Answer:
A and B
Explanation:
A: In real life, you are always in the same time zone. Working across the internet, however, you are not. (Correct)
B: It's hard for people to understand what you mean, because they can't see body language. (Correct)
C: This could still happen in real life (Incorrect)
D: This is an opinion. (Incorrect)
Sending the same messages to a large number of users is called
Answer:
Can you give me the options
Which headline paints the following scenario in a positive light?
A. Fire Saves Community
B. Fire Devastates Community
C. Fire Lasts Three Hours
D. Firefighters Battle Blaze
Answer:
I suppose D
Explanation:
it is the most realistic whilst also being somewhat positive
who are bill Gates customers?
Bill Gates has customers from Microsoft.
Your answer is Microsoft!
Answer:
Microsoft people! The people who buy pcs and xboxs
Explanation:
Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the steps you would take to learn a new language, and what are some challenges that might arise? What are some things that can help make the process easier?
Answer:
Yes I have tried.
Explanation:
Yes I have tried to learn new language. From my childhood, I am always fascinated by Japanese people and latter on they created a curiosity in me to learn their language--Japanese.
I bought one Japanese language book from the book stall and also bought a Japanese to English transnational dictionary. It helped me to understand the word and the meaning of it. I faced many challenges like learning the alphabets, pronouncing the words, remembering the letters, etc.
To make the process easier of learning Japanese language is to enroll myself in a Japanese learning class. Also take up speaking mock classes from them. I can also make friends those who speak Japanese. This would help me to learn the language easily.
Answer:
same (not really, but...)
Explanation:
any one know how to fix forzas camera bc it shutters to much
Answer:
LEDs are powered by alternating current AC.
Explanation:
The electricity will move in and out of cycles.
When the FPS won't math it'll flicker. Try switching to your camera's shutter speed instead. ( May be times your camera won't support it.)
is aushtin in love with summer?
Answer:
yeah but also u he loves the squichyies
Explanation:
PLEASE HELP ME!
Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
2 1
6 1
3 1
2 5
6 5
3 5
1. Line 1
print (numD, numC)
2. Line 2
for numD in [1,5]:
3. Line 3
print (numC, numD)
Answer:
for numD in [1,5]:
for numC in [2,6,3]:
print (numC, numD)
Explanation:
The given statements cannot produce this output, you need a second for loop! See picture.
any one wanna play forza later?
no liberals/snowflakes
Answer:
sure
Explanation:
but im independent so
use the drop-down menus to complete the statements about how to crop an image in a word document.
Answer:
The answer is below
Explanation:
Using Microsoft Word 2010 version as an illustration. The following steps will be taken
1. First, click the image, the Format tab will appear.
2. Click on the Format tab.
3. Select the Crop drop-down arrow. This will show a drop-down menu.
4. Click on the crop to shape and pick a shape of your choice from the drop-down menu.
5. The selected shape will format the image accordingly.
Answer:
✔ Bedrock
is used as construction materials.
✔ Topsoil
is important for the production of crops.
✔ Desertification
is the loss of fertile soil.
I got it right on e2020
What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking because they share their anti-virus resources. Even if several of the shared sites go down, then the other sites will keep the host from going down. If one or more of the shared sites go down, then there is a good chance that your site will go down as well. It is free.
Answer:
If one or more of the shared sites go down, then there is a good chance that your site will go down as well.
Explanation:
Shared web hosting is a form of web hosting service whereby more than one websites are placed on a single web server that connects to the internet.
Though it is cheaper, it has various problems. And over time, it has been concluded that the major problem associated with shared web hosting is the security issue.
This implies that "If one or more of the shared sites go down, then there is a good chance that your site will go down as well."
Some other problems associated with Shared web hosting are poor value, less flexibility, none advanced features, slow service, less support.
Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false
Answer: True.
Explanation: It uses only the 3 bits to represent any digit in binary and easy to convert from octal to binary and then to vice-versa. Hope that helps
write a function using fat arrow syntax, `salestax` that takes in an arbitrary number of arguments as prices, adds them up and returns a string containing the sales tax with a dollar sign in front. use a tax percentage of 9%.
Answer:
Explanation:
const salesTax = (...allThePricesValAr) => {
sumOfPrices = 0
for(eachValPrc of allThePricesValAr){
sumOfPrices = sumOfPrices + eachValPrc
}
let taxOnPrcVal = sumOfPrices * 9 / 100;
let taxOnPrcVals = `$${taxOnPrcVal.toFixed(2)}`;
return taxOnPrcVals;
}
Which character in smash is the easiest to learn????
Answer:
kirby
Explanation:
jeksjdnskkdndjsjsj
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
secure form of encryption
O Wiretapping
Symmetric Encryption
Type 2 Authentication
Asymmetric Encryption
Answer:
symmetric encryption
Explanation:
Asymmetric encryption uses 2 keys.
which one of the following would not normally be found in an organization's information security policy?
Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.
When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.
However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.
Why is AES-256 encryption relevant?
Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.
AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.
Learn more about information security policy here:
https://brainly.com/question/14292882
#SPJ4
What percentage is considered an A+ (I am aware it varies based upon where you're from)?
hi! where im from (somewhere in the far southwest of the USA) a 96% or above is considered an A+
hope i helped!
Which of the following is NOT a Creative Commons license?
Commercial Use
Attribution
No Derivative
Share Alike
who invented napier bone and when
Answer:
Inventor : John Napier in Year 1617
Explanation:
He was also the inventor of logarithms (which was invented to aid calculation known as 'Napier's Bones' in 1617.
Answer:
John Napier in 1617
Explanation:
Napier bones is a calculating device consisting of a set of graduated rods, that is used for multiplication and division, and is based on logarithms.
n2care has one product, the medcottage, that is prefabricated and pre-equipped with medical equipment used by nursing homes. n2care is utilizing a(n) targeting strategy.
Based on the above, the n2care is utilizing a concentrated targeting strategy.
What is concentrated targeting strategy?The term Concentrated marketing is known to be a kind of a marketing strategy where the firm or a company is known to be based on one single target market group for all of their marketing goals or initiatives.
Note that Companies are said to make use concentrated marketing to tell more on how their products can be able to reach or meet the special needs of their niche audience.
Therefore, Based on the above, the n2care is utilizing a concentrated targeting strategy.
Learn more about targeting strategy from
https://brainly.com/question/17198359
#SPJ1
N2Care has one product, the MEDCottage, that is pre-fabricated and pre-equipped with medical equipment used by nursing homes. N2Care is utilizing a(n) _______ targeting strategy.
multisegment
undifferentiated
concentrated
mass marketing
What icon should you press in order to mute an audio track?
Lock
M
OS
O None of the above
Answer:
i believe its M
which statements accurately describe the features of Word that are used to create lists?
Answer:
1. The Tab key can be used to create a sublist
2. The Enter key can be used to add an item to a list
3. The numbering feature allows for the use of letters in a list
5. The Multilevel List features provides options for different levels in a list
3. A cube is made for 1 million cubic centimeters e What is the length of the side of the cube in centimeters?
The length of the side of the cube in centimeters will be 100 centimeters.
What is the Volume of a Cube?The volume of a cube is defined as the sum of all the cubic units that it takes up. A cube is a six-sided solid object in three dimensions. Simply put, volume is the entire amount of space that an object occupies. Something with a greater volume would require more space. The volume of a cube, the formula, and examples of solved situations will all be covered in greater detail in the portions that follow.
According to the question, the given value :
The volume of a cube, V=a³, where,
an is the length of the side.
V= 1 million cubic cm
1,000,000=a³
a=∛[tex]10^{6}[/tex]
a=100 centimeters.
Hence, the length of the side of the cube is 100 centimeters.
To get more information about the volume of the cube :
https://brainly.com/question/11168779
#SPJ1
what is another name for a man-in-the-middle attack
Answer:
Close to you or with malware
Explanation:
there i beleive
The image below shows an encoding for a black and white pixel image. The first two
bytes of the data (circled in red) are used to encode the width and height of the
image. What is the best term for this type of "data about the data"? Explain why it is
necessary to include this data in the encoding.
Answer:
where is the image i need the image
Explanation:
he users provide the following responses to the do you require membership in group1? access review question: user1: no user2: yes user3: did not answer which users will be members of group1 on 06/20/2022?
The users that will be members of Group1 on 08/20/2020 are User1, User2.
What is Group membership?Group membership is a term that is often use to connote a form of an association that exist with two or a lot of people. It can be primary and secondary.
Note that based on the scenario of the membership class, the The users that will be members of Group1 on 08/20/2020 are User1, User2.
Learn more about Group membership from
https://brainly.com/question/407954
#SPJ1
See full question below
You have an Azure Active Directory (Azure AD) tenant that contains a group named Group1 that has the follwoing users:
- User1 - Member
- User2 - Member
- User3 - Guest
User1 is an owner of Group1
You create an access review that has the following settings :
Review name : Review1
Start date : 07/15/2020
Frequency : One time
End date : 08/04/2020
Users to review : Members of a group
Scope : Everyone
Group : Group1
Reviewers : Members (self)
Auto apply results to resource : Disable
If reviewers don't respond : Remove access
The users provide the following responses to the Do you require membership in Group1? access review question :
User1 : No
User2 : Yes
User3 : did not answer
Which users will be members of Group1 on 08/20/2020?
User2 only
User1, User2
User2, User3
User1, user2, user3
you work for a bank interested in moving some of its operations to the cloud, but it is worried about security. you recently discovered an organization called cloudbank that was formed by 15 local banks as a way for them to build a secure cloud-based environment that can be accessed by the 15 member banks. which cloud model best describes the cloud created by cloudbank?
The cloud created by cloudbank:
1. Private cloud
2. Fiber_manual_record Public cloud
3. Fiber_manual_record Hybrid cloud
4. Check_circle Community cloud-yes
As banks handle enormous amounts of big data. Banks can store critical data on-premises using hybrid cloud technology while moving all other data with fewer security risks to the cloud. As a result, storing enormous volumes of data in physical data centres will become less expensive and complex.
Any resource that is made accessible to an end user across a network, most frequently the internet, is referred to in the cloud computing terms CAAS or Cloud Services. Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service are the three most popular cloud service resources (SaaS).
The adoption of cloud computing has been slower over time for a number of reasons, including lack of cloud business brokers, lack of mobility, lack of bandwidth, fear of losing control, security, privacy, and data protection.
Learn more about cloud:
https://brainly.com/question/19057393
#SPJ4
Question 1
The norms of appropriate responsible behavior regarding technology use is known as
O fair use
O technological citizenship
O digital citizenship
O ethics.
Answer:
The norms of appropriate responsible behavior regarding technology use is known as Digital Citizenship
Explanation:
Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.
Provide an example by creating a short story or explanation of an instance where availability would be broken.
Incomplete/Incorrect question:
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.
Explanation:
Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.
For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend
s without the consent of the celebrity.
ok i need help my xdox one is making speaking noises even when its turned off what can i do?
Explanation:
that shi fkn possessed sell that h.o
Fashion designers must:
A.
Meet deadlines
B.
Create a portfolio
C.
Build experience/reputation to raise their pay
D.
All of the above
Answer:
I think it is D. All of the above.