This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.​

Answers

Answer 1

Answer: First person

Explanation:

First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.

In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.


Related Questions

Two Types of spread sheet

Answers

Answer:

1-simple table

2-excel table

3-pivot table

can you open a privacy password​

Answers

yes you can, you just need the password to change it to an open password.

Question #7
Which of the following is an example of an output device?
O Scanner
O Speakers
O Mouse
Keyboard

Answers

Explanation:

Speakers are output device

Answer:

mouse keyboard

Explanation:

because it a connection with output device

Which of the following statements about software licensing are true? Select 3 options.

A. Both proprietary and open-source software can be modified and redistributed.

B.Free software does not come with a license.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

E. An end-user license agreement protects both the owner of the software and the purchaser.

Answers

Using software licensing concepts, it is found that the correct options are given by:

A. Both proprietary and open-source software can be modified and redistributed.

C.Open-source software allows developers to create new software more quickly and inexpensively.

D. Proprietary software licenses are more restrictive than open-source software licenses.

------------------------

A proprietary software is owned by an enterprise(can be both an individual and company) that produced it, while a free software means that anyone can make changes in it.Changes can also be made in a proprietary software, just an authorization from it's owner is needed, and thus, option A is correct.Both types have licenses, and thus, option B is incorrect.Since anyone can change it, in an open-source software the developers can create new software quickly, while proprietary licenses are more restrictive, thus, options C and D are correct.An end-user license agreement protects the owner of the software from it being changed without permission, that is, just the owner, thus option E is incorrect.

A similar problem is given at https://brainly.com/question/14721871

Answer: these are the correct answers

Explanation:

data are the meaningful result used in computer true or false​

Answers

Answer:

true data are the meaningful result used in computer.

Explanation:

please mark me as a brain list

a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images​

Answers

Explanation:

i don't know

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

What is the difference between Packaged and tailored Software?​

Answers

Answer:

Packaged software are easy or simple to use because these software have an easy interface. Whereas custom software is hard to use because these software are custom-built or customized.

Explanation:

Hope your confusion is now over mate

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

What is the purpose of requirements gathering and analysis?

Answers

Answer:

The purpose of Requirements Analysis is to discover unknown requirements, i.e., to turn unknown requirements into known requirements. Users' needs that were not expressed during requirements gathering and elicitation can be uncovered through Requirements Analysis.

Explanation:

what do you understand by cloud computing? list the advantages of clould computing.​

Answers

Answer:

Cloud infrastructures support environmental proactivity, powering virtual services rather than physical products and hardware, and cutting down on paper waste, improving energy efficiency, and (given that it allows employees access from anywhere with an internet connection) reducing commuter-related emissions.

Explanation:

Answer:

cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

Advantages of Cloud Computing

Here, we will learn what are the benefits of Cloud Computing in your organization:

Cost Savings

Cost saving is one of the biggest Cloud Computing benefits. It helps you to save substantial capital cost as it does not need any physical hardware investments. Also, you do not need trained personnel to maintain the hardware. The buying and managing of equipment is done by the cloud service provider.

Strategic edge

Cloud computing offers a competitive edge over your competitors. It is one of the best advantages of Cloud services that helps you to access the latest applications any time without spending your time and money on installations.

High Speed

Cloud computing allows you to deploy your service quickly in fewer clicks. This faster deployment allows you to get the resources required for your system within fewer minutes.

Back-up and restore data

Once the data is stored in a Cloud, it is easier to get the back-up and recovery of that, which is otherwise very time taking process on-premise.

Automatic Software Integration

In the cloud, software integration is something that occurs automatically. Therefore, you don't need to take additional efforts to customize and integrate your applications as per your preferences.

Reliability

Reliability is one of the biggest benefits of Cloud hosting. You can always get instantly updated about the changes.

Mobility

Employees who are working on the premises or at the remote locations can easily access all the could services. All they need is an Internet connectivity.

Unlimited storage capacity

The cloud offers almost limitless storage capacity. At any time you can quickly expand your storage capacity with very nominal monthly fees.

Collaboration

The cloud computing platform helps employees who are located in different geographies to collaborate in a highly convenient and secure manner.

Quick Deployment

Last but not least, cloud computing gives you the advantage of rapid deployment. So, when you decide to use the cloud, your entire system can be fully functional in very few minutes. Although, the amount of time taken depends on what kind of technologies are used in your business.

Other Important Benefits of Cloud Computing

Apart from the above, some other Cloud Computing advantages are:

On-Demand Self-service

Multi-tenancy

Offers Resilient Computing

Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them​

Answers

Answer:

answer is i

Explanation:

jjgjnyjghjhkgukhi

Answer:

Encryption is a process by which we can conceal the original message (effectively hiding it)

Explanation:

We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

What is the difference between Packaged and tailored soft ware?​

Answers

Answer:

Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.

Explanation:

hpithlps.

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario

Answers

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format

Why are digital computer known as general purpose computer

Answers

More intelligent and better than others

which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) shortest job scheduling , (c) priority scheduling , (d) round robin scheduling​

Answers

Answer:

is correct answer

(a)first come first serve

Explanation:

tres areas donde se aplica la ciencia y tecnologia

Answers

Possible Answers:

- Medicemanto - Medicine, especially applied.

- Ingeniería - Engineering. Modern scientific engineering is making use of technology to help solve problems and understand cause and effects.

- Comunicación - Communication. Public broadcasting to raise awareness of environmental or other scientific concerns.

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

pasar el número 12875 del sistema decimal al sistema octal.

Answers

Answer:

Va Bene

Explanation:

Insiama ma parla da auditore

Your organization uses the following tape rotation strategy for its backup tapes: The first set of tapes is used for daily backups. At the end of each week, the latest daily backup tape is promoted to the weekly backup tape. At the end of each month, one of the weekly backup tapes is promoted to the monthly backup tape. What kind of backup tape rotation strategy is being used

Answers

Answer:

- Grandfather

Explanation:

In the given scenario, the 'grandfather backup rotation strategy' is employed to have the backup of the audiotape files. This is because the entire process is segregated into three distinct sections; daily backup that keeps the track of all the files recorded every day. It is followed by weekly storage of the audio files after the week wraps up in order to save it for future usage. Lastly, 'monthly' media is backed up in order to ensure that no data is left to be backed up that might be required later. This promotes a quicker, easier, yet complete strategy for backing up the desired data files in the systems. Hence, 'grandfather-son-rotation strategy' is the correct answer.

write a program in python to add two matrices...... ​

Answers

Answer:

# Program to add two matrices using nested loop

X = [[12,7,3],

   [4 ,5,6],

   [7 ,8,9]]

Y = [[5,8,1],

   [6,7,3],

   [4,5,9]]

result = [[0,0,0],

        [0,0,0],

        [0,0,0]]

# iterate through rows

for i in range(len(X)):

  # iterate through columns

  for j in range(len(X[0])):

      result[i][j] = X[i][j] + Y[i][j]

for r in result:

  print(r)

Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).

Answers

Answer:

Is this a question or an answer

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

please help me to solve this Question ​

Answers

Answer:

SHOPKEEPER$ = "Chocolate"

Explanation:

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)

A. tools
B. information
C. capital
D. people
E. power

Answers

I think the answer would be tools cause that what Ron would use. The answer is tools
Other Questions
What is the equation of exponential regression equation? Round all numbers you your answer to three decimal places Which expression best estimates 6 and three-fourths divided by 1 and two-thirds?Which expression best estimates 6 and three-fourths divided by 1 and two-thirds? Cars arrive at an automatic car wash system every 10 minutes on average. The cars inter-arrival times are exponentially distributed. Washing time for each is 6 minutes per car and is purely deterministic (i.e., the waiting line system is M/D/c). Assuming that the car wash has a single bay to serve the cars, what is the average number of cars waiting in line (L.)? Which best compares the authors' purposes in Silent Spring and "Save the Redwoods"? When a narrator uses the pronoun I, we know the point of view is ___________. Question 17 options: 1) First person 2) Second Person 3) Third person why Fossil fuel has been used more in the existing world ? Anh/Ch hy chng minh: Hc thuyt hnh thi kinh t - x hi l hn tng ca ch ngha duy vt lch s; cn s vn ng pht trin ca x hi loi ngi tri qua cc hnh thi kinh t - x hi l mt qu trnh lch s - t nhin. Think of one behavior that used to be a considered legal/moral deviance in the past that today is more likely to be seen as a medical condition. Then, answer the following questions:a. What is this behavior?b. Who responded to this behavior (police, community, therapist, teacher...) in the past and who responds to it presently (you might want to do some online research on this if you don't know; just make sure to cite your source)?c. How was this behavior dealt with in the past, and how is it dealt with in the present? A new member of your team is visually impaired. He's having a hard time reading his computer screen. How can you show that you value diversity? a) Suggest the organization may not be a great fit. O b) Tell him to apply for a different job within the organization that does not b) require computer usage. 12 Od Tell him that he might want to schedule an eye exam. c) d) Provide access to technology that can magnify or read what is on the computer screen. Question # 1Fill in the BlankComplete the following sentence. Mobility refers to the ability to _____. The density of toluene (C7H8) is 0.867 and that of thiophene (C4H4S) is 1.065 g/ml. A solution is made by dissolving 10.00g thiophene in 250.00ml of toluene. a)Calculate the molarity of the solution b)Assuming the volume are addictive ,calculate the molarity of the solution Two train 75 km apart approach each other on parallel tracks, each moving at15km/h. A bird flies back and forth between the trains at 20km/h until the trains passeach other. How far does the bird fly? Find the volume of this cone.Use 3 for T.3ft17 ft.V = Tr2h3VV ~ [?]ft?Enteryour answer in decimal form. The Nepalese have the trend of working in foreign countries for long. What might be the benefits and drawbacks of brain drain? Point out three for each. Hi Jane!I've been meaning to write for ages and finally today I'm actually doing something about it. Not that I'm trying to make excuses for myself, it's been really hard to sit down and write, as I've been moving around so much. Since we last saw each other I've unpacked my bags in four different cities.I went from London to Prague to set up a new regional office there. You know I'd always wanted to go, but maybe I was imagining Prague in spring when I used to talk about that. Winter was really hard, with minus 15 degrees in the mornings and dark really early in the evening. But at least it was blue skies and white snow and not days on end of grey skies and rain, like at home.From there I was on another three-month mission to oversee the set-up of the office in New York. Loved, loved, loved New York! It's like being in one big TV show, as everywhere looks just a little bit familiar. I did every tourist thing you can think of when I wasn't working, and must have spent most of my salary on eating out. It was really hard to leave for the next job, especially as I kind of met someone (!) More about Michael later ...So then I was posted to LA, which felt like a whole other country compared with the East Coast. I could definitely get used to that kind of outdoor, beach lifestyle, but I didn't spend as much time getting to know California as I could have because I was flying back to see Michael every other weekend. He came to see me when he could, but his job means he's often working at weekends, so he couldn't make the flight very often. Those three months flew by and then I was off again, to Frankfurt, which is where I am now. And ... so is Michael! He got a month off work and we're trying to work out how we can be in the same place at the same time for a while. We figure the first step in that direction is getting married, which is also why I wanted to write I can't get married without my oldest friend there! The wedding's going to be at home in London in September and I hope you can come!Anyway, tell me all your news and I promise not to leave it so long this time! Lots of love,Kath Question 1: What was the authors purpose(s) in writing this text?Question 2: How was the text organized?Question 3: How do the type/ topic/ ideas from the text relate to things you have been doing?Question 4: If you were Jane, what would you write to reply Kath? what do most elections for local state and federal offices have in common Which diagram best explains changes to the composition of blood in the lungs?to,fco(A)(B)AlveolusBloodAlveolusBloodCapillaryCapillary(C)(D)AlveolusBloodAlveolusBloodCapillaryCapillary Lucia quiere repartir 4/5 litros de leche entre sus dos hijos en partes iguales. Cunto le dar a cada hijo? In the paralleling technique, the central ray strikes the film at whatangle?OA) 90B) 45C) 75OD) 1250 Sofia bought a couch that required a $60 down payment and $60 per month for the next eight months. Which type of liability does this describe?a) a long term liabilityb) a non liquid liability c) a consumer liability d) a current liability