what is draft pls help me​

Answers

Answer 1

Answer:

draft like as a rough draft it pretty much a set were you can play and the do the real thing

Answer 2
Drafting refers to actually writing the words of the paper. As part of the writing process, you will write multiple drafts of your paper. Each rough draft improves upon the previous one. The final draft is simply the last draft that you submit.

Related Questions

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

What is Acronyms in Design and Technology?

Answers

Answer:

In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.In an increasingly technological and complex world, it is important students develop knowledge and confidence to critically analyse and respond creatively to design challenges.In the design and technologies curriculum, students create quality designed solutions across a range of technologies contexts. Students consider the economic, environmental and social impacts of technological change and how the choice and use of technologies may contribute to a sustainable future.Students also take into account the ethical, legal, aesthetic and functional factors that inform the design processes.

Explanation:

Hope its help

If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a ________.quillet

Answers

Personal Area Network

If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a Personal Area Network.

What is meant by personal area network?

An individual's workspace can be connected with electronic devices via a personal area network. Between devices like PCs, smartphones, tablets, and PDAs, a PAN enables data transmission.

A PAN is an interconnection of personal technology devices that allows them to communicate over a small distance (less than 10 meters or 33 feet), often using wireless technologies.

Short-range wireless networks with a range of a few tens of meters are known as personal area networks (PANs). PAN's primary function is to do away with cords that link devices to peripherals. PAN technologies often use radio or infrared for cordless items like keyboards and mice.

To learn more about personal area network refer to:

https://brainly.com/question/14704303

#SPJ2

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity

Answers

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

code hs spell it out 7.2.6

Answers

what do you mean can you say it more clear?

The programming question requires that we write a function that takes a string and returns every character in it but the first character.

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def end_of_word(myStr):

   #This returns every character in the string except the first

   return myStr[1:]

Read more about Python functions at:

https://brainly.com/question/13795586

Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.

Answers

A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.

A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, the different types of server include:

Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb server

A typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.

Read more: https://brainly.com/question/21078428

What is voice recognition system ?​

Answers

Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

Explanation:

Answer:

Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.

MyPlate was created to __________. A. To encourage Americans to eat the same quantity of food across the different food groups B. To be a visual tool for understanding a healthy diet C. To help Americans measure the amount of fat in their bodies D. To provide a reference for evaluating different types of cuisine Please select the best answer from the choices provided. A B C D.

Answers

Answer:

B

Explanation:

MyPlate was created to be a visual tool for understanding a healthy diet.

        -> MyPlate image is attached

A. To encourage Americans to eat the same quantity of food across the different food groups

   This is incorrect, MyPlate does not show the same amount of quantity for each food group.

B. To be a visual tool for understanding a healthy diet

   This is correct, MyPlate was created to be a visual guide of what a healthy diet might look like.

C. To help Americans measure the amount of fat in their bodies

   This is incorrect, MyPlate has nothing to do with body measurement.

D. To provide a reference for evaluating different types of cuisine

   This is incorrect, MyPlate had nothing to do with evaluating different types of food.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Answer:

the correct answer is b

Explanation:

edge 2022

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

In what way can the data be visualized to get the answer that is required?

Answers

Answer:

Data visualization is the graphical representation of information and data. By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns in data.

In the world of Big Data, data visualization tools and technologies are essential to analyze massive amounts of information and make data-driven decisions.

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.

Answers

Answer: change the food he eats to a comfort food so that he eats more

Answer:

The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.

Explanation:

This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.stages and version (s) of the artwork can be _____ filed and easily 5. work can be transferred or _____ on almost any 6. work can be _____ and easily _____ to interested parties​

Answers

Answer:

1) corrected

2) organized

3) Fade and worn-out

4) saved

5) saved

6) organized and graphics

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

What security feature on a smartphone prevents the device from being used until a passcode is entered?

Answers

Answer:

Lock Screen

Explanation:

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

Other Questions
births that take place prior to ________ weeks of gestation are considered to be preterm births. cellus If investments double every 7 years and you start with a $600 investment, how much money would you have after 21 years? A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us A survey was given to people who own a certain type of car. What percent of the people surveyed were completely satisfied with the car? Grant plans to evaporate enough water from 22 gallons of a 16% ammonia solution to make a 24% ammonia solution. Which equation can he use to find n, the number of gallons of water he should remove? 3. 52 (22 minus n) = 0. 24 StartFraction 22 minus n Over 3. 52 EndFraction = StartFraction 24 Over 100 EndFraction StartFraction 3. 52 Over 22 minus n EndFraction = StartFraction 24 Over 100 EndFraction 3. 52 (22 minus n) = 0. 24. What is the characteristics and function of Batik? 1 Type the correct answer in the box. Use a comma to separate the x-and y-coordinates of each pointThe coordinates of the point on the unit circle that corresponds to an angle of 0 are ( ) The coordinates of the point on the unit circle that corresponds to an angle of 90 are does it ever make sense to buy a bond that pays a negative interest rate, as the inflation-protected bond does? Choose the term that describes the type of sentence shown.The Cause Club, which is a community service group, is holding a dance.A)simpleB)compoundC)complexD)compound-complex A decrease in accounts receivable will result in a(n) ___ in cash from sales revenue when using the direct method to determine cash flows from operations. mention any 2effect of drug substance The value of y is directly proportional to the value of x.If y = 12 when x = 15, what is the value of x when y = 40?A.12B. 32C.43D.50 13456NQuestion 1Which country is identified as the number 12?12 Which descriptions offer examples of Planning workers? Check all that apply.Isabel travels to foreign countries to build relationships with political officials.Mai creates recommendations for how to use land, buildings, and structures.Lamar writes and analyzes laws.Francisco creates reports to help a community decide which land to make into parks.Matthew interviews members of the community to find out which public buildings and parks they use most often.Ruth analyzes property to determine how much money it is worth. *1. The internal energy with a system associated with the motion of particles and that can be added to a substance is called_____.A. Thermal energy B. Electrostatic forcesC. Temperature D. Kinetic energy *2. Which statement describes the effect of adding more energy to a system, assuming a phase change does not occur?A. The particles within the system will have greater motion, and the temperature will decrease.B. The particles within the system will have greater motion, and the temperature will increase.C. The particles within the system will have less motion, and the temperature will increase.D. The particles within the system will have less motion, and the temperature will decrease.*3. Which statement correctly describes how attractions that hold particles break?A. Attractions due to electrostatic forces. When particles have low enough energy, these forces can no longer keep particles together.B. Attractions due to gravitational forces. When particles have low enough energy, these forces can no longer keep particles together.C. Attractions due to gravitational forces. When particles move fast enough, these forces can no longer keep particles together.D. Attractions due to electrostatic forces. When particles move fast enough, these forces can no longer keep particles together.*4. Which statement explains why a rubber band analogy is not a perfect comparison for bonds in a substance when considering phase changes? A. For a phase change from liquid to gas, the bonds break completely and particles can move independently of each other. B. For a phase change from liquid to gas, the bonds do not break completely and the particles can still slide past each other.C. For a phase change from solid to liquid, the bonds break completely and particles can move independently of each other.D. For a phase change from solid to liquid, the bonds do not break completely in the particles can still slide past each other.*5. The boiling point of benzene is 80C. Which pair of samples will have the same average kinetic energy as benzene molecules? A. Two samples of liquid benzene, one at 70C in the other at 80C.B. A sample of liquid benzene at 70C and a sample of gaseous benzene at 90C.C. Two samples of gaseous benzene, one at 80C in the other at 90C.D. A sample of liquid benzene at 80C and a sample of gaseous benzene at 80C. What is energy, what is power, and how are they related? Que is in attachment, ans with Explaination. if the carrying capacity for the north atlantic cod on the grand banks of newfoundland is 500,000 tons, when do you expect that the rate of population growth would be greatest? YT Video: Urban Migration For Young Chinese on the Rise I can't seem to find the answer in the video.My question: what are some major complaints from these migrants?i need the answer asap, thanks! TIME REMAININ59:55In general, a family can be defined as a group ofA individuals who live together and care for each otherB. individuals who share one car or vehicleC individuals who enjoy each other's companyPlease select the best answer from the choices provided. Mark this and returnSave and ExitNextSubmit