:
I think its to draw on the photo.
Explanation:
Answer:
draw
Explanation:
it opens the drawing menu
write 3 things that can't be done without technology. write your opinion?
Answer: Call a theater to get movie times, Use a phone book to find a company to do work around your house, and Park your used car on the street with a sign that says it’s for sale.
Explanation: my opinion is that it's fine to do each of those things without technology. Because technology is supposed to help the limited capacity of the human brain and improve things that make every day life quicker, easier, leaves more time to do something else.
Answer:
1) Filming, depending on the camera it is still technology that everyone uses on a daily bases with no hesitation for use.
2) Vehicles, I'm not sure if they are a type of technology but for this case lets just say they are. With vehicles we can get to places much faster then walking or taking a carriage.
3)Records, in this case music. Without records or anything of the sort we wouldn't exactly be able to listen to our favorite music at all times.
Activity in September 2014, the Federal Bureau of Investigation (FBI) announced that is next generation Idenufication system was fully functional The FBI named it the integrated Automated Fingerprint Identification system (IAFIS), Conduct online research on this system and answer the following questions 1. Which elements can be stored in IAFIS? 2. What is the response time of this system? 1. How has this system benefited the FBI
Answer:
(Answers may vary.)
In addition to fingerprints, IAFIS stores criminal histories, mug shots, and physical information like scars, tattoos, eye color, hair color, weight, and height. It also stores fingerprints of individuals who are or were employed by the US military and the federal government.
The system’s average response time for criminal fingerprint processing is about 27 minutes. Civil fingerprint processing takes over an hour.
Previously, the tenprint submission and identification was a manual, tedious process. It took the FBI weeks or months to process a single fingerprint submission. IAFIS has automated this process and added advanced identification capabilities. The submission and processing takes just few minutes. This has helped the FBI solve and prevent crime and tighten holds on criminals and terrorists.
Explanation: