Answer:
B
Explanation
The backlight softens the light on an electronic device
Compared to a bricks and mortar shop project, an online shop project would not need to worry about the feasibility of
fitting in with the company's strategic plan
timelines
commercial zoning laws for precincts
resource allocation
Answer: Commercial zoning laws for precincts
Explanation:
A is incorrect: All businesses must follow a strategic plan.
B is incorrect: All businesses must follow timelines.
D is incorrect: All businesses must know when and where to allocate resources.
Answer:
Answer: Commercial zoning laws for precincts
Explanation:
Which term describes the order of arrangement of files and folders on a computer?
A.
I-SPY
B.
CFAA
C.
Digital Millennium Act
D.
SOPA
Answer:The term that describes the order of arrangement of files and folders on a computer is organization. It is very important the organization of the files and folders to be effective, in order to work with them quickly and efficiently
Explanation:
hope this help sry if it doesn't.
Which of the following is an accurate explanation of what this paragraph means?
Radiation from the sun is the main cause of global warming.
(6)
Radiation is the heat that the sun releases onto the surface of the earth.
Solar panels get very hot because they are absorbing radiation from the sun.
ee
Solar panels can make the carth cooler because they absorb heat instead of the earth.
Answer:
The answer is: Radiation is the heat from the sun relaeased onto the surface of the Earth.
Explanation:
need some help with this question
Answer:
B, Backlight.
Please hurry
Question 6 of 10
Who is most likely able to help you accomplish goals?
Teachers
Parents or caregivers
Friends
All of the above
Answer:
All of the above
Explanation:
Answer: all of the above!
Explanation: brainliest? <3.
Is it possible to increase watch hours for a channel by making a playlist out of your videos for people to watch? Will it boost your watch hours?
Answer:
It depends on the person watching
Explanation:
The video that the person is watching has to watched in order for it to count towards your watched hours if one of the videos in that playlist are watched it will get those hours but on the video that has not been watched it will not count it.
Which is an example of an effective study skill?
Answer:
the making note cards and quizzing yourself
Explanation:
Think about a time when someone made a biased judgment about you or acted unfairly toward you because of your age, skin color, clothes you were wearing, gender, the way you speak, where you live, how much money your family has, or some other reason.
Why do you think those assumptions were made about you?
How did that experience make you feel?
How do you think you should have been treated in that situation?
What is an LMS and how is it used?
software used in education to deliver online courses
an online repository used to save files on servers
a small portable computer operated by a touch screen
external hardware that store all types of files
Answer:
software used in education to deliver online courses.
Explanation:
A Learning Management System (LMS) is a software application used in education to deliver online courses. The LMS is typically used for administering, documenting, managing, tracking and automatically delivering of educational courses, training initiatives and development courses online by using multimedia contents.
Examples of Learning Management System (LMS) are; Lessonly, Litmos LMS, Easy LMS, Moodle, Teachable, TalentLMS, CANVAS LMS and iSpring Learn.
Answer:
A. software used in education to deliver online courses
Explanation:
Learning
Management
System
what is the primary reason for setting a closing date in quickbooks?
Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
Criminal profiling
False positives
Cultural bias
Probable cause
Answer:
Cultural bias
Explanation:
Certain verifiable studies have been made across the United States of America on traffic stops, which revealed significant cases of cultural/racial bias. Black people were 20 percent more likely to be stopped and searched by the police than white people.
Within a six-year period, starting from 2011, researchers studied over 100 million traffic stops cases which were carried out by twenty-one state patrol agencies.
Answer:
Cultural bias
Explanation:
Which language is an example of a fifth-generation language?
This career involves answering questions about computer parts and trouble shooting broken computers? Video game designer, computer retail sales associate, we designer, computer programmer
Computer retail sales associate is my best guess. :)
Select three potential disadvantages that apply to using online video and audio for business.
e need for special equipment
technical difficulties
w travel requirements
kun limited range distribution
un necessity of digital literacy
high cost
Answer:
limited range
high cost
difficulties
Three potential disadvantages that can apply to using online video and audio for business are technical difficulties, Kun limited range distribution, and high cost. The correct options are b, d, and f.
What are online audios and videos?The terms audio and video are often used to refer to the time-based media storage format for sound/music and moving image data. An AV work is made up of sound, a sequence of images, or both.
Motion pictures, videos, audiocassettes, CDs, and DVDs are examples of AV works. AV should not be confused with multimedia, which may incorporate several sorts of AV elements but adheres to separate standards.
Although audio refers to sound, the term is frequently linked with computers and other electrical equipment.
Therefore, the correct options are B, technical difficulties, D, kun limited range distribution, and F, high cost.
To learn more about online audio and videos, refer to the link:
https://brainly.com/question/9979289
#SPJ5
why would you use a custom filter?
Answer:By specifying conditions, you can create custom filters that narrow down the data in the exact way that you want. You do this by building a filter. If you've ever queried data in a database, this will look familiar to you. Point to either Number Filters or Text Filters in the list.
Explanation:
The largest size heading tag-often used to create the main heading of a webpage is
Answer:
<h1> tag is the correct answer to the given question .
Explanation:
The heading tag is used in the HTML for giving the heading in the webpage there are 6 heading tag is used in the HTML which are used in the different different purpose .
The <h1> tag is used for the Largest size heading in the main heading of the webpage whereas the <h6> is used for least size heading in the web page.Following are the example of <h1> tag
<html>
<head> </head>
<body>
<h1 align="center"> Brainly </h1>
<h6> subject </h6>
</body>
</html>
Output:
Following are the attachment of output.
Complete the statement below using the correct term.
To work in digital marketing, you will need at least a(n)
______ degree.
Answer:
for your digital marketing degree you would need at least a merit in your gcse's for computer science or media production or with a bachelor’s degree in computer science or information technology
4. Software programs that can perform a specific task for the user Ex Word processing, games browsers
BIOS rootkit
O Application Software
BIOS
0 Volatile memory
Answer:
I might be wrong but i think its Application Software
Explanation:
Which type of operating system is usually used in personal computers?
A [blank] operating system is usually used in personal computers
Answer:
A GUI based operating system is usually used in personal computers
Explanation:
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
The type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
What is the Operating system?An operating system may be defined as s type of system software that significantly regulates all sorts of hardware and software resources of the computer and provides common services for computer programs.
According to the context of this question, the three most fundamental operating systems for personal computers may include Microsoft Windows, macOS, and Linux.
All of these operating systems generally are graphical user interface (GUI) based. These are powerful and extensively used a program that controls and manages the hardware and other software on a computer.
Therefore, the type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
To learn more about Operating systems, refer to the link:
https://brainly.com/question/22811693
#SPJ2
Your question seems incomplete. The most probable complete question is as follows:
Which type of operating system is usually used in personal computers?
Microsoft Windows.UNIX.LINUX.Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit, our buying preferences, and so on. Do you think that this is ethical? If not, can you suggest ways to stop this activity? If yes, explain the context in which it is important to us.
Answer:
Yes, this pratice is ethical
Explanation:
You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.
Digital signatures are as legally acceptable as written signatures.
Digital signatures contain information such as birth date and Social Security number.
Digital signatures can be retrieved easily if they are lost.
Digital signatures show the handwriting of the signer as physical verification.
What is an advantage of using digital signatures?
Answer:
First point and the last point are the correct answer to the given question .
Explanation:
The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.
Following are the advantages of the digital signature
As compare to the electronic signature the digital signature is more secure then that of.The signer's signature is seen on the digital signatures as the physical proof.Global recognition, and the compliance with the law.All the other options are incorrect they are not advantage of the digital signature .
The icon below represents the ____________.
Reading view
Slide sorter view
Slide Show view
Normal view
Answer:
B. slide sorter view
Explanation:
i got it correct when i took the test. have a great day peeps :]
Use the drop-down menus to complete statements about animation options.
Using the ANIMATION PANE, animations can be RECORDED and previewed.
The EFFECT OPTIONS dialog box is used to customize animations, such as adding sound or adjusting the TIMING .
Answer:
✔ Animation pane
✔ reordered
✔ Effect Options
✔ timing
Explanation:
hope this helps :)
The complete statements about animation options are as follows:
Using the animation pane, animations can be recorded and previewed.The effect option dialog box is used to customize animations, such as adding sound or adjusting the timing. What is Animation?Animation may be defined as a type of methodology through which photographing successive drawings, models, or even puppets, etc. are created in order to present an illusion of movement in a sequence. It involves the arrangement of multiple images in an ordered sequence.
According to the context of this question, on the Animations tab, in the Advanced Animation group, select Animation Pane where you will get all such kinds of functions for the animation. Computer animation is the process typically utilized for digitally generating animations. These animations are generally prepared for specific periods of time duration.
Therefore, the complete statements about animation options are well mentioned above.
To learn more about Computer animations, refer to the link:
https://brainly.com/question/28879938
#SPJ2
What means of preventing security breaches would you expect to find in a network which has attempted to provide protection from hackers and other external security threats?
Answer:
a firewall
Explanation:
a firewall is a way programmers can attempt to stop breaches, however every code has a zero day. (a bug that had zero days spent fixing it) even Microsoft had a couple zero days
Which of the following is not an example of a red flag that would keep you from downloading an attachment
Answer:
The link contained in the email redirects you to a different site
Explanation:
This is not a red flag in the sense that, the ability of the link attached to the e-mail to re-direct you to another different site shows that it might be a phising message.
It is left for the person to re-verify and decide if to go ahead to download it or not after it opens on a new site on the internet.
Answer:
The attachment is a PDF file.
Explanation:
A link that causes an attachment to be downloaded and opened always presents a security risk. That risk is mitigated somewhat if you trust the sender to be security-conscious, and if you trust the target of the link to be free of malware.
So, a link with an untrusted source such as a company outsider, may present a security risk.
A message marked "urgent and time-sensitive" is employing "social engineering" to reduce your inhibitions against opening the link. That tends to be an indication that a security risk is involved.
A link that obscures the source of the attachment is less likely to be legitimate than one that is more transparent. That, too, is an indication of a security risk.
PDF files are traditionally considered to be safe document files that cannot execute code or introduce malware. This (the attachment is a PDF file) is likely the answer of choice.
_____
Comment on PDF files
The Adobe Acrobat PDF reader is known to have significant security risks, and hundreds of exploits are available to malware producers that will allow PDF files to introduce and execute unwanted code. There are alternative PDF readers with less vulnerability. And, there are file scanners available that can detect malware in PDF files.
Name all the keys of the home row.
Answer:
A, S, D, and F and your right hand are J, K, l, and ; along with space bar for your thumbs
Explanation:
Question 7 of 10
How can managing your personal life help with reaching your Epal
Eating right exercising and getting enough sleep can reduce stress and help
you study
Managing your personal contacts will help you graduate
Being involved in sports will increase academic performance,
Pulling all nighters helps you prepare for tests when you have a busy schedule
Answer:
Eating right exercising and getting enough sleep can reduce stress and help you study.
Explanation:
I just did it and I got it right.
Question 3 of 10
What is an effective way of making new friends and connecting with people who share the
same interests as you?
Asking the writing center on campus for help with an article for the school
paper.
Joining a new club.
Sharing your thoughts on social media.
All the above
Answer:
option all of the above
hope helps
mark as brainlist plzz
The effective way of making new friends and connecting with people who share the same interests as you can be asking the writing center on campus for help with an article for the school paper. Joining a new club and sharing your thoughts on social media. The correct option is 4.
What is social health?The social and economic factors that affect how individuals and groups differ in their levels of health are known as social determinants of health.
The relationships we have and our interactions with others are considered aspects of social wellbeing.
The relationships can be a source of comfort during trying times. Building wholesome, nurturing, and supporting relationships as well as creating a sincere connection with those around are both essential components of social wellness.
By requesting the campus writing center for assistance with an article for the school paper, you can meet others who share your interests and form new friendships. registering for a new club and posting on social media.
Thus, the correct option is 4.
For more details regarding social health, visit:
https://brainly.com/question/17799234
#SPJ2
Your question seems incomplete, the probable complete question is:
What is an effective way of making new friends and connecting with people who share the
same interests as you?
Asking the writing center on campus for help with an article for the school paper.Joining a new club.Sharing your thoughts on social media.All the above*URGENT!!* *100 POINTS!**9 questions for 100 points*
You are the operator of a small golf and ski shop (Sam’s Golf & Ski) that generates a profit of $70,000 on sales of $255,000 per year. You have been very successful with your 3-year-old business and have met all of your obligations on a timely basis. Your ultimate goal has been to rename your business Sam’s Sports Emporium (SSE) and carry most of the popular recreational sports items at multiple outlets within your state. You have been working on a business plan to present to the bank in order to secure funding and make your dream a reality. As part of your business plan, you need to address the information needs of your proposed business.
2.) identify the IS components needed for SSE. When you explain them, use terms SSE would use.
Hint: What types of communication technology, software, hardware, data
procedures, and people?
3.) how would perform an Industry Analysis on the sporting goods industry as a whole?
Hint: Use Porter’s Five Forces to guide you.
4.) what competitive strategy you would use for SSE based on the Industry Analysis you write wrote about in #2.
5.)discuss systems needed for SSE.
Hint: EES for accounting, etc.
6.) identify the databases needed for SSE and explain why they are needed.
Hint: What type of DBMS? What kind of information would you keep in your
database?
7.)identifying the methodology to use for developing the system(s) for SSE and justify your selection.
Hint: Prototyping
8.) what type of system (functional or cross-functional) is needed and explain.
Hint: Supply chain management, sales transactions updates, etc.
9.)that states what your company ethics policy is.
Hint: What would you include in your company’s ethics policy?
Answer:last day of school
Explanation:
sorry, im looking for it as well
Which option is most likely used to create many-to-many relationships in Access?
inner join
outer join
junction table
parameterized query
Answer:
Junction table.
Explanation:
Junction table is most likely used to create many-to-many relationships in Access.
A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.
Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.
In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.
Answer:
c
Explanation: