If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False

PLEASEE HELP

Answers

Answer 1

Answer:

false , those are called passive railways


Related Questions

to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose ​

Answers

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

Which practices promote efficient keyboarding? Check all that apply.

curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut

Answers

Answer:

Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key

Explanation:

It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down

At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys

Answer: both thumbs should be on the spacebar

Explanation:

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer:

public class Simple{}

Explanation:

John wants to assign a value to the favorite sport variable:

favoriteSport = indoor soccer

However, he gets an error message. What does he need to change in order to make the code work?


Add a space between the words in the variable name

Create a longer variable name

Put quotation marks around the string literal

Omit the symbol in the string

Answers

Put quotation marks around the string literal

Jon wants to assign a value to the favorite sport variable: favoriteSport! = "indoor soccer" but gets an error message by Removing the exclamation mark from the variable name it will fix for the code to work.

In laptop programming, code refers back to the set of instructions, or a machine of rules, written in a selected programming language (i.e., the supply code).

If you've got ever observed an exclamation mark (!) earlier than the variable in a person's JavaScript code the negation operator (!) definitely simply reverses the means of its operand. ! is the logical now no longer operator in javascript.

Learn more about the javascript here:

brainly.com/question/27683041

#SPJ3

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

define computer network

Answers

Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

In data representation, what represents one character which may be a
letter, number, or punctuation mark.

Answers

Answer:

Binary ?

Explanation:

Im not 100% sure but it could be binary or 0

can I play the game the last of us with this spec:​

Answers

No . Take my advice
no the cpu is not powerful enough to support a game

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

Answers

Answer:

base station is the answer

computer can do work very___​

Answers

Answer:

Explanation:

quickly      

Answer:

fast......................

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

Answers

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

state the use of an x-ray machine​

Answers

Answer:

The use of an x-ray machine is used to take pictures of dense tissues such as teeth or bones. This is because bones absorb the radiation more than the less dense soft tissue. X-rays from a source pass through the body and onto a photographic cassette.

I hope this helps you!

Explanation:

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

Answers

Answer:

corporate network

Explanation:

A level 3 security system focuses on protecting the corporate network against intrusion, denial-of-service attacks, and unauthorized access.

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

Write a letter of application to your school as a chemistry teacher​

Answers

Answer:

Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.

fill in the blank figuring out what type of garden you want to grow is the ____step according to the instructions in how to grow a school garden

Answers

Answer:

First.

Explanation:

How to grow a school garden is an illustrative guide that explains to students the step by step process for growing a school garden.

According to the instructions in how to grow a school garden, the first and most important step is figuring out what type of garden you want to grow. At this step, a student should have a good understanding of the type of garden he or she wants to grow.

Thus, this step answers the question of "what am I growing in the garden?"

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

Answers

The good answer is: Sacrificial

a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.

Answers

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

Other Questions
~~~NEED HELP ASAP~~~Please solve each section and show all work for each section. 1) Convert the following:I) 65 kg into gii) 87570 seconds into houriii) 7.5 km into m A rectangular box has a square base with an edge length of x cm and a height of h cm. The volume of the box is given by V = x2h cm3. Find the rate at which the volume of the box is changing when the edge length of the base is 10 cm, the edge length of the base is increasing at a rate of 3 cm/min, the height of the box is 5 cm, and the height is decreasing at a rate of 1 cm/min. A.The volume of the box is decreasing at a rate of 200 cm3/min.B.The volume of the box is increasing at a rate of 400 cm3/min.C.The volume of the box is decreasing at a rate of 400 cm3/min.D.The volume of the box is increasing at a rate of 200 cm3/min. Mr. Tanaka is making Miso soup for his family. The recipe calls for 350 ml of Dashi. Mr. Tanaka plans to make a smaller batch using 280 ml of dashi. He wants to know what percent of the stock he will use compared to the original recipe. PLSS HELPPPPPPP Quick An electron moving in the y direction, at right angles to a magnetic field, experiences a magnetic force in the -x direction. The direction of the magnetic field is in the CAN SB HELP ME !! Use the image and your knowledge of the isosceles triangle to find the value of x Still struggling with this. On the basis of your knowledge of the reaction of halogens with alkanes, decide which product you would not expect to be formed in even small quantities in the bromination of ethane? A) BrCH2CH2Br B) CH3CH2CH2Br C) CH3CHBr2 D) CH3CH2CH2CH3 E) BrCH2CH2CH2CH2Br A7. Charlie sells wristbands to earn extra money. She charges $7 per wristband for material and $2.00 per hour to makeunique gifts. How much would two wristbands cost together if one takes her an hour and a half to make one and twohours to make the other one?1. Chavez Corporation reported the following data for the month of July: Inventories: Beginning Ending Raw materials $ 36,000 $ 34,500 Work in process $ 20,500 $ 26,000 Finished goods $ 36,500 $ 51,500 Additional information: Raw materials purchases $ 70,500 Direct labor cost $ 95,500 Manufacturing overhead cost incurred $ 63,500 Indirect materials included in manufacturing overhead cost incurred $ 9,800 Manufacturing overhead cost applied to Work in Process $ 62,500 Any underapplied or overapplied manufacturing overhead is closed out to cost of goods sold. The cost of goods manufactured for July is: MiastSelect the correct answer.Which of the equations below represents a line parallel to the x-axis?.= 5B.y = 1 C.y = 1D.y = 5 For all positive integers n, let *n* equal the greatest prime number that is a divisor of n. What does *10*/*12* equal? The body tries to return to a state of homeostasis (attempts to return to previous levels of functioning). As such, the body will keep fighting the perceived danger. Towards the end of the stage, levels of exhaustion, weariness, and anxiousness may occur as the body is becoming physically exhausted. Which stage of the General Adaptation Syndrome (GAS) is this Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.) Marlin, a physicist in a large corporation, has been asked by his professional association to present a scientific paper at the national convention. This type of recognition will help Marlin fulfill his Solve this equation log3X + log3(x-6) = log3 7 How do I find the m and b from number 1 and what would the area be for 2 Give me a summary of John Locke's philosophy and beliefs. Write two balanced half-equations for this redox equation: 2Cu + O2 = 2CuO What type of manpower is called agriculture expert?