Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:
Answer:
Families are systems
Explanation:
first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.
please answer me fast
Answer:
microsoft
Explanation:
this may help u
Answer:
Microsoft
because its a 2013 worldwide partner conference and Microsoft server operations
Human Resources can be classified into four groups namely________, ________, _______ and _____________.
A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz
Answer:
Option D
Explanation:
Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.
A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.
Explanation:
oi.........................
Which is the best version of macOS?
Answer:
macOS Big Sur
Explanation:
hope it helps.
fill in the blank figuring out what type of garden you want to grow is the ____step according to the instructions in how to grow a school garden
Answer:
First.
Explanation:
How to grow a school garden is an illustrative guide that explains to students the step by step process for growing a school garden.
According to the instructions in how to grow a school garden, the first and most important step is figuring out what type of garden you want to grow. At this step, a student should have a good understanding of the type of garden he or she wants to grow.
Thus, this step answers the question of "what am I growing in the garden?"
#include
int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);
return 0;
}
whats the error not giving the correct output
Answer:
#include<studio.h>
#include<conio.h>
void main()
{
char ch;
printf("Enter any letter");
scanf("%c",&ch);
which shooting games is good for low end PC. CSGO or Valorant?
the best choice would be csgo
explain the term creating in word processing
Answer:
Explanation:
Word processing describes creating or editing a document using a word processor such as Microsoft word, etc For example, a student could create a book report in a word processor application.
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
Answer:
HIDPSs
Explanation:
The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
kamusta Bagong user Ako dito
Answer:
kamusta Bagong user Ako dito = hello New user I'm here
Which is not true about climatic normals?
Multiple choice question.
A)
They can differ from daily weather conditions.
B)
They are gathered at one location.
C)
They are averaged over a 30-year period.
D)
They describe average conditions.
Answer:
I think c is correct answer
Explanation:
hope it's help yu
what is the software component of multimedia
explain the following terms
copyleft:
creative Commons:
GNU/GPL:
Answer:
Explanation:
copyleft:
Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.
creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.
Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.
__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies.
The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement
Answer:
to package a repeated task as a function even though the task does not yield a value.
Explanation:
In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.
Some of the notable characteristics of a function includes;
I. The name and arguments of the function must be specified by a function.
II. The implementation of a function is usually designed to be hidden from the caller.
IIII. A function define specific tasks that reusable at many points in a program.
A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.
The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.
Choose all of the items that are important factors to consider for effective web design.
purpose
top-level domain name
content
visually appealing
audience
html
easy to use
Here's a list of the important factors to consider for effective web design:
PurposeTop-level domain nameContentVisually appealingAudienceHTMLEasy to useWhat is Web Design?Clever web design takes into account a range of factors, such as the objective of the website, the domain name, the quality of the content and the aesthetic elements, the intended audience, the HTML framework, and the ease of use. '
Having a clear comprehension of the goal of the website is crucial in determining the appropriate design strategy; in addition, a fitting domain name can positively impact branding efforts.
Compelling content captivates visitors. The visual aspect is a crucial factor in catching attention and improving the user's experience. Having an understanding of the intended viewers allows for customized creation and material presentation. The fundamental basis for organizing web pages is provided by HTML.
Read more about web design here:
https://brainly.com/question/25941596
#SPJ1
A professional educational institution maintains a dedicated web server and database cluster that hosts an exam results portal for modules undertaken by its students. The resource is idle for most of the learning cycle and becomes excessively busy when exam results are released. How can this architecture be improved to be cost-efficient
Answer:
Answer to the following question is as follows;
Explanation:
A dedicated website and database cluster are maintained by a professional academic institution to host an academic results website for modules completed by its students. During the majority of the learning cycle, the resources are inactive, but when test results are issued, they become extremely busy.Configure virtualized architecture utilising AWS Lambda functions to make this architecture more cost-effective.
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Answer:
Salting
Explanation:
Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.
Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks
The salt for each user is a unique value that is stored along with the username in a database
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.
Answer:
Normal
Explanation:
If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.
What is presentation?Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.
Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.
It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.
Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.
To learn more about the presentation, refer to the below link:
https://brainly.com/question/17087249
#SPJ2
why are computer important these days?write in short
In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art
Answer:
A. SmartArt
Explanation:
SmartArt is a graphical tool used to visually communicate information.
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture, curate, and consume customer information to improve their services?
Answer: Data and Insights
Explanation:
Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.
Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.
6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned
Ricard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages. The use of these codes in this context indicates that Ricard understands:
Answer: pragmatics
Explanation:
Pragmatics simply means the study of how words are used. It's the study of signs and symbols. Pragmatics includes speech acts, implicature, and conversation.
Since Richard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages, then the use of these codes in this context indicates that Ricard understands pragmatics.
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.
Answer: library
Explanation:
A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.
It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.
When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output
Answer: round-trip time
message byte size.
Explanation:
Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.
When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects
Answer:
Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.
Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.
Answer:
Assuming this is going to de made with python:
def main():
currentValue = float(input("Current value of account: "))
monthlyInterestRate = float(input("Monthly interest rate: "))
monthsToWait = int(input("Amount of months the money will be left in the account: "))
monthlyInterestRateToPercent = monthlyInterestRate / 100
futureValue = float(round((currentValue + currentValue * monthlyInterestRateToPercent * monthsToWait), 2))
print("The future value of this account will be " + str(futureValue))
main()
Explanation:
Hope this helped. Also, if this is incorrect please tell me what needs to be added so I can add it for future viewers. Have a good day :)