compare shopping centre and open -air market​

Answers

Answer 1

Answer:

The similarities between a shopping center and an open-air market are;

1. Goods are bought and sold in both a shopping center and an open-air market

2. The stores within the location have different owners

3. Buyers can move between stores for transactions

The differences between a shopping center and an open-air market are;

1) The shopping center is usually roofed, while an open-air market is usually located outdoors

2) The stores in a shopping center more often have a checkout point, while stores in an open-air market rarely make use of a checkout

3) Items found with a defect after purchase can usually be returned for a replacement in a shopping center, while it is necessary to check an item well when buying from an open-air market as returning such items is usually difficult

Explanation:

A shopping center is a complex or area that have several shop groups built together which can all be located under a roof

Professional offices, restaurants, banks, theaters, and pharmacy's  can also be located in a shopping center

Open-air market is a place in the public used for the sale of food and merchandise


Related Questions

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

what is the behavior of an element with static positioning in regard to the page layout?

Answers

Answer:

The element is positioned according to the normal flow of the document.

The top, right, bottom, left, and z-index properties have no effect. This is the default value.

The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.

What does Static positioning implies?

Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."

Hence,  the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.

Learn more about page layout from

https://brainly.com/question/988590

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Answers

Answer: Windows Configuration Designer (WCD)

Explanation:

The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).

Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

who invented the Bluetooth device​

Answers

Answer:

The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.

Explanation:

according to this website www.androidauthority.com/history-bluetooth-explained-846345/

Answer:

alexander - edg 2022

Explanation:

Match each code snippet to its appropriate markup language name

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

Other Questions
PLSSSSSS ANSWERRead the following lines from "Vincent van Gogh: Portrait of an Artist."Every Sunday on his way to church, young Vincent would pass the headstone carved with the name he shared. Did he feel as if his dead brother were the rightful Vincent, the one who would remain perfect in his parents' hearts, and that he was merely an unsatisfactory replacement? That might have been one of the reasons he spent so much of his life feeling like a lonely outsider, as if he didn't fit anywhere in the world.Why would the author share this in the very beginning?The information is sensationalistic and will grab the attention of modern readers.This information should be considered as the reader learns about van Gogh throughout his life.Readers enjoy feeling sympathy for the characters they read about.The author wanted to find a way for readers to like Vincent. Atoms are the most basic unit of matter. Two or more atoms from the same or different elements can combine to form molecules.Cells are the most basic unit of life. Cells are made up of many different types of molecules. Which of the following accurately shows higher levels of organization within organisms, from least complex to most complex? A. cells organs organ systems tissues organism B. cells tissues organs organ systems organism C. cells organ systems organs tissues organism D. cells organs tissues organ systems organismPLZ EXPLAIN WHY THE OTHER ANSWERS R INCORRECT List five general properties of organicCompound The revolution leading to the collapse of the Romanov dynasty contributed to the withdrawal of which country from World War I The graph shows the number of employed workers in the United States in nonfarm jobs from 2008 to 2013.A line graph titled Number of Employed workers in nonfarm jobs, 2008 to 2013 shows years on the x axis from 2008 to 2013 and millions of employed workers on the y axis, from 100 to 120. Line starts at 116 in 2008, to 108 in 2009, 107 in 2010, 108 in 2011, 112 in 2012, 113 in 2013.What course of action might a government take to respond to the downturn revealed in this graph?reducing the size of its armed forceslaying off unnecessary workersdecrease taxes to increase consumers' money supplyencouraging people to travel overseas Sunland Co. uses the retail inventory method. The following information is available for the current year. Cost Retail Beginning inventory $ 318000 $494000 Purchases 1240000 1720000 Freight-in 23000 Employee discounts 8500 Net markups 66000 Net markdowns 86000 Sales revenue 1620000 If the ending inventory is to be valued at approximately lower of average cost or market, the calculation of the cost ratio should be based on cost and retail of Which technology employed a division of labor? What are the columns on the periodic table called?(2.5 Points) For the right triangles below, find the values of the side lengths h and b.Round your answers to the nearest tenth Use the verb with To ove without to1. You must... (go) to the doctor paragraph completion help please!! Which set shows a subset of the set of natural numbers?AB.C.{19, 22, 34, 56 ){16.9, 34.5, 67.2, 78.3}{0, 22, 43, 78)22.-1100)7D. HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!!!!!!!! plzzzzzzzzzzzzz helpppppppppppppp Which three of the following are examples of economic globalization? Who does Shakespeare want us to sympathize with? what is the difference between a loner and a outcast Find the volume of this cylinder.Round to the nearest tenth.16cm4 cm[?] cm3 People who were forced to live in ghettos were the:JewsGermansScandinaviansRussians Please someone help me ?!?!?