Answer:
* explains the whole paragraph what ever that is * there
Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on data?
Answer:
data-driven decision
Explanation:
While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!
To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.
Answer:
To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.
DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.
Please
I need help
Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios
Software whose code is made freely available to others for use, augmentation, and resale is referred to as:
Answer:
Open Source Software
Explanation:
You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use
Answer:
EFS
Explanation:
what is one benefit of utilizing social media to deliver advertising messages?
Answer:
Increased Brand Awareness.
Explanation:
Social media is one of the most cost-efficient digital marketing methods used to syndicate content and increase your business' visibility. Implementing a social media strategy will greatly increase your brand recognition since you will be engaging with a broad audience of consumers.
Answer:
An organization can test ads and promotions before bringing them to traditional media.
Explanation:
Learning Objectives:
• understand when to use the different
print statements
• create a variable and assign it a value
• use Scanner to read in user input
• print the value of a variable using
printf
Output:
US state: Texas
Capital: Austin
The capital of Texas is Austin
Description:
Copy and paste the code below:
/*******************************************************
* Name:
* Assignment: A01
*******************************************************/
public class A01{
public static void main(String[] args){
// part1
System.out.print("x x x");
System.out.print("x o x");
System.out.print("x x x");
System.out.println();
// part2
}
}
Write your name in the comment on top. The red letters in the output are the user inputs.
This assignment consists of 2 parts.
First you demonstrate your understanding of the different print statements by modifying a
code segment. Then you read in two Strings and print a statement based on the user input.
Part1:
The code segment provided includes
three print statements that produce
the following output:
Change the code segment so that it
produces the following output:
Hint: you will need to change the number of
statements
Part2:
• Prompt the user to enter a state
• Read in the user response and assign
it to a String variable named state
Hint: before you can assign a value to the
variable state it needs to be declared
• Prompt the user to enter the name of
the capital
• Read in the user response and assign
it to a String variable named capital.
• Use printf and format specifiers to
print the following message:
The capital of state is capital
where you substitute state and capital with
the state and capital entered by the user.
Make your output look exactly like the output displayed above.
Make sure to read in the input next to the prompt but without touching it (use a blank to
separate the prompt from the user input). The output should use a single empty line to
separate the frog displayed in part1 from the output created in part2.
Answer:
take out the cord than put it back in than it shall work
define hyperlink in detail with its type
Answer:
Hyperlinks are the primary method used to navigate between pages and Web sites. ... Text hyperlink – Uses a word or phrase to take visitors to another page, file or document. • Image hyperlink – Uses an image to take visitors to another page, file or document.
What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.
Answer: B.) Design
Explanation: just took it
Answer:
b
Explanation:
Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.
Since Mavis is considering signing up for a hosted enterprise software solution for her small business, an advantage of the software is lower cost.
A hosted enterprise software solution is typically hosted off-site and in a private server that is owned by a third party. It's vital for organizations as it can be used in managing daily business activities.
The advantages of a hosted software model include reliable backup, reduction in IT costs, scalability of computing resources, etc. It is also necessary for managing critical business processes.
Read related link on:
https://brainly.com/question/25526416
cats do not eat tomatoes.scat is a cat.therefore ,scat does not eat tomatoes.
What type of access controls allow the owner of a file to grant other users access to it using an access control list
Answer:
Discretionary Access Control
Explanation:
The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.
What is discretionary access control?This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.
Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.
Learn more about Discretionary Access from
https://brainly.com/question/20038736
#SPJ2
Question about microscope
Answer:
1. c. diaphragm
2. a. ocular lens
3. b. fine adjustment knob
4. c. course adjustment knob
5. d. nosepiece
6. a. simple light microscope
7. d. A, B, and C
8. a. light switch
Explanation:
Hope this helps.
Can you predict what changes will come to data storage in the next decade? 
Answer:
Explanation:
More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes
??????????????????? Help
Answer:
d) MS Office
Explanation:
Microsoft Office is a program. Think of it this way .... Your operating system is like the engine of your car.
web browsers save website information in their _________, which helps the site load faster on future visits.
Answer: cache
Explanation:because I took the quiz
PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the ... HTML tag
Explanation:
Answer : language
JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.
To break a page click the _______ tab
Answer: Page Break (or press ctrl + enter on keyboard)
Explanation:
What is the role of a control in a system that is functioning correctly
if you are continuously working with the same range, then you may give a name to the range using _____ option in the data menu open office.
a define data.
b define range.
c define reference.
d define addres
Answer : B. Define Range
If you are continuously working with the same range, then you may give a name to the range using define range option in the data menu open office. The correct option is b.
What is a range?In computer programming, range refers to the interval that includes the upper and lower bounds of an array's variable values. The interval between data points is referred to as the range in statistics.
The domain of a function is the set of values that can be plugged into it. This set contains the x values in a function like f. (x).
A function's range is the collection of values that the feature can take. This is the set of values that the function returns after we enter an x value.
If you are constantly working with the same range, you can give it a name by selecting the define range option from the data menu in Open Office.
Thus, the correct option is b.
For more details regarding range, visit:
https://brainly.com/question/28135761
#SPJ6
Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk
Answer:
however they choose to display the facts as it isbut are willing to take the riskA file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place
You should show your working.
Answer:
5 Kilobytes
Explanation:
5000 bytes ÷ 1000 = 5 kilobytes
test case Exercise 1: Consider the following system: A System reads four integer values from a user. The four values are interpreted as representing the lengths of the sides of quadrilateral shape. The system prints a message that states whether the shape is rectangle or square. Function: Description: Test Input Data:
The program displays if the side values of the quadrilateral is a square or rectangle. The required program is written in python 3 thus :
a = int(input('Enter integer input : '))
b = int(input('Enter integer input : '))
c = int(input('Enter integer input : '))
d = int(input('Enter integer input : '))
#the variables a, b, c, d takes prompt values from users which are used to compare if the quadrilateral is a square or rectangle.
if(a == b == c == d):
#using the assignment operator, compare the value of a, b, c and d
print('Shape is square')
#if the values are the same, the shape is a square
else :
print('Shape is Rectangle')
#otherwise, the shape is a rectangle
The sample run of the program is attached below.
Learn more : https://brainly.com/question/18405415
Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.
Answer:
C) A company's website
Explanation:
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Answer:
Hey there!
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing
Hope this helped! :)
what command can be used to repair a dual boot system?
Answer:
bootrec utility
Explanation:
It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.
explain about cyber terrorism
Explanation:
cyber terrorism is type of hacking group with give the country that are to illegal group
Helpppppp meeeeeeeeeeeee pleaseeeeee
Answer:
B
Explanation:
PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.
Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses memory occupied by the array. a. condition b. key c. subscript and. superscript
Answer: this app allow u to have answers made for students 5 star ap but there are some ads that get in the way
Explanation:
but it is good