What is yalls favorite childhood toy>

Answers

Answer 1

Answer:

Barbies were very popular

Explanation:

6 decades of Barbies ago because of innovative marketing and product extension and continues improvement techniques

Answer 2
I really liked Etch-a-Sketch

Related Questions

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

After 4 years of night school and nearly half a year waiting for the results of the bar examination, you have been admitted to practice law in your state. You decide that you have to keep your current government job while, hopefully, establishing your law practice. To do a first class job for the client, you need first class equipment i.e., good computers and printers, fax machines, etc. You stay late at the office each day to complete work on your pleadings, and you create a database on your computer to keep track of your contacts and cases. Is this an acceptable temporary solution

Answers

Answer:

yes

Explanation:

because it will make the lawyer to keep track of all is client cases without any stress

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible

Answers

Answer:

648

Explanation:

---

Conditions: Not allowed to start with 0 // No repeating digits

---

9 possible ways for first digit (excluding 0, therefore 1-9)

e.g. 123, 234, 567

9 possible ways for second digit (excluding 0 and digit before 1-9)

e.g. 123, 124, 125

8 possible ways for third digit (excluding 0 and condition for second digit 1-9)

e.g. 789 is legit, but 788 is not

Multiply 9*9*8 to get an answer of 648

Explain why this product was created?

Answers

Explanation:

Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

what are some of the opportunities that the stem program offers?

Answers

Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.

Information obtained via: https://www.bestcolleges.com/careers/stem/

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

I'm really weak at computers can someone please help me with these questions ​

Answers

Answer:

DIM count, number, previous, temp AS INTEGER

 count = 0

 number = 1

 previous = 1

again:

 count = count + 1

 temp = number

 number = number + previous

 previous = temp

 PRINT number

 IF count < 10 THEN

    GOTO again

 END IF

Explanation:

Here is the code for the first assignment. Can you think about the rest indicate where you get stuck?

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

advantage of computer

Answers

Explanation:

Computers help increase user productivity, and users become more productive at everything you do on the software running on the computer with a good understanding. For instance, when you have work on an Excel worksheet with a basic understanding, you can create, edit, delete, store, calculation, and print documents and letters. With all pre-existing technologies, all of these things were either impossible or much slower.One of the most useful advantages of computers is able to store and access vast amounts of data, which can be retrieved in the future. For example, a computer system and devices like eBook readers have enough storage capacity as they can store hundreds or thousands of books. Also, you can store movies, pictures, songs digitally, and documents on the computer, and can quickly find data accordingly and share information between devices. It reduces plastics and paper requirements that are used to make non-digital versions of the media.A computer has the ability to connect you to the network or the Internet. Once you connected, you can search for any type of information and can download audio, video, movies, documents, and more.Computers help you to connect with your friend, family, or other relatives with long-distance through e-mail and social networking.

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

Rebecca is designing an in-store display to promote a new board game, which is packaged in orange. What would be the most effective color to use for the display background

Answers

Answer:

...

Explanation:

Unless this is a multiple-choice question, then by using the standard defintion of "orange" (not "yellow orange" or "sunburnt orange"), my answer would be blue, white, black, purple, and sometimes even brown.

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

Can i have the answer of that fill in the blanks

Answers

Answer:

c) {n/a}

d)Binary codes

e)NLP

f)Application software

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

What is more important, the individual or the collective (the group)? Why?

Answers

Answer:

rhe group

Explanation:

one can always work individually but as a group more get done

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.
Other Questions
A bag contains 3 red balls and 5 green balls. What is the probability of picking a red ball from the bag AND getting heads upon flipping a fair coin What is the highest lake in Bolivia? Aguado Lake Quilomari Lake Titicaca Lake Alto Lake 2. A force of 20N acts on a particle of mass 2 Kg and displaces it by 5m at an angle 30. What is the work done? a) 40J ) b) 50 J c) 100J Sam made a password that consists of one letter followed by two digits. The two digits are different. How many possible passwords did Sam choose from?90, 720, 2,340, or 260? Select the correct answer.Which category of drugs does not increase your risk of contracting HIV through infected needles?A. narcoticsB. inhalantsC. stimulants Critically analyse the function of UNO. 1. What are the independent and dependent variables in each of the experiments? A number is multiplied by 8, and that product is added to 2. The sum is equal to the product of 2 and 21. Find the number 3(y+2)-5=22 Solution of the equation? 11. Which of the following is an example of a rational number? i need help on this problem:( what are the things we should receive from others to be happy in case anyone needs this (3, 5), (4, 6), (3, 8), (2, 4), (1, 3), as a mapping A car speeds up from 0.0 m/s to 14.0 m/s in 3.25 s. The acceleration of the car is:A. 14.0 m/s2 B. 4.31 m/s2C. 45.5 m/s2D. 10.8 m/s2 What is the main difference between dew and clouds? why is 8/4 a natural number but 7/4 is not ? Read this excerpt from The Great Fire.Schaffer's first signal went out at 9:30. Several minutes later, Schaffer realized his mistake and ordered Box 319 struck. This was still seven blocks away from the O'Learys', but close enough that firefighters could see the flames and alter their course. Unfortunately, Schaffer's young assistant, William J. Brown, stubbornly refused to strike Box 319, saying he was afraid it would confuse the situation. Brown was so stubborn about his decision that even after the fire he was able to write arrogantly in a letter that "I am still standing the watch that burned Chicago."These errors had two fatal consequences. The most obvious was that a number of engines and dozens of firefighters were sent on a wild-goose chase and did not get to the fire for many minutes. More critical is that it kept fire companies located near De Koven Street in their stations. Several had seen the eerie, dancing glow beyond the rooftops near them and, even without official notice from Schaffer, prepared to respond. When they heard Box 342 rung, however, they assumed the fire was out of their territory and unhitched the horses. Only two fire companies were not fooled by the misleading alarm.How does the structure of this excerpt illustrate the central idea that a series of individual mistakes contributed to the spread of the blaze?A. by comparing and contrasting different peoples decisions and abilitiesB. by comparing and contrasting the most effective firefighting techniquesC. by clearly explaining the reasons for the misleading alarm and its impactD. by clearly explaining the reasons the fire started and the way it was put out A hurricane hits the coast of the United States, destroying oyster farms. Afterward,oyster farmers have far fewer oysters to sell to stores and restaurants.What is this situation an example of? Which of the following is the equation for the line of symmetry in this figure?