Which of the following is NOT a category on a shot list

Answers

Answer 1

Answer:

What’s the following I will edit this and answer it if I can know

Explanation:


Related Questions

Which of the following do plant cells need for photosynthesis to take place
A. Oxygen
B.glucose
C. Light energy
D. Chemical energy

Answers

Answer:

C. Light energy

Explanation:

A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is called a

Answers

Answer:

Folksonomy.

Explanation:

A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is called a folksonomy.

This ultimately implies that, folksonomy is a user-generated system which is typically used for classifying and organizing online content into various categories through the use of metadata such as keywords, electronic tags and public tags in order to make it easier to find in the future.

Hence, folksonomy is highly beneficial in areas such as collaborative learning, teacher resource repository, collaborative research, educational platforms, e-commerce etc.

5. Give an example of a database application that has hundreds of users and a very large and complicated database.

Answers

Answer:

IBM DB2

Explanation:

Database Applications are separate applications that do not have a specific database, instead, they are used to be able to manipulate any database that you have access to. One very popular database application that has hundreds of users is IBM DB2. This database application was created by the company IBM which is a multinational company and can even be used to access their own database which is extremely large, and as any database the larger it is the more complicated it is as well since there is more data to sift through

The cloud-based office suite will also work when users are offline.
Describe how this is possible.

Answers

Answer:

This is possible because the the system is managed by a third party and so the users  don’t have to be online all the time for the office suite to work.

 

Explanation:

Hope this helped, I was stuck on this too :)

Cloud-based office suites, such as Microsoft Office 365, offer offline functionality through a technology called "offline access" or "offline mode."

When users are online, their files and documents are automatically synced and stored in the cloud, accessible from any device with an internet connection.

However, to enable offline access, the cloud-based office suite downloads a copy of essential files and data to the user's device.

This cached version allows users to continue working on their documents, spreadsheets, or presentations even when they are offline or experiencing internet connectivity issues.

Once the device regains internet access, the changes made in offline mode are automatically synced back to the cloud, ensuring seamless collaboration and data integrity.

Know more about office suite;

https://brainly.com/question/24207427

#SPJ5

What software application can be used to send and receive email messaging and management appointments in calendar's
Excel
One drive
Outlook
PowerPoint

Answers

Answer:

Outlook

Explanation:

An authentication system based on the physical characteristics or behavioral tendencies of an individual is the definition of biometrics. True False

Answers

Answer:

True.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Hence, an authentication system based on the physical characteristics or behavioral tendencies of an individual is the definition of biometrics.

In Computer science, some examples of tools or elements used for performing user authentication are biometrics scanner, smart cards, digital certificates, picture passwords, magnetic stripes etc.

Please select the word from the list that best fits the definition
.edu sites

- Safe Sites
- Unsafe Sites

Answers

Answer Is

Safe Sites.

Explaining:

Edu Sites Are For Educational Purposes. So They Need To Be Secure.

Answer:

safe sites

Explanation:

i got it right on edg

For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as _____________.

Answers

Answer:

Quality-of-Service (QoS) guarantees

Explanation:

This task for a computer is known as Quality-of-Service (QoS) guarantees. This is basically a protocol that is built into a specific product or service which analyzes that application process and makes sure that everything is correct. This would include the rate and timing requirements that need to be met in order for the computer to deliver the continuous media. If this is not the case certain actions can be implemented using the data provided to fix this issue.

Write a method named swap that takes an int parameter followed by a double and prints them in the reverse order. For example, calling swap(4, 7.5) would print 7.5 4.

Answers

Answer:

Explanation:

The following code is written in Python and does exactly what is being asked in the question. It creates a function/method that takes in two parameters one int and one double, and prints them in reverse order. Double first and the Int second

def swap_numbers(int_num, double_num):

   print(double_num, int_num)

The  method named swap that takes an int parameter followed by a double

and prints them in the reverse order is as follows:

def swap(x, y):

   print(y, x)

swap(4, 7.5)

The code is written in python

A function/method is declared in python.

This method accept two parameters x and y.

The parameters accept integers and double(float) respectively.

Then we call the functions/method with its parameters.

learn more: https://brainly.com/question/19880203?referrer=searchResults

Why is user testing ah important part of the design process

Answers

Answer:

The general description of the whole of the general concept is described below.

Explanation:

Usability testing would be an important part including its customer construction business it allows users to see what works and where it doesn't function properly with someone's design elements. Keep challenging yourself to provide much more of your workshops through using at least yet another novel concept from that kind of blog post during your very next or even first and another round of research.

To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Modify Read & Execute

Answers

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

Are you prepared for a terrorist attack?

Answers

Answer:

Uh, no probably not. I would be doomed.

make sure im first,

If you convinced your teacher to give you an extension on an assignment, what would this situation be an example of? OA. Generalization O O B. Prediction C. Drawing conclusions D. Rhetoric

Answers

Answer:

D. Rhetoric

Explanation:

Just trust me....okay!?......okay

is a biometric system an input, output, storage or soft device?​

Answers

Answer: Input

Explanation:

Biometric systems work by using a person's physical or behavioral characteristics to digitally ascertain that it is indeed that person that is requesting access to what it is they are requesting access to such as systems, data and devices.

Examples include fingerprints and facial patterns. Biometric systems therefore take in the information presented which makes them input devices.

Enumerate the four basic mathematical operations and their corresponding Excel operators.

Answers

Answer:

The four basic mathematical operations are Addition, subtraction, multiplication, and division.

Explanation:

Consider the provided information.

The four basic mathematical operations are Addition, subtraction, multiplication, and division.

Their corresponding Excel operators.

Addition: If you want to add 2 numbers in excel, for example, 3 and 5. use the operation

=3+5

Then press enter.

Subtraction: If you want to subtract 2 numbers in excel, for example, 5 and 3. use the operation

=5-3

Then press enter.

Multiplication: If you want to multiply 2 numbers in excel, for example, 3 and 5. use the operation

=3*5

Press enter.

Division: If you want to divide 2 numbers in excel, for example, 3 and 5. use the operation

=3/5

Press enter.

Hence, the four basic mathematical operations are Addition, subtraction, multiplication, and division.

pls help
Will give brainlest Ashton assigned a string value to a variable. Which program statement should he use?


2bookName = "Brave New World"

Book Name = "Brave New World"

bookName = "Brave New World"

bookName! = "Brave New World"

Answers

Answer:

I think its B bookName! = "Brave New World"

Explanation:

Answer:

B: Book Name = "Brave New World"

Explanation:

The process that allows you to copy data from another source file to a database without having to open the sources file is called

Answers

Answer:

Importing.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

The process that allows you to copy data from another source file to a database without having to open the sources file is called importing.

Hence, import is a computer feature that avails users the ability to copy data directly from another source file to a database without opening the source file and as such is less cumbersome and saves time.

_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.

Answers

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.

What is Case-based Reasoning?

Case-based reasoning is a system of solving problems in engineering and artificial intelligence. Here, problem-solvers resolve problems based on past experiences.

For example, to repair a faulty computer, the repairman recalls a computer that such a similar case and applies the same reasoning in solving the current problem.

Therefore, the correct answer is case-based reasoning because, past problems are stored with keywords that will make it easier to solve new problems.

Learn more about casebased reasoning here:

https://brainly.com/question/9305378

Identify the device used to convert an information signal to a signal compatible with the medium over which it is being transmitted.

Answers

Answer:

A modulator

Explanation:

This device is called a modulator and it does the task of modulation. The act of modulation influences data information on the carrier, allowing signal to be sent over a bandpass frequency range.

The Modulator is what controls an input audio signal which is called a carrier. It does not make a sound. What it does instead is to change the original carrier sound wave. The work of the Modulator as evident in the question is the conversion of information signal to a signal compatible with the medium over which it is going to be transmitted.

Convert the
binary number
10 110 110 111
to hexadecimal​

Answers

Answer:

0x5b7

Explanation:

You should group the binary digits in groups of 4 for easier conversion:

10 110 110 111 = 0101 1011 0111

Then you can look it up in a table and find 5b7

how to promote CPA offers without a website?

Answers

Answer:

Report Promote Marketing For CPA Offer: Article advertising is the same as blog entry advancement. Agree to take some excellent article accommodation destinations and begin submitting encouraging posts. Compose articles that are by one Way or another pertinent to your exclusive CPA offer

Explanation:

:)

What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?

Answers

Answer:

Memory address register

Memory buffer register

Explanation:

In c/c++, the processor consists of mainly five stages.

FETCH DECODE EXECUTE MEMORYWRITE BACK    

The memory address (MAR) register is a register where memory locations are being stored and where instructions are being fetched from the memory.

The memory buffer register (MBR) specifically enables the storage of data that are fetched or to be written in the memory.

What tab on the Ribbon would you select to create a Photo Album?
Design
Animation
Home
Insert

Answers

Answer:

It would be the last one Insert

Explanation:

I just know

A(n)
is a fast compute with lots of storage. pls help

Answers

Answer:

That last answer was amazing, but the answer you're looking for is server

Explanation:

On a network, a server is a computer that distributes files to numerous clients. The opposite of storage is a device where you keep data that you can access when you require it.

What is the role server in fast compute with storage?

A cloud server is a pooled, centrally placed server resource that is hosted and made available through an Internet-based network—typically the Internet—for use by a variety of users.

The same ways that a traditional physical server would be able to provide processing power, storage, and applications are also possible with cloud servers.

One system may include both servers and storage. The purpose of storage is to provide long-term access to files. Distributing work, sharing resources, and exchanging data are the duties of a server.

Therefore, a server is a fast compute with lots of storage.

Learn more about server here:

https://brainly.com/question/28560376

#SPJ2

What colorful format should you use to bring attention to an important sentence or phrase
Font size
Highlight
Italicize
Underline

Answers

Answer:

Highlight

Explanation:

Answer:

Highlight

Explanation:

PLEASE HELP PLS HELP GUYS PLEASE HELP THIS IS DUE IN 5 MINUTES GUYS PLS HELP I WILL GIVE BRAINLIEST FOR PROPER ANSWER


List four "beliefs" in which evolutionary scientists place their faith when supporting the theory of evolution. Use complete sentences.

Answers

Answer:

The four belief systems of the example in the case throughout the question are described elsewhere here.

Explanation:

The belief that perhaps the average temperature of the globe has never significantly altered. The belief inside of an undiscovered or unidentified very first-life species. Belief throughout the hypothesis that human existence had begun mostly in the seafloor. The belief that human existence has managed to transform from concrete to abstract.

Answer:

answers are down below

Explanation:

One aspect in which evolutionists place their faith is the geological column. If you examine a chart of it, you will notice a trend. As you go deeper into the geological column, the fossils found there to get more and more "simple". On the surface of the geological column, scientists have found more complex life forms. This trend suggests that organisms evolved, and the geological column represents this trend in chronological order. However, this data could be used against evolution as well. Therefore, it is inconclusive. If you believe the sedimentary rock formed so rapidly due to the biblical flood, this is evidence against evolution. If you believe rocks formed according to the observations of Charles Lyell, then this could be evidence for evolution. It all depends on how one interprets the data.

Another aspect in which evolutionists place their faith is something they call "intermediate links" Intermediate links are supposed to indicate a transitional form between two different creatures to show that they evolved. For example, evolutionists state that the creature Archaeopteryx is the transitional form between reptiles and birds. Another example of a transitional form found is the Australopithecus afarensis, which is supposed to be the transitional form between apes and humans due to similar bone structures and that this creature was bipedal like us humans.

Another belief evolutionists have to support the theory of evolution is the science of structural homology. Structural Homology is a science that studies similar structures in different organisms. For example, if you examined the forearms of a bat, bird, porpoise, and human, you would find that they have similar forearm structures, They all have a radius, humerus, ulna, carpals, metacarpals, and phalanges. This indicates that all these creatures evolved from a common ancestor due to their strikingly similar structures.

Another aspect in which evolutionists place their faith is in the science of molecular biology. You see, all organisms contain a common protein called cytochrome C. Cytochrome c performs the same basic function in every organism. It is possible to calculate the percentage difference between the cytochrome c in each organism. Evolutionists have created a table that shows the percentage difference between a few different species of organisms. What they found appeared to indicate an evolutionary trend. However, more research shows that this data is highly flawed. If you calculate the percentage difference of this protein between a horse, pigeon, tuna, silkworm moth, wheat, the yeast and compared it to a bacterium ( the "simplest" life form) you would find that all these organisms are almost the same percent different from each other, indicating individual species rather than evolving from a common ancestor. All of these assumptions stated above can be evidence for or against evolution. It all is determined by how someone interprets these facts. I hope this helped you! Good luck :)

Can anyone give me $2 (Reddem code/Promo Code)​

Answers

I can give you 10% off at makeup stores? Where would you like the code for?

2.You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use

Answers

Answer:

symmetric-key cryptography

Explanation:

There are two types of cryptographic algorithms, the public key algorithm which uses a public key to encode a message before transmission and a private key to decode the message after transmission, and the private key or symmetric key algorithm which uses a private key to both encode and decode a message.

Organizational Units are Active Directory __________ into which you can place users, groups, and computers. policies domains buckets containers

Answers

Answer:

containers

Explanation:

Organizational units are used to segment or assign objects in the Active Directory into their different locations. Just like files are arranged in folders, so also can objects in the Active Directory such as users, groups, and computers be assigned to different locations. It is like a container where objects are stored.

When the organizational unit is set up, by default, the users and computers account are created into which new users and computers are placed.

Which of the following did you include in your notes?
Check all that apply.
how you will keep costs down
how you will offer a better product
how you will be innovative in what you offer
Id
Economía

Answers

Answer:

How you will be innovative in what you offer

Explanation:

personally I think all 3 but it is what it is

Other Questions
The table shows the number of gallons of gasoline in a car's gas tank after the car has beendriven x miles.SGasoline UsageMiles Driven, Gasoline inGallons ofTank, y0151014.62014.23513.66012.67512When these data are graphed on a coordinate grid, the points all lie on the same line. Whatare the slope and y-intercept of this line?F Slope = 25 y-intercept = 375G Slope = -25 y-intercept = 15H Slope =25, y-intercept = 375J Slope = -25, y-intercept = 15O A/FOB/G/OD/ A person who can afford a monthly payment of and signs a loan agreement with a monthly payment of is most likely a victim of predatory lending. O A. $800; $1100 O B. $900; $800 O C. $900; $900 O D. $1100; $900 Most energy obtained from water is converted from _____.groundwatertidal generatorswaterfallspotential energy behind dams The large window air conditioner in Anita Breeze's room draws 11 amps of current. The unit runs for 8.0 hours during the course of a day. Determine the quantity of charge that passes through Anita's window AC during these 8.0 hours. The one-to-one functions g and h are defined as follows.g={(-9,-4),(-7,3),(0,-6),(8,0)h(x)=4x+9I need to know what g^-1(0) is. I need help! Jane was smitten with Mr. Rochester from the start.TrueFalse make b the subject of the formula a=squareroot of b+16 A person invested $680 in an account growing at a rate allowing the money to double every 13 years. How much money would be in the account after 27 years, to the nearest dollar? Why is training important? Which is greater, the energy of one photon of orange light or the energy of one quantum ofradiation having a wavelength of 3.36 * 10^-9 What is the mass, in grams, of 0.0490 mol of iron(III) phosphate somebody help me pleaseeeee thank you so much 1) Which feature in cnidarians is the strongest indicator that they are more complex than sponges? They have the ability to reproduce sexually. They have the ability to attach to surfaces. They have a medusa body form. They have nerve cells.The answer is "They have nerve cells". Edge. 2021 A praying mantis eats a bee.Tell which type of relationship it is: mutualism, predation, parasitism, competition, or commensalism. Give details on why.Try for 2 sentences:I think a praying mantis eating a bee is an example of....I think this because... Find AC. PLEASE HELP! Complete the sentence with the word "element" or "compound."O is a(n) ____ and H2O2 is a(n) ____. This is Spanish ASAP An exponential function contains the points: (2, 121) and (3,133.1)What is the exponential function that contains these points? Which of the following shapes are rectangles ? Please choose 2 correct answers !!!!!!!!!!!!!! Will mark Brianliest !!!!!!!!!!!!!! -2y + 6 = -12what is y?