Compared with space operations specialists, intelligence officers are which of the following?
A.) less likely to perform on-the-job training
B.)more likely to participate in technical training
C.)less likely to obtain a bachelor’s degree
D.)more likely to work with highly classified information

Answers

Answer 1

Answer:

more involved in aligning communications systems

Explanation:

I think this should be it

Answer 2

Answer could be:

more likely to work with highly classified information

or

something before Z


Related Questions

disadvantages assembly level language for programming ​

Answers

It takes a lot of time and effort to write the code for the same. It is very complex and difficult to understand. The syntax is difficult to remember. It has a lack of portability of program between different computer architectures.

Hope that helps

Answer:

what are the question

Explanation:

please write full question step by step

Do you know the energy unit question?

Answers

Answer:

Fossil Fuels

Explanation:

What are the best legendary pokemon?

Answers

PICACHU PICACHUUUUUUUUUU

Answer:

Any EX

Any GX

Pikachu

Raichu

Mew Two

Charizard

Taurus

Gumshoos

Lurantis

Lapras

Incineroar

Dialga

Guzzlord

Lugia

Darkrai

Sigilyph

Xerneas

Explanation:

There are more but it takes a little while to get them all

Ryan has some kpis to help his fitness center archive the business goal of improving overall client satisfaction review these four kpis which do you think fit the criteria of being specific, measurable attainable relevant and time-bound

Answers

Answer: (C) A score of 85% or more in the annual survey for the question ‘Would you recommend this gym to a friend?’

(D) Ensure 90% of new gym members book an induction session within the first two weeks of joining

Explanation:

From the options that are given in the question, the kpis that fit the criteria of being specific, measurable attainable relevant and time-bound are options C and D that is,

• A score of 85% or more in the annual survey for the question ‘Would you recommend this gym to a friend?’

• Ensure 90% of new gym members book an induction session within the first two weeks of joining

the ISA standard buses are used to connect​

Answers

Answer:

The ISA standard buses are used to connect Hard disk and Processor

Hope this helps you. Do mark me as brainlist

write the steps to find the LCM of three numbers​

Answers

Answer:

First factor of three number ,then take common numbers between three factor ,then common ×remaining number ,hope you will find your answer

Which programming languages is best for game development? ​

Answers

Answer:

JavaScript. .

HTML 5.

SQL.

Python. .

Explanation:

hold it helps◕‿◕

If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient

Answers

Answer:

The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.

Explanation:

~Trivia~

Harry Potter Edition

Answer All Correct For Brainliest



What house does Harry Potter belong to in Hogwarts? __________________

What position does Harry Potter play in Quidditch? _____________________

Who is Fluffy? __________________

What does the Imperius Curse do? ___________

Answers

Answer:

What house does Harry Potter belong to in Hogwarts? Gryffindor __________________

What position does Harry Potter play in Quidditch? Seeker _____________________

Who is Fluffy? Hagrid's old cerberus __________________

What does the Imperius Curse do? ___________ places cursed under sorcer's control

Explanation:

I would like to thank SWANGOADRIANA for this answer and the ten points.

Case Study
Dr. Thomas Waggoner, an information systems professor at the local university,
is at the Will Call window at the Medallion Theatre, trying to pick up tickets he
had reserved. However, due to an oversight which turns out to be rather
frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner
and his wife, who are celebrating their wedding anniversary, the box office
manager finds two box seats which had not been claimed. In talking with the
box office manager, Dr. Waggoner starts thinking that he could perhaps help the
theatre avoid this type of problem in the future. His students could design and
build a system to help keep track of ticket sales, and hopefully help the theatre
become more efficient and improve customer satisfaction.
Q # 1 Write down the purpose of the given requirements HINT: purpose of a
system?
Q # 2 Write down the Modules and also extract the functional requirements of
the given requirements?
Q # 3 Create a use Case Diagram and Use cases of the above requirements?
Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE:
Write down the caption on each interface.

Answers

Answer:

1. Design system to avoid theatre tickets selling issue.

2. Resources provided to student who can built a system for the theatre tickets booking.

3. Medallion Theatre Booking System

Add/edit patron

Add/edit production

Add/edit performance

Add/edit seats

Purchase tickets

Generate Tickets Sold Report

4.GUI or graphical user interface allows the user to connect through graphical icons.

Explanation:

The main purpose is to avoid problems of duplicate tickets sales in future. The system will enable the selling of each seat to one customer only and when an attempt is made to resold the seat the system warns the user creating a check for original sale. This will help theatre to avoid any issues in future and customers will be happy with their ease of confirmation of booking.

Design a program named GradeDistribution.java that reads in 10 grades from the keyboard, then counts and displays grade distribution as follows:

Grade Range No.
[90 - 100] 2
[80 - 89] 5
[70 - 79] 1
[0 - 69] 1
Others 1

Answers

Answer:

[70 — 79]

Explanation:

Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicable in the Philippines scenario? Why? Give some of the pros and cons of remote sensing.​

Answers

Answer:

Remote sensing gives the soil moisture data and helps in determining the quantity of moisture in the soil and hence the type of crop that can be grown in the soil. ... Through remote sensing, farmers can tell where water resources are available for use over a given land and whether the resources are adequate.

Pulling out specific differences


Answers

Answer:

Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.

difference between general purpose register and segment register​

Answers

Explanation:

General purpose registers are the registers which you can use for data manipulation. They donot have specific purpose. ... If you put data in them the functionalities in the microcontroller or processor will change. For example, TMOD is a special purpose register

hope it helps you

Answer:

general purpose register are register which you can use for data manipulation. they do not have specific purpose to control program process and ccr (condition code register). to test condition

segment register

the segment register stores the starting addresses of a segment. and offset value or displacement is required

pls marks branilist i am new student in brainly.com


Question text
In a spreadsheet program, worksheets and documents are present in

Answers

Answer:

workbook

Explanation:

A workbook is a file that contains one or more worksheets to help you organize data.

Which of the following statements converts a String object named subtotalString to a double variable named subtotal?a.double subtotal = Double.toString(subtotalString);b.double subtotal = subtotalString.parseDouble;c.double subtotal = Double.parseDouble(subtotalString);d.double subtotal = (double) subtotalString

Answers

Answer:

double subtotal = Double.parseDouble(subtotalString);

Explanation:

Required

Determine which method converts string object to double variable

From the question;

The string object is: subtotalString

The double variable is: subtotal

From the given options (a) to (d), the option that answers the question is:

double subtotal = Double.parseDouble(subtotalString);

And it follows the syntax:

[datatype] [variable-name] = [Data-type].parse[Datatype]([string-variable])

Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.

Answers

Answer:

A. The mixture contains compounds with similar polarities but different solubilities.

Explanation:

Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.

Which options can be used for totaling numbers?

Answers

Which options can be used for totaling numbers?

Fill in the blank with the correct response.
The FTP client component of a full-featured HTML editor allows you to synchronize the entire

Answers

Answer:

File structure.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The file transfer protocol (FTP) client component of a full-featured HTML editor allows you to synchronize the entire file structure. Therefore, when you wish to share your entire html document over a network server such as a FTP client, you should use a full-featured HTML editor.

Case Study Dr. Thomas Waggoner, an information systems professor at the local university, is at the Will Call window at the Medallion Theatre, trying to pick up tickets he had reserved. However, due to an oversight which turns out to be rather frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner and his wife, who are celebrating their wedding anniversary, the box office manager finds two box seats which had not been claimed. In talking with the box office manager, Dr. Waggoner starts thinking that he could perhaps help the theatre avoid this type of problem in the future. His students could design and build a system to help keep track of ticket sales, and hopefully help the theatre become more efficient and improve customer satisfaction. Q # 1 Write down the purpose of the given requirements HINT: purpose of a system? Q # 2 Write down the Modules and also extract the functional requirements of the given requirements? Q # 3 Create a use Case Diagram and Use cases of the above requirements? Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE: Write down the caption on each interface.

Answers

Answer:

1. The primary purpose of a system is system development, analysis and design to avoid inappropriate and duplicate selling of theatre tickets.

2. The function requirements are development of a system which automatically reserves the ticket when a person books it and marks it appear booked for all the customers.

3. The customers can book the ticket through online system. The system then marks the ticket as unavailable for all the other customers until and unless the original customers cancels the ticket.

Explanation:

Dr. Waggoner had an issue with ticket booking as his booking was sold to another customer. This could lead him to a bad experience at theatre but since the box office manager assisted him with another available seats. This issue has been resolved with good faith but there can be problems in future where many customers can claim a single seat. To avoid this the theatre should introduce online booking system based on computer application which can be accessed by all the customers through website.

In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

5 bits

Explanation:

ue82ijevw8ey जभछतड।णृबदजठणब

1.2.6: Anonymity Reflection

1) What are some reasons a person might choose to remain anonymous on the Internet?

2) What are some harmful outcomes that stem from Internet anonymity?

3) Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.

2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.

3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity

There are several reasons why a person might choose to remain anonymous on the internet, including: privacy, security, Whistleblowing, etc.

What is Internet anonymity?

Internet anonymity is the capacity of a person to remain unidentified and anonymous online, generally through concealing or obfuscating their real identity.

A person could decide to remain anonymous on the internet for a number of reasons, such as:

Concerns about privacy: People might prefer to keep their internet activities or personal information hidden, especially if they are discussing sensitive or divisive viewpoints.Safety worries: Some people could feel unsafe or vulnerable if they reveal their identify online, especially if they have previously been the target of abuse or threats.Whistleblowing: In order to protect themselves from retaliation, those who seek to bring attention to wrongdoing or unlawful activity may decide to remain anonymous.

Internet anonymity can have a number of negative effects, such as:

Online bullying and harassment.Misinformation and hate speech propagation.Absence of responsibility.

Some contend that anonymity is an essential part of free speech and expression and that people should have the freedom to share their thoughts without worrying about being judged or subjected to retaliation.

Thus, these are some harmful outcomes that stem from Internet anonymity.

For more details regarding internet anonymity, visit:

https://brainly.com/question/13264093

#SPJ2

Convert Dec 185 to Binary Byte
Bit Position
8
7
6
5
4
3
2
1
Bit State
O or 1
Bit state
Value
128
64
32
16
00
4.
2
1
Bit Position
Value
Convert Dec 252 to Binary Byte.
Bit Position
8
7
6
5
4
3
2
1
Bit State
O or 1
Bit state
Value
128
64
32
16
8
4
2.
1
Bit Position
Value

Answers

Answer:

185 = 1011 1001

252 = 1111 1100

Explanation:

If you add the decimal values corresponding to the bit positions that are 1, you get your decimal number.

used emails to mount a visious attack on a supervisor​

Answers

Answer:

I cannot answer this question, It's more of a statement.

Explanation:

But yes email attachments can be used to mount attacks where it be bugs or viruses.

Is the ability to choose the start and finish times, but they must complete a full day’s work

Answers

yes ma’am , can of spam. what she said up there ^*

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using
CRC with generator polynomial X 4 +X+1.
Determine the entire message that would be transmitted. Show all your work. Also show how receiver will check and confirm that there is no transmission error.

Answers

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

[tex]= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 + 1*x^0[/tex]

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

10011║1110100000║111

          10011              

           1 1 100

          1 0011              

              1 1 1 1 0

             1 001 1                  

                1 1 0 1 0

                1 0 01 1              

                  1 0 010

                 1 0 01 1              

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                                           0 0 1 0

                                           [tex]1 \ 1 \ 1 \ 0 \ 1 \ 0 \ 0 \ 0 \ 1 \ 0[/tex]

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

          10011              

           1 1 100

          1 0011              

              1 1 1 1 0

             1 001 1                  

                1 1 0 1 0

                1 0 01 1              

                  1 0 010

                 1 0 01 1              

                     00000     → Remainder

Hence, the received message is correct.

write the html to place an image called prime logo.gif on a web page. The image is 100 pixel high by 65- pixel wide

Answers

Answer:

Um, HOW??????????????¿??

if your audience seems confused about a previous slide, in presenter view, whats the best way to jump back to a previous point in the presentation

Answers

Answer:

You can go back to that point towards the end of the presentation  or find where it would link later on in the presentation. Then you can ask if there are any questions and if the audience are willing to ask them you can go ahead and explain it.

Explanation:

Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)

Answers

I don’t understand your question could you explain it better ?


Change the following sentences using 'used to
a. We went to school together.
b. How did you spend the winter evenings?
c. We had our milk delivered.
d. I was in love with him.
e. At one time there were trees in the garden.

Answers

Answer:

a. We used to go to school together.

b. How did you use to spend the winter evenings?

c. We used to have our milk delivered.

d. I used to be in love with him.

e. At one time there used to be trees in the garden.

Other Questions
Overall, the main problem with the Articles of Confederation is that it leftthe U.S. Federal Government veryand the States with all the What are the advantages and disadvantages of Media Convergence? Which phrase best completes the diagram? Shereena made the following table she cant decide if its arithmetic or geometric sequence look at the picture bellow and answer the two questions pleaseeeeee Marcus bought 7/8 gallon of milk to make smoothies. On Monday he used 1/4 gallon to make a mango smoothie. On Tuesday, he used 1/2 gallon to make blueberry smoothie. How much milk does he have left? explain key components of sociology What led to the Glorious Revolution and what was the result? Log (x+1)=5Please help I need to finish this can you please show the steps why did this happen? The booster club needs to raise at least $8,000 for new football uniforms. So far, they have raised $1,270. Enter an inequality to find the average amounts each of the 97 members can raise to meet the club's objective. The inequality that represents the situation is Most people in the Aztec, Olmec, Inca, and Mayan tribes were ___________ Bob has a recipe for salad dressing. The recipe says to mix c lemon juice, c mustard, and cvinegar. How much lemon juice does he need to make 4 c of salad dressing? Show your work. Bonjour Y'all, I'm brain dead and I need help. I need some tips on staying motivated, because I need to get some work done anyway that's it, thank you :o) Estimate a 20% tip on a dinner bill of $131.58 by first rounding the bill amount to the nearest ten dollars. Explain the Compromise of 1850 & its effect on Texas? pls help due in 20 mins1. Usted una mentira. (decir)2. Yo una mentira tambin. (decir)3. Carmen y yo un poema de amor. (traducir)4. Mis amigos una fiesta. (dar)5. T msica bailable. (poner) Greece SPRITE project Florence Nightingale(1820-1910),British nurse and hospital reformer became internationally known as the founder of modern nursing. Nursing, which before her time was considered low-grade unskilled labor, became a respected profession because of her efforts. BorninFlorence,Italy, on May 12, 1820, Nightingale was raised mostly in Derbyshire, England, and received a thorough classical education from her father. From 1837 to 1839 she traveled with her parents in Europe, and the suffering she saw aroused an interest in nursing. She visited hospitals whenever possible. In 1849 she traveled in Italy, Greece, and Egypt, and in 1850 stopped in Germany to visit the hospital and school for deaconesses at Kaiserswerth, near Dsseldorf, Germany. Nightingalereturnedto England determined to study nursing despite the disapproval of her parents. The following year she studied for several months at the nursing institution at Kaiserswerth. In 1853 she became superintendent of the Hospital for Invalid Gentlewomen, a small private hospital in London.AftertheCrimean War broke out in 1854, Nightingale was stirred by newspaper reports about the primitive sanitation methods and grossly inadequate nursing facilities at the large British barracks-hospital at skdar (now part of stanbul, Turkey). She dispatched a letter to the British minister of war, volunteering her services in Crimea. At the same time, unaware of her action, the minister of war proposed that she assume direction of all nursing operations at the war front. Nightingalesetoutfor skdar accompanied by 38 Roman Catholic and Anglican sisters and lay nurses. They found that the military hospitals lacked supplies, the wounded soldiers were unwashed and filthy, and diseases such as typhus, cholera, and dysentery were rampant. Under Nightingales supervision, efficient nursing departments were established at skdar and later at Balaklava in Crimea. Through her tireless efforts the death rate among the sick and the wounded was greatly reduced. Nightingale became a national hero and was called the Lady with the Lamp and the Angel of the Crimea. Although Nightingale contracted a severe illness in the Crimea in 1855, she stayed with her hospital until the end of the war in 1856. ReturningtoEnglandwhen the war was over, Nightingale immediately began to reorganize the army medical service. She helped hospitals acquire proper ventilation and drainage systems and select competent, properly trained orderlies. She also introduced meticulous hospital record keeping and had an army medical school established. With a public fund raised in tribute to her services in the Crimea, Nightingale founded the Nightingale School and Home for Nurses at Saint Thomass Hospital in London. The opening of this school marked the beginning of professional education in nursing.FlorenceNightingales contributions to the evolution of nursing as a profession were invaluable. Before she undertook her reforms, nurses were largely untrained personnel who considered their job a menial chore; through her efforts the stature of nursing was raised to a medical profession with high standards of education and important responsibilities. The graduates of her school soon started nursing schools in other hospitals, and the movement for training nurses spread rapidly. Her advice was continually sought, not only on nursing matters, but also on hospital construction and management and on every aspect of public health. Nightingalereceivedmany honors from foreign governments and in 1907 became the first woman to receive the British Order of Merit. She died in London on August 13, 1910. In 1915 the Crimean Monument in Waterloo Place, London, was erected in her honor. Her writings include Notes on Nursing (1860), the first textbook for nurses, which was translated into many languages. Among her other writings are Notes on Hospitals (1859) and Notes on Nursing for the Labouring Classes (1861)#Answer the following questions based on the information in the passage.1,Which of the following is not true about Florence Nightingale?A,Is an internationally recognized founder of nursing B,was a British nurseC,made the profession nursing respected through her effortsD,considered nursing low-grade unskilled laborE,A and B are answers g Suppose that a large mixing tank initially holds 500 gallons of water in which 50 pounds of salt have been dissolved. Another brine solution is pumped into the tank at a rate of 3 gal/min, and when the solution is well stirred, it is then pumped out at a slower rate of 2 gal/min. If the concentration of the solution entering is 2 lb/gal, determine a differential equation (in lb/min) for the amount of salt A(t) (in lb) in the tank at time t > 0. (Use A for A(t).) 5 x 1 2 Give your answer as a fraction in its simplest form