Complete the statement using the correct term.
People employed in digital media sales may have an educational background in IT or in
.

Answers

Answer 1

Answer:

Your answer would be down bellow :D

Explanation:

People employed in digital media sales may have an educational background in IT

So your answer is it.

Answer 2

Answer:

Hiya Tank hows it been

Explanation:

From Sean, pizza,P, pizzaboy, and your friend


Related Questions

What Is an Antivirus?

Answers

Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.

Answer:

Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.

Explanation:

4.16 LAB: Count characters Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's

Answers

Answer:

In Python:

sttr = input("String: ")

ch = input("Character: ")

count = sttr.count(ch)

print(str(count)+" "+ch, end = '')

if count>1 or count==0:

   print("'s")

Explanation:

This prompts the user for string

sttr = input("String: ")

This prompts the user for character

ch = input("Character: ")

This counts the number of occurrence

count = sttr.count(ch)

This prints the number of occurrence of the character

print(str(count)+" "+ch, end = '')

This checks if the number of occurrence is 0 or greater than 1.

if count>1 or count==0:

If yes, it prints 's

   print("'s")

write asswmbly prgram and do the following:
You have two numbers, the first one is 32 bits and the second is a 16 bits number. Find the result of division and store it in memory location called RESULT then store the reminder of division in memory location called MOD. (Use MACRO) ​

Answers

Answer:

I did this last year :/ i feel your pain.

Explanation:

What are to be considered before software installation? Why?​

Answers

Answer:

before software installation we should consider the following things:

1. Software must be virus free

2.Required components for software should be installed

3.Computer requirements must be little bit high required for that software

4.software musn't be corrupt

it is important organic mineral that is found in the soil as ash​

Answers

Answer:

Calcium is the most abundant element in wood ash and gives ash properties similar to agricultural lime. Ash is also a good source of potassium, phosphorus, and magnesium.

Huh this is very confusing

What are the disadvantages of using folders ​

Answers

Answer:

√ folders can cause some inconvenience situation...

√ The decompress / compress action takes time.

√ When you double-click on a file inside a “folder”, what really happens is the file gets extracted to a temporary folder.

heres one:

when you delete a folder, he stuff inside gets deleted, and there isnt a way to get it back.

What was the Internet was built off ot?
A) IPv6
B) CIDR
C) NAT
D) IPv4

Answers

Answer:

The internet was built around IPv4.

Directions Interview your parent or any member of your family. Identity
v. Performance Tasks
sources of your family income. Classify the types of your family
income if it is Money Income, Real Oncome or Psychic income​

Answers

Answer:

Total family income is first classified by it's four major source, earings of a male head , earings of a wife or female head , earings of a family members , and property or transfer income.

You are asked to design a data model for The Wagging Tail, an online store that sells products for dogs, e.g. dog collars, dog food, dog toys, dog treats, etc. You want to keep track of three entities: (1) the products that the store sells, (2) customers who purchase the products, and (3) the orders that are made on the website.
Draw an ERD diagram and use the following information to help guide your drawing:
The database should keep track of all products that the store offers for sale
The database should keep track of all customers who have registered with the store website
The database should keep track of all orders placed on the website
At most only a single customer can be related to any single order
A customer can place multiple orders with the website Each entity must have a unique identifier within its table. This is the Entity's/table's Primary Key.
An order must consist of at least one product, and may consist of multiple products
You wish to keep track of the cost of the product to the store, and the price that the store sells a product to the customer
You wish to be able to contact customers via phone and email
You wish to be able to determine when is the busiest time of year for your website according to number of orders placed
Your drawing should include the following: 1. The entities you wish to model 2. The required/important attributes for each entity (refer to these instructions for guidance on what is required/important) 3. The relationships between the entities 4. The correct MAX and MIN Cardinalities for each relationship (remember for each relationship, or line, there are MAX/MIN cardinalities on each side of the relationship)

Answers

Answer:

The solution to this question can be defined as follows:

Explanation:

In this question the Primary Key as defined in the underlines that use the Crow's foot notation which is defined in the 3 entities that can be defined in the attachment file:

What is a Web server application?
A.An application that receives information, provided by an end user on a user-input form, from a Web server or a database server.
B.An application that is used to make Webpages interactive
C.An application that stores and processes the information provided by an end user on a user-input form
D.An application that authoritatively confirms the identity of a person, host or organization

Answers

Answer:

I prefer to go for the answer D

If a program has no syntax errors, can we assume that it is secure? Why or why not?

Answers

Answer:

We cannot say it is secure until it has gone through security testing.

Explanation:

Syntax errors are caused by errors that occur in the source code. Some of these errors are caused by spellings and punctuation. If the code does not follow the syntax of the programming language that it is being written, it would likely display a syntax error.

A program is secure only when it has gone through security testing and found to be protected from vulnerabilities and attacks.

// The QuickCopy company currently makes 100,000 copies per year// at 15 cents each.// They expect to increase the number of copies produced// by 4 percent per year each year for the next 10 years,// starting with this year.// They also expect the price of each copy to increase// by 3 cents per year, starting with this year.// This program displays the company's expected// income for each of the next 10 years.// Modify it to be more efficient.startDeclarationsnum year = 1num copies = 100000num price = 0.15num total = 0num COPIES_INCREASE = 0.04num PRICE_INCREASE = 0.03copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalyear = year + 1copies = copies + copies * COPIES_INCREASEprice = price + price * PRICE_INCREASEtotal = total + copies * priceoutput year, totalstop

Answers

Answer:

See Explanation

Explanation:

Required

Modify the program

To modify the program, we simply make use of an iterative statement.

To do this, I'll make use of a do while loop.

So, we have:

Declarations

num year = 1

num copies = 100000

num price = 0.15

num total = 0

num COPIES_INCREASE = 0.04

num PRICE_INCREASE = 0.03

do:

copies = copies + copies * COPIES_INCREASE

price = price + price * PRICE_INCREASE

total = total + copies * price

output year, total

year = year + 1

while year<=10

The above do while loop enables the program to repeat the statements in the following block:

do:

----

---------

---

-

while year <=10

The loop calculates the copies & price in each year and also updates the values of the variables; so that they can be used for the nexr iteration

3.5 code practice question 1

Answers

Answer:

what is this a question or just saying something?

Explanation:

Answer:

uh what?

Explanation:

why use a chart legend?

Answers

Answer:

A legend or key helps the user build the necessary associations to make sense of the chart.

Explanation:

Legends summarize the distinguishing visual properties such as colors or texture used in the visualization.

What is the action take to the input called?

Answers

Answer:

Control types created with INPUT; Examples of forms containing INPUT controls ... The scope of the name attribute for a control within a FORM element is the FORM element. ... Applications should use the id attribute to identify elements. ... The program that will handle the completed and submitted form (the action attribute).

Explanation:

Please help ASAP!
Combined with a set number of steps to determine size, what number of degrees would you use for turn degrees to command a sprite to trace a triangle with three equal sides?

A. 90, 90

B. 45, 45

C. 90, 180

D. 120, 120

Answers

Answer:

GIVE this man Brainliest!

Explanation:

Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.

Answers

Answer:

x1 = input("enter x value of first number: ")

y1 = input("enter y value of first number: ")

x2 = input("enter x value of second number: ")

y2 = input("enter y value of second number: ")

ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2

ans = pow(ans, 0.5)

print(ans)

how can u spot fake news through camerawork, audio, and lighting? pls answer asap

Answers

Answer:

Fake news usually would involve heavy editing of the audio and visuals so that what people can see or hear will fit the lies being sold.

Explanation:

With respect to Videos, fake news would usually have very subtle and intelligent cuts and joints such that when pieced together, a speech for instance would contain only the words which fit the fake news. Also. the context would usually be omitted and you'd seldom find a whole unedited video supporting fake news.

With regards to the audio, authentic sources, in most cases, usually, start a recorded audio with their signature jingle. Fake news won't.

Pictures that have been doctored to suit fake news are usually characterized by their low quality, grainy and blurry feel.

It is important to point out, however, that with advances in technology, fake news' are begining to lose most of the qualities listed above.

Cheers

3. Create tables CheckingAccount(CheckingAccountNumber, CustomerName, Balance, CustomerID), SavingsAccount(SavingsAccountNumber, CustomerName, Balance, InterestRate, CustomerID), Transactions(TransactionNumber, TransactionAmount, TransactionType, TransactionTime, TransactionDate, FromAccount, ToAccount, CustomerID). Use varchar(50) for any non-numerical value including AccountNumber and TransactionNumber, and float for any numerical value. CustomerID here means Username.

Answers

Answer:

Your answer is B

She forgot to record a transaction.

Explanation:

Edge 20 it’s right

Which function will display 6 as the output in the following formula?
C1*(C2+B1)
where C1 is 6, C2 is 2, and B1 is 4
_________

Answers

Answer:

36

Explanation:

hi add creeper_king101 i need views on snap

Answer: i just did the pretest and the answer was 36 no cap

Explanation:

Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Leading 0's are not allowed except when the integer part is 0. When the binary points is present, then neither the integer part nor the fractional part are allowed to be empty. If the integer part has more than 3 bits, then grouping with commas is required. Examples: Allowed: -0 1,111,010 -1,111.00 Not allowed: .11 1000 The 4-letter alphabet consists of 0, 1, dot, and comma.

Answers

Solution :

We have to provide an expression for the binary numbers. There can be binary fractions or integers. Whenever there is leading 0, it is not allowed unless the integer part is a 0.

Thus the expression is :

[tex]$(-+ \in )$[/tex] [tex]$[(1+10+11+100+101+110+111)(,000+,001+,010+,011+,111+,100+,101+,110)^*$[/tex] [tex]$(\in +.(0+1)^*(0+1))+(0.(0+1)^*(0+1))]$[/tex]

In this exercise we have to have knowledge about binary code to calculate with these numbers, so we have:

[tex](E+(0+1)*(0+1))[/tex]

What is a binary code?

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often "0" and "1" from the binary number system.

Knowing this now we can perform the calculations like:

[tex](1+10+11+100+101+110+111)(000+001+010+011+111+100+101+110)\\(E+(0+1)*(0+1))[/tex]

See more about binary code at brainly.com/question/7960132

Your goals as the IT architect and IT security specialist are to:  Develop solutions to the issues that the specified location of IDI is facing.  Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.  Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.  Analyze the strengths and weaknesses in the current systems of IDI.  Address remote user and Web site user’s secure access requirements.  Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.  Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.  Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.  Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Answers


Te chequen casa para ver en su mouse hombre de doble


Answer the following questions:

Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging


Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above


Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode


Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above


Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands


Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above


Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above


Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)


Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes


Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester


Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above


Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender


Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above


Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways


Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM


Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode


Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.



Answers

Explanation:

4) Seperating

5) All the above

6) Interface configuration mode

7) None of the above

8)Configure the negotiate disable interface subcommand

9) B8ZS

10) Synchronous

11) a and b

2) Discrete

3) B8ZS and HDB3

4) Line coding

5) It drops the frame

6) Data link

7) 2 ways

8) NVRAM

9) User mode-Enable mode

20) The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model-

The TCP/IP model has four layers , while the OSI model has seven layers.

Describing Lawyer Tasks
According to the video, which tasks do Lawyers commonly perform? Check all that apply.
O drawing up legal documents
guarding prisoners
O inspecting facilities for safety
trying cases in courts of law
O arresting criminals
counseling clients

Answers

Answer:

Explanation:

The answers are a, d, and f

Answer:

A, D ,F G

Explanation:

How many components of a computer? ​

Answers

Answer:

There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices. Are devices used for entering data or instructions to the central processing unit.

Explanation:

NO THIS ISNT ANY HOMEWORK!

Does anyone know a laptop under $200 that can run Minecraft Java edition and maybe 60fps?


PLEASE NAME A SPECIFIC ONE not to be rude but please don’t waste my time!



Sorry if I’m asking for too much we’re gonna travel soon and it’s gonna be for long months and I can’t bring my entire set up but I also don’t have much money and I can’t find any laptop like that so if you can help? Thank you!

Answers

Answer:

Name CPU, GPU & RAM My Rating (Out of 10)

HP Pavilion 15 Intel Core i7-8565U Nvidia MX 250 16GB 8.1

Asus VivoBook S15 Intel Core i5-8265U Nvidia MX250 8GB 7.8

Dell Inspiron 15 Intel Core i5-8250U Intel HD Graphics 16GB 7.6

Acer Aspire 5 Intel Core i5-8265U Nvidia MX250 8GB 7.5

Explanation:

I dont know the prices, I just searched it, though I will look into it more

Answer:

dont know the price but my mom bought me a macbook pro 13 inch and it works great !

Explanation:

edit: oop lol its like 1200 dollars

Create a list called numbers containing the values from 1 through 15, then use slices to perform the following operations consecutively: a. Select number’s even integers. b. Replace the elements at indices 5 through 9 with 0s, then show the resulting list. c. Keep only the first five elements, then show the resulting list. d. Delete all the remaining elements by assigning to a slice. Show the resulting list.

Answers

Answer:

Kindly check explanation

Explanation:

From python :

List containing values from 1 through 15:

my_list = list(range(1,16))

#creates a list of values from 1 to 15,(16 is excluded)

B.) select even integers :

for digits in my_list :

if digit%2 == 0;

print(digit)

# prints numbers in the list which does not leave a remainder when divided by .

C.)

for digits in my_list[4,9]:

my_digit[digits] = 0

my_digits

#Replaces the elements at indices 5 through 9 with 0s, then show the resulting list.

D.)

my_digits[:5]

#selects digits with index 0 up to 4

E.)

del my_digits[:5]

#DELETE elements in my digits starting from the fifth index

Write a program which asks the user for their name and age. The program should then print a sentence.

What is your name?
Cory
What is your age?
48
Cory is 48 years old.

Answers

Answer:

name = input("What is your name? ")

age = int(input("What is your age? "))

print("%s is %d years old."% (name, age))

Explanation:

This is a solution in python.

A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?

Answers

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

What sequence is used to create a brochure document from a template?
New, File, Brochures
File, New, Brochures
O Brochures, File, New
O Brochures, New, File

Answers

Answer:

I think its a or b

Explanation:

Sorry if I'm wrong

Answer:

The answer is B. File, New, Brochures

Explanation:

PLZ PLZ PLZ GIVE ME BRAINLIEST!!!!

Other Questions
A food development company is interested in making on-the-go powder-based snacks in which consumers can "just add water" before eating. During market tests there are complaints that the powder does not dissolve well in water.If you were a food scientist, how might you modify the formula so that it will more easily dissolve in water? Provide your answer in 1-2 complete sentences. (Click at the picture) A summer camp wants to buy 2,944 popsicles. If there are 8 popsicles in each box, how many boxes should the camp buy? Which best describes the error in finding the simple interest earned on $500 at 6% for 18 months? They did not convert $500 to cents. They did not multiply in the correct order. They did not place the decimal in the answer correctly. They did not convert 18 months to years. Question 2 Correct the error. The simple interest earned equals $ . What is the area of one trapezoidal face of the figure A car is driving down a road at a normal speed of 50 miles per hour. It enters a hilly area of gradual incline and decline, where it must drive 50 miles up hill and then 50 miles downhill. If this 100 mile section of road takes 2.6 hours to traverse instead of the expected 2 hours (the time it would take if the road was completely flat) determine the speed that the hills add or subtract when going over. (I will give Brainliest and 100 points!!!)James bought 4 tubes of paint to use for an art project. He paid the same amount for each tube, and he spent less than $20 in all. Solve for the cost of tube of paint.(You have to write it with inequalities, not an equal sign.)Joseph must sell more than 20 ice cream cones in order to make a profit. He has already sold 6 cones. How many cones must Joseph still sell? (You have to write it in inequalities, not an equal sign. For example, NOT 2=25, but like THIS: 2 10. Imagine that the unknown solution contains aqueous ammonium sulfate, which is commonly used in fertilizer. For the precipitation of barium sulfate after mixing aqueous ammonium sulfate solution and barium chloride solution (the reactants), write the (1) balanced molecular equation, (2) the complete ionic equation, (3) the net ionic equation AND identify the spectator ions, if any. what are the answers for these and the coordinates in Texas v. White, the Court had that secession was? (PLEASE HELP)A) illegal B) the final act of sovereignty C) permissible under the partly national/party federal idea D)allowed only when the other states agree to it HELP PLEASEEEEEEEEEEEEEEEEE 5. Practice: Fill in the two processes that cause each of the following transitions.A. Ocean -> CloudB. Cloud Glacier Prepare an amortization schedule for a three-year loan of $114,000. The interest rate is 11 percent per year, and the loan calls for equal annual payments. How much total interest is paid over the life of the loan? Write the equation of the line that passes through the points (1,6) and (3, -4) A. y = -5x + 11B. y = x - 11C. y = 5x +3D. y = 2x -3 simplify the expression (n^4)^8 Given square ABCD. Two isosceles triangles ABP and BCQ are constructed with basesABand BC. Each of these triangles has vertex angle of 80. Point P lies in the interior of the square, while point Q lies outside of the square. Find the angle measure between PQand BC I WILL MARK BRAINLIEST Find the total price of a $13.99 movie after a sales tax of 8% is added. what is the total amount * SHOW WORK What volume of 9.0 M copper (II) sulfate stock solution is needed to prepare 3.0 L of a 5.0 M solution? PLS HELP ME :(( what is the initial value of all linear functions that show a proportional relationship? 1/4 of 24 is 6, so 3/4 or 24 =