Answer:
The answer is "Human dignity "
Explanation:
It is the basic human nature, in which it is the recognition of the importance of humans, and it is inherent, and also that they deserve respect for just being humans, and the wrong choice can be defined as follows:
Property rights are the wrong choice because it is used to determine the use and possession of a resource or economic good. Confidentiality is also a wrong choice because it is a detail that provides verbally or in writing. The term civility also was wrong because it relates to politeness.Saving a file as a new filename can be accomplished through the Save As dialog box.
True False
Answer:
True.
Explanation:
A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.
There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.
Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.
Thus the statement is true.
You need to install several USB devices on a server. You have been asked to attach USB hubs to the computer. Only one USB port is available. How many hubs can you daisy chain using the single port?
Answer:
5 Hubs
Explanation:
Only up to 5 hubs you can have connected without problems.
Quickly viewing a segment of your database right from the contacts, companies, deals, or tickets dashboard is an example of which type of segment?A. Active list.B. Saved filter.C. Static list.D. Saved list.
Answer:
D) Saved list
Explanation:
Segments are saved searches or dynamic lists that enables you to access information from multiple databases as well as search for specific field values or behavioural information.
Saved lists are used with standard objects like tickets, contacts, deals, companies etc. It allows you to quickly view or access a segment of your database right from the contacts, deals, tickets dashboard or generally objects dashboard, based on their property values.
what does a cargo and freight agent do
Hey there!
Well cargo and freight agents expedite and route movement of incoming and exporting cargo and of course freight.
Hope this helps :)
A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A
Answer:
a-b=(a,b,c,d)
b-a=(p,q,r,s)
Shaniya has misspelled a scientific name in her biology report. She needs to correct it, but she has no access to a computer. She plans to use the Word app on her phone without an Office 365 subscription. Can Shaniya correct her mistake? Why or why not? Yes, she can navigate the window and do simple editing. Yes, she can use this application for free and navigate the window. No, her document is "Read-Only," so she cannot navigate the window. No, her application has limited features and she cannot access the document.
Answer: No, her document is "Read-Only," so she cannot navigate the window
Explanation:
From the question, we are informed that Shaniya has misspelled a scientific name in her biology report and that she needs to correct it, but she has no access to a computer.
We are further told that she plans to use the Word app on her phone without an Office 365 subscription. She will not be able to correct the mistake because her document is "Read-Only," so she cannot navigate the window.
Answer:
No, her document is "Read-Only," so she cannot navigate the window
Explanation:
I just took It
Which statement best describes an academic goal?
Answer:
Explanation:
Hila gets good grades and works hard to finish first in class.
Hope this helped you!
Answer:
Hila gets good grades and works hard to finish first in class.
Hope this helped you!
Explanation:
01000001 01101110 01110011 01110111 01100101 01110010 00100000 01101001 01110011 00100000 00110100 00110010 00101110 There's a way to make this meaningful; find it!
Answer:
Binary Code
Explanation:
I believe this is Binary code, so if you enter this in Google, click a translator from binary code to text, and it should tell you.
when I did it, it said "Answer is 42"
Hopefully this helped any.
You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determine the most optimal path to forward the traffic?
Answer:
Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.
Explanation:
BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.
This protocol gives all the notification about the status of the connection and router.
It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.
The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
Answer:
wireless access point
In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.
HTML coding ......plz help
Answer:
<html>
<title=succes secrets>
<bg color="orange">
<body>
success...........all those text on isde
Define a public static method named s2f that takes two String arguments, the name of a file and some text. The method creates the file and writes the text to it. If all goes well the method returns true. If, however, either of its arguments are null or if there is any problem in creating or writin
Answer:
Java solution (because only major programming language that has public static methods)
(import java.io.* before hand)
public static boolean s2f(String fileName, String text){
try{
PrintWriter out = new PrintWriter(new File(fileName));
out.println(text);
out.close();
return true;
}
catch(Exception e){
return false;
}
}
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False
Answer:
A. True.
Explanation:
In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.
In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.
janice has set her camera for f/4 but is trying to decide if she should switch to f/8
a. a larger aperture and smaller depth field
b. a smaller aperture and greater depth field
c. a smaller aperture and smaller depth of field
d. a larger aperture and greater depth of field
Answer:
b
Explanation:
cuz the smaller apeture and greater depth field would be better
Answer:
B a larger aperture and smaller depth of field
Explanation:
EDGE 2022
In which phase of the software development life cycle is software tested in the same environment where it be used?
Answer:
In the Implementation phase, coding is done and the software developed is the input for the next phase i.e. testing. In the testing phase, the developed code is tested thoroughly to detect the defects in the software. Defects are logged into the defect tracking tool and are retested once fixed. I think the answer is this
The name of a cell (for example, A1) is its cell ________. PLZ HELP I HAVE TO TURN THIS IN SOON
The quesyion is asking about google sheets
Answer:
The answer is "Address".
Explanation:
This address cell is also known as the reference cell, which is used for providing the cell specification. The address cell is also an alpha value used for a list for the identification of a particular cell. Each selected is preceded by one or more letters. Each column is identified by the letter and the number is the row.
Read the code below.
What will the computer print if the input for year_variable is 1700?
if year_variable == 1776:
print("Your answer is correct. The Declaration of Independence was signed in “year_variable”.")
elif year_variable 1776: compute_variable = year_variable - 1776
print("Subtract “compute_variable” years from your answer for the correct answer.")
Your answer is incorrect. The Declaration of Independence was signed in 1776.
Subtract 76 years from your answer for the correct answer.
Add compute_variable years to your answer for the correct answer.
Add 76 years to your answer for the correct answer.
PLEASE EXPLAIN HOW YOU GOT IT
Answer:
D. Add 76 years to your answer for the correct answer.
Explanation:
Write the code in python and make year_variable= 1700
Since the input value is 1700, it is less than 1776. This means the elif year_variable < 1776:
would run. This line of code makes whatever the input value is to be subtracted from 1776, then produce an answer labeled as "compute_variable"
This "compute_variable" is then shown to be in a print function, where it says to add whatever the compute variable is to the input, to get the correct answer.
Answer:
The answer is D.
Explanation:
Hope it helps! =D got it on edge
A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
Answer:
A switch operates in the OSI reference model data link layer and uses the MAC address to forward packets
Explanation:
A network switch used in wired physical network connection, has several ports and acts as the bridge in the network of computing devices with a port naming system based on MAC addresses to forward data receives at the OSI model data link layer. By incorporating the capability of routing, switches can forward data at the network layer, known as layer 3.
When you write a program that will run in a GUI environment as opposed to a command-line environment, ____________.a. The logic is very differentb. Some syntax is differentc. You do not need to plan the logicd. Users are more confused
Answer: B. Some syntax is different
Explanation: The graphical user interface and the command line are both ways of interacting with our computer such that through them we can perform numerous functions very easily. However, the graphical user interface and the command line both offers different methods or ways of interaction with our computers. GUI's provides an interactive platform with our computer using visual icons and representarion, hence increasing usability especially for an average user. The command line on the other hand allows interaction with our computer through the use of text typed from the command line interpreter by following a defined syntax for each type of command or task to be performed.
Programs may be written and designed to run in ith environment, however application developers need to pay attention to the syntax due to the differences which exists while writing programs designed for each of the interfaces.
what is meant by concentration of a solution
Answer:
The concentration of a solution means the amount of solute present in a given or specific amount of solution. (presented in percentage)
For example, the Normal Saline solution normally used for different scientific experiment or so. The saline water has 0.9% of salt (sodium chloride). This is the concentration of solution of salt.
Answer:
Concentration is the ratio of solute in a solution to either solvent or total solution.
Explanation:
Concentration basically means how much of something is in a given area. A gas, for example, can be highly concentrated in a given area, but a liquid cannot be concentrated and always takes up the same amount of space.
An IT technician is applying a static IP address to a printer. Which piece of IP addressing information on the printer would allow the technician to check connectivity with a PC on a remote network?
Answer:
ip ADDRESS
Explanation:
These static IP addresses can be established on the device directly, for example using each computer's network settings on Windows, or they can be set at the router level. Although many people (and even some routers) still refer to it as a “static IP address,” doing it at the router level is referred to as assigning a DHCP reservation.
What IT technician is applying a static IP?Your computer's IP address lets the rest of the Internet know if it is running a web server. Internet-connected devices can have either a static IP address, which remains constant over time, or a dynamic IP address, which is subject to change over time.
A gadget with a static IP address assures that it can be found on the network easily because the IP address won't change.
Therefore, IP address allow the technician to check connectivity with a PC on a remote network.
Learn more about static IP here:
https://brainly.com/question/17063812
#SPJ5
This is for my lil sister A personal skill is s? A. Personal characteristic B. Ability to do something C. Time been helping people D. A personal trait
Answer:
B. An Ability to do something
Hope this helps :)
A personal skill is an ability to do something. Hence option B is correct.
What is personal skills?Personal skills is defined as talents that are directly tied to a person's personality or attributes. Personal talents are acknowledged as soft abilities that are difficult to teach but not impractical. They are also referred to as "people skills" or interpersonal skills. Consider what you accomplish at your present position. Think back on your prior training and employment.
Making decisions and resolving issues. Intelligence in emotions. either assertiveness or restraint. It is crucial for students to grow their interpersonal skills in order to learn more effectively, communicate with others, develop their personalities, and achieve academic success. It is believed that pupils with strong interpersonal abilities also have successful personal and professional lives.
Thus, a personal skill is an ability to do something. Hence option B is correct.
To learn more about personal skill, refer to the link below:
https://brainly.com/question/10024029
#SPJ2
What does CS mean? idk
Answer:
It means computer science.Which is the science that deals with the theory and methods of processing information in digital computers and the design of computer hardware and software.
You listened to a song on your computer is it hardware or sofrtware, explain?
hardware, because u are using speaker which is a hardware
You are a cleared employee. Your friend called and told you that he saw information about the classified XYZ program on the Internet. If you viewed that classified information that is now in the public domain, would you have to report a data spill on your computer?
Answer:
Yes, because though you are a cleared employee, the classified information should not be open for all employees to see as it is a data disclosure violation.
Explanation:
Data is a vital tool in the business industry. The need to secure data or present it to be seen by competitors is very crucial as it maintains the dominance of a company on its competitors.
Only authorized employees in a company are allowed to view classified data and must report any siting of data spill, to avoid prosecution.
Jack needs to email two documents to a friend, but the files are so large his email server bounced them back as undeliverable. What is your advice?
first try to do one at a time and if they are both too large he can send them through softwares like google drive that let you have large amounts of storage with your files
Memory operations currently take 30% of execution time of program A. A new widget called a "cache" speeds up 80% of memory operations by a factor of 4. A second new widget called a "L2 cache" speeds up half of the remaining 20% by a factor of 2. What is the total speed up?
Answer:
The answer is "1.24"
Explanation:
Formula:
[tex]\bold {Speedup= \frac{1}{(1 - non-speedup-portion) +(Speed up portion 1)}+\frac{(speed up-portion \ 2)}{ speedup\ 2}+ ....}\\\\[/tex]Given value:
Operations in the memory = 30%
= 0.3
80% Memory [tex]= 0.3 \times 80\%[/tex]
[tex]=[/tex] [tex]\frac{(0.3 \times 80) }{100}[/tex]
[tex]= 0.24[/tex]
Now it takes 0.06 seconds, saved 0.18 seconds.
20% of the memory operations:
[tex]= 0.3 \times 20\% \\\\= \frac{(0.3 \times 20)}{100} \\\\= 0.06[/tex]
Half of the other 20% = 0.03
It takes 0.015 seconds now, saved 0.015 seconds, saved 0.195 seconds.
It takes 0.805 seconds in the 1 second.
[tex]Speedup = \frac{1} {0.7 + 0.3\times \frac{0.8}{4}} + 0.3\times0.2\times\frac{0.5}{2} + 0.3\times0.2\times0.5[/tex]
[tex]Speedup = 1.2422[/tex]
Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?
A. Educate the end user.
B. Document the problem.
C. Recover the user data.
D. Reinstall Windows.
Answer:
C. Recover the user data.
Explanation:
Because a virus delete user data
Convert 30 to hexadecimal
Answer:
1E
Explanation:
Here is a table to help you. Similar to a multipication table, just follow either the number 3 down to A (aka 10) or 6 x 5 and you will find your answer of
1E = 30
The next thing Maia wants to do is to indent the first line of her paragraphs.
How does she do this?
Answer:
She moves the first-line indent marker to the right.
Explanation:
Answer: d the first-line indent to the right
Explanation: