Answer:
D. chart
Explanation:
Correct on edg
Answer:
d
Explanation:
took the test
A Career Cluster is a group of related careers true or false
Answer:
true
Explanation:
there are 16 different types so each cluster is related in some way.
A Career Cluster is a group of related careers or occupations that share common skills, knowledge, and pathways. This statement is true
These clusters are used in career exploration and education to organize and categorize careers based on similarities in the types of work they involve.
Each cluster encompasses a range of careers that share similar attributes and can be connected through similar educational pathways or skill sets.
For example, the STEM (Science, Technology, Engineering, and Mathematics) cluster includes careers such as biologist, software developer, engineer, and mathematician, all related to science and technology fields.
Career Clusters provide a useful framework for students and job seekers to explore and navigate various career options effectively.
Know more about Career Cluster:
https://brainly.com/question/8825832
#SPJ6
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota? Check all that apply.
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
In Backstage view, choose Cleanup Tools. Then, click Empty Deleted Items Folder.
Answer:
B, C, E are correct
Explanation:
Found on edg
Answer:
a,b,c,d
Explanation:
2021 i got it right
John is considering his STEM education choices. He wants to begin working in the technology field as soon as possible.
What level of degree should he pursue?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
STEM is a curriculum based on the idea of educating students in four specific disciplines — science, technology, engineering, and mathematics — in an interdisciplinary and applied approach. The students who graduated in STEM-based education getting more paid and jobs than students who did not study the STEM-based education.
As in this question that John is considering his STEM education choices, and he wants to begin working in the technology field as soon as possible. He should pursue bachelor (graduate) degree in technology. Because after, passing out, he can begin working in technology easily.
Answer:
Associate's degree
Explanation:
Think of an example in your life where a number could be described as data, information, and knowledge
Answer:
how many event you have been too in the last month (well non during this time but as an example)
Explanation:
____________ is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Answer:
Human Computer Interaction
Explanation:
Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
What is computer interaction?Research on the design and application of computer technology that concentrates on the interfaces of humans and computers is known as the human-computer interface.
Experts in human-computer interaction (HCI) study how people use computers and develop solutions that let people use them in new and different ways.
The answer is Human-computer interaction.
Thus, Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Learn more about computer interaction here:
brainly.com/question/3173766
#SPJ2
plssssssssssssssssssssssssssssssssssss help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
John is the yearbook president and is searching for computer storage that will have the most memory to save articles and pictures for the yearbook. What form of storage should John use?
Cloud storage
External hard drive
Floppy disk
USB flash drive
Answer:
flash drive, protects data
Answer:
USB flash drive
Explanation:
A USB flash drive would be used since most flash drives that are used nowadays can use up to 2 Terabytes. That's as of dates back in 2018, and Terabytes are the fourth largest " Byte " in the virtual world. USB flash drives are also commonly used to save projects and having the ability to plug it into one computer, save it, unplug it, and bring it to another computer to download the files and work on it at home. As a Graphic Designer, we use these all the times, hopefully this helps! :)
What might happen if a computer has too many applications running at one time?
a. become worth more money
b. freeze or run slowly
c. your wifi will stop working
d. become more efficient
Answer:
b freeze or run slowly
Explanation:
Write a compound inequality that is represented by the graph.
5
6
7
8
9
10 11 12
13 14
15
A compound inequality using the variable x is
Answer:
[tex]7 < x < 14[/tex]
is the answer
A shop will give discount of 10% if the
cost of purchased quantity is more than 100
Ask user for quantity
Suppose, one unit will cost 100
Judge and print total cost for user
Answer:
10%÷100 it is correct answer
The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simulate starting a bank with a specific number of coins, then adding to your piggy bank to bring your total to $2.12. What you need to do: Create a Coins object that initially has 4 quarters, 3 dimes, 2 nickels, and 1 penny. After you create the initial object, print out the total, then add coins to your bank until you have a total of 15 coins totaling 2.12. You will need to figure out which combination gets you to the correct total with the correct number of coins! When you are finished, call the method to print the bank count then the bank total to verify that you got the correct values.
Answer:
Coins c1 = new Coins (4, 3, 2, 1);
c1.bankValue();
c1.addQuarter();
c1.addQuarter();
c1.addDime();
c1.addDime();
c1.addPenny();
c1.bankCount();
c1.bankValue();
Explanation:
Motivation is best defined as
the reason to achieve a goal.
O accomplishing a long-term goal.
O taking a break from a goal.
O the reason to compare a goal.
Answer:
a
Explanation:
the reason to achieve a goal
Motivation is best defined as the reason to achieve a goal. Thus, the correct option is A.
What is Motivation?Motivation is the cause of a behavior's initiation, continuation, or termination in humans and other animals at a certain time. Motivational states are frequently interpreted as internal forces that produce a disposition to participate in goal-directed activity in the agent.
Different mental states are said to compete with one another, and only the strongest state can determine behavior. This implies that we can be inspired to act even when we don't.
Desire is the classic example of a motivating mental state. However, several other states, such as goals or views about what one should do, can also serve as motivation.
The word "motive," which refers to a person's needs, wishes, wants, or drives, is the root of the word "motivation."
It is the process of inspiring people to act in order to accomplish a goal. In the context of career aspirations, psychological factors influencing people's behavior may include a desire for money.
Learn more about Motivation, here
https://brainly.com/question/951988
#SPJ6
Why is it difficult to detect a Trojan horse?
Answer:
Explanation:
Because the virus disguises it self as something you are trying to download, then it attackes your device
Answer:
Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. ... The computer's antivirus and antimalware programs will be disabled and the necessary steps to remove malware will be inaccessible.
Explanation:
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. ... One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users' devices to attack the routers on their wireless networks.
find the 12th term of 14,9,-1,-6
Answer:
T12=a+(12−1)d=(a+11d)
=14×11×(−5)=−41
Explanation:
I hope this helps you out and if your feeling generous plz mark brainliest it helps me a lot thank you:)
Movie recommendations? I’m in middle school so nothing nasty bro and I don’t really like horror movies so none of those either
Answer:
watch happy gilmore
Explanation:
Answer:
Uh... My Sister's Keeper... 5 Feet Apart... The Fault in Our Stars.
Explanation:
The first computer available for commercial sale in the United States was made by Mauchly and Eckert in what year?
1974
1947
1940
1951
Answer:
1951
Explanation:
Which two steps did Adnan take to access the dialog box that allowed him to add text to the shape?
group, then left-click
select, then right-click
unmerge, then left-click
highlight, then right-click
Answer:
B
Explanation:
Answer:
select, then right-click
Explanation:
If you are logged on to Windows Live Messenger, why would you be unable to engage
in an instant messaging session with your brother, who is logged on to his AOL
Instant Messenger account?
a. Because you use Windows and your brother uses Apple OS X
b. Because Windows Live Messenger has built-in security and AOL Instant
Messenger does not
c. Because AOL Instant Messenger and Windows Live Messenger use their own
proprietary protocols
d. Because AOL Instant Messenger encrypts
Answer:
C: Because AOL Instant Messenger and Windows Live Messenger use their own proprietary protocols
Explanation:
Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons on the micro:bit.
Answer:
Say you already have the A and B buttons hooked up. You can still use the tape or foil to hook more things up to the micro:bit.
Explanation:
which of the following memory types cannot store the data for information permanently Ram chachi Flash Memory hard disk
Answer:
Memory hard disk is the answer
Answer: his answer is correct
Explanation:
Which function would you use to make sure all names are prepared for a mailing label?
Answer:
Proper Function
Explanation:
I just took the quiz on engenuity.
Answer:
Proper on edge
Explanation:
List the basic computing and processing steps in order
Answer:
brainstoring and engeenerign process steps
Explanation:
because of science
Presentation slides should not have more than _____ bullet points.
Answer:
The answer is four
Explanation:
don't use more than four bullet points on any slide and will avoid using single bullet points on a slide.
What is the main disadvantage of parallel circuits?
Any break in the circuit stops the flow of charges.
There are multiple paths for charges to flow.
If one bulb goes out, the other bulbs will go out.
They are complicated to design and build.
Answer:
d
Explanation:
Answer:
D: They are complicated to design and build.
Explanation:
what is thesaurus?what do you mean by spell chek feature
Answer:
Thesaurous is a book that lists words in groups of synonyms and related concepts.
A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.
When and how should internet service providers be allowed to treat some kinds of internet traffic different from others?
Answer:
When the content of the internet traffic is deemed unlawful the internet service provider can discriminate, block or slow down the internet traffic
Explanation:
The internet service providers have the right to block website that promote terrorists views or are used for recruitment by terrorists as well as other materials that are objectionable
The internet service providers can also discriminate against materials that are obscene, lascivious, indicate harassment, contains severe or exceptionally high violence based on preparation of materials to be published through them on the internet, according to a 1996 federal law
Internet service providers can also provide as zero rating sites that are exempted from requiring data allowance so that they can then be viewed for free by the client.
What uses HTML hypertext links that users can click to access different locations or information?
A. Operating system
B. Domain name
C. Web page
D. Client program
A computer program which uses hypertext markup language (HTML) hypertext links that users can click to access different locations or information is: C. Web page.
A hyperlink refers to an element in a hypertext markup language (HTML) document that provides a link (direct access) to another document, file, location, webpage, and an image.
In Computer science, a hyperlink can be used to directly link to the same path in a hypertext markup language (HTML) document or another HTML document such as a webpage.
Generally, you can insert a hyperlink that end users can click to access different locations or information in the following:
An email address A fileA webpageIn conclusion, a typical example of a hyperlink on a webpage is demonstrated below;
Learn more about hyperlink here: https://brainly.com/question/25760645
Which statement accurately defines the Quick Steps feature in Outlook?
It simplifies common tasks into one-step commands.
It allows a user to add multiple steps to common tasks.
It is only configured for tasks that are not frequently used.
It allows multiple users to add commands to a single mailbox.
Answer:
A
Explanation:
The statement accurately defines the Quick Steps feature in Outlook will be that it simplifies common tasks into one-step commands.
What is the Outlook?The Tools menu is shown on the toolbar adjacent to the Actions menu under the Menus tab. When you select Tools, a drop-down menu with options like Send/Receive All Folders, Reject All, Com Add-Ins, Disable Items, Outlook Options, etc. appears.
You undoubtedly use Outlook every day and use some of its useful capabilities, including flags, categorize, and archive. Even if these capabilities already make it simple to handle your emails, there are other Outlook tools that can help you organize your emails even better.
The phrase "simplifies typical tasks into one-step commands" appropriately describes Outlook's Quick Steps feature.
More about the Outlook link is given below.
https://brainly.com/question/17457799
#SPJ6
Please select the word from the list that best fits the definition
A small farmer who did not own land
That would be a peasant, hope this helps ^^
Answer:
peasant
Explanation:
right on edge
5. (01.04 LC) What is it called when one specific character is pulled out from a string? ( O Concatenating
Indexing
Removing
Slicing
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for this question is Indexing. String indexing is a process that pulled out a specific character from a string. Because string store characters at their index position starting from zero. If you want to pull out a specific character of string at 5th position, then you specify that specific index i.e 5th. For example, a string "elephant" in the 5th position of the character is "a".
While other options are not correct because string concatenating adds character or concatenate to an existing string. for example, the string "Hello" can be concatenated with other string such as "James". After concatenation, the string becomes "Hello James".
String removing removes the string element at the specific index while string slicing is pulling out a group of characters from the string.
THE ANSWER IS SCICING I REPEAT SLICING
the other person is wrong I took the test and got it wrong
trust me its slicing
Which of the following practices can help you avoid harassment (or the appearance of
harassment) when using Internet communications?
a. Send potentially offensive jokes via e-mail only to people you know well.
b. Respect other users' requests not to send any jokes via e-mail or IM.
c. Use emoticons to indicate that threats you make via e-mail or IM are not serious.
d. Reduce inappropriate or unprofessional communications while at work
Answer:
B. Respect other users' requests not to send any jokes via e-mail or IM.
Answer:
d. Reduce inappropriate or unprofessional communications while at work
Explanation: