Evaluation-the making of a judgment about the amount, number, or value of something; assessment
Domain Name-Is a websites name (ex-Google)
Authoritativeness-The quality of possessing authority. The quality of trustworthiness and reliability.
Accuracy-the quality or state of being correct or precise
Timeliness-the fact or quality of being done or occurring at a favorable or useful time.
Objectivity-the quality of being objective.
Writing Style and Mechanics-Style has to do with how a piece of writing sounds. Everyone has a style which develops along with their writing.
Paragraph structure: Each paragraph should begin with a topic sentence that provides an overall understanding of the paragraph. ...
Sentence length: Sentences should be kept as short as possible so that their structure is simple and readable.
Graphics-are visual images or designs
Links- is an open source text and graphic web browser with a pull-down menu system.
Whoever answers FRIST and it has to be correct so if you don’t know don’t waste your time pls. Anyway whoever answer frist I will give you brainliest and some of my points Which type of photography would you use if you wanted to photograph a fly?
Answer:
I think Ariel photography
Explanation:
I’m not sure, but I think so
What is one reason why a business may want to move entirely online?
A. To limit the number of items in its inventory
OB. To double the number of employees
C. To focus on a global market
D. To avoid paying state and local taxes
Answer:
The correct answer is C. One reason why a business may want to move entirely online is to focus on a global market.
Explanation:
The fact that a business wishes to move entirely towards the online sales modality implies that there is a desire to expand the possibilities of selling its products beyond the physical place where it has its store.
It is a reality that starting an online business implies that the offered product can be purchased anywhere in the world, thanks to advances in technology and transportation that allow the product to be purchased and delivered in a matter of days, thanks to the advances produced by globalization.
Therefore, the fact that the store goes from physically to online selling makes its potential customers go from being the ones who know the store and live close to it to everyone in the world with access to internet.
what is a type of system software that allows a user to perform maintenance type tasks
Answer:
Computer
Explanation:
The type of system software that allows a user to perform maintenance-type tasks is a computer.
A computer has many programs and operating systems.
Which statement is true?
a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack.
b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls.
c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution.
d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.
Answer: D) When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.
Explanation:
You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign. You need to quickly send and receive professional messages that may contain text files and short media. These messages need to be accessible at any time of the day and in different time zones, and they should be able to reach all members (internal and external) relatively inexpensively. Which communication channel would best suit this purpose?
Answer:
You Need To Quickly Send And Receive Professional Messages That May Contain Text Files And Short Media. These Messages Need To Be Accessible At Any Time Of The Day And In Different ... You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign.
Explanation:
how to use command prompt
Answer:
The answer to this question can be defined as follows:
Explanation:
The Command Prompt is a program, which available in windows operating systems, which imitates an input field with windows GUI(Graphic User Interface). It provides a text-based user interface, that can be used to run instructions inserted and carry out advanced organizational activities, following are the step to open a command prompt:
There are two-step to open the command prompt in windows:
First, go to the start button the window. after open start type cmd on the search bar, It will provide the cmd to open it click with mouse or press enter button. With the help of keyboard press (window+R) key together, after pressing it will provide the run prompt in which we write cmd and press enter. It will open a command prompt panel.Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.
Answer:
(c) An inner class that is defined inside a method is not publicly accessible.
Explanation:
In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class
i. Inner classes are used to group classes logically so that they are easy to use and maintained.
ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class
iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class
iv. An inner class has access to members, including private members, of its enclosing class.
Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. After the loop terminates, it prints out, on a line by itself, the sum of all the even integers read. Declare any variables that are needed. ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input
Answer:
Written in Java Programming Language
import java.util.Scanner;
public class Assign{
public static void main(String [] args) {
Scanner stdin = new Scanner(System.in);
int num,sum=0;
System.out.println("Start Inputs: ");
num = stdin.nextInt();
while (num>=0) {
if(num%2== 0)
{
sum+=num;
}
num = stdin.nextInt();
}
System.out.print("Sum of even numbers: "+sum);
}
}
Explanation:
I'll start my explanation from line 4
This line initializes Scanner object stdin
Scanner stdin = new Scanner(System.in);
This line declares necessary variables and initializes sum to 0
int num,sum=0;
This line prompts user for inputs
System.out.println("Start Inputs: ");
This line reads user inputs
num = stdin.nextInt();
This line checks is user input is not negative (It's a loop that will be repeated continually until a negative number is inputted)
while (num>=0) {
This line checks if user input is an even number
if(num%2== 0)
{
If the above condition is true, this line calculates the sum of even numbers
sum+=num;
}
This line prepares the user for next input
num = stdin.nextInt();
}
This line prints the calculated sum of even number; If no even number is inputted, the sum will be 0
System.out.print("Sum of even numbers: "+sum);
HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
Python: With a program to store the list of all your friends, then sort the list and print them in alphabetical order. The program should create a loop to accept the names of all your friends. Exit the loop when the user has no more items to input. Then sort the list alphabetically and print out the new list. (Side Note: Make Sure Your Code Works Before Submitting) Note: You cannot predefine the list of friends. The list should be initialized to an empty list
#This is a way without a loop
friends = list(map(str,input("Enter Names: ").split()))
print(sorted(friends))
#This is a way with a loop (for&&while)
friends = list(map(str,input("Enter Names: ").split()))
cool = True
while cool:
cool = False
for i in range(len(friends)-1):
if friends[i] > friends[i+1]:
coo = friends[i]
friends[i] = friends[i+1]
friends[i+1] = coo
cool = True
print(friends)
What is the best application to create a slide show presentation?
Answer:
Microsoft Windows File Manager
what are reserved words in C programming?
Answer:
A word that cannot be used as an identifier, such as the name of a variable, function, or label. A reserved word may have no meaning. A reserved word is also known as a reserved identifier.
Explanation:
quick google search
convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920
pls in step by step
pls help me bro
Answer:
0b11110000000 is binary
0o3600 is in octal
0x780 in hexa dec.
Explanation:its a bit complitcated to explain sorry bro!
When approved for a loan, an individual essentially applied for aid in the area of...
A. Increasing (and financing) immediate increase in cash flow
B. limited liability
C. future educational services
D. protections and insurance
Answer:
The correct answer is A. When approved for a loan, an individual essentially applied for aid in the area of increasing (and financing), as it implies an immediate increase in cash flow.
Explanation:
Every loan involves the delivery of money by a bank or a financial agency to a person or company, with the consideration that the latter will later return said amount, plus an additional amount for interest, within a specified period and may pay in a single payment and in full or through an installment plan. But, in any case, the immediate result of said loan is an increase in the cash flow of the person who obtains said loan, which can be used for the acquisition of goods or services, or to face different eventual expenses.
An employee sets up Apache HTTP Server. He types 127.0.0.1 in the browser to check that the content is there. What is the next step in the setup process?
Answer:
Set up DNS so the server can be accessed through the Internet
Explanation:
If an employee establishes the HTTP server for Apache. In the browser, he types 127.0.0.1 to verify whether the content is visible or not
So by considering this, the next step in the setup process is to establish the DNS as after that, employees will need to provide the server name to the IP address, i.e. where the server exists on the internet. In addition, to do so, the server name must be in DNS.
Hence, the first option is correct
Your question is lacking the necessary answer options, so I will be adding them here:
A. Set up DNS so the server can be accessed through the Internet.
B. Install CUPS.
C. Assign a static IP address.
D. Nothing. The web server is good to go.
So, given your question, what is the next step in the setup process when setting up an Apache HTTP Server, the best option to answer it would be: A. Set up DNS so the server can be accessed through the Internet.
A server can be defined as a specialized computer system that is designed and configured to provide specific services for its end users (clients) on a request basis. A typical example of a server is a web server.
A web server is a type of computer that run websites and distribute web pages as they are being requested over the Internet by end users (clients).
Basically, when an end user (client) request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser; a request is sent to the Internet to view the corresponding web pages (website) associated with that particular address (domain name).
An Apache HTTP Server is a freely-available and open source web server software designed and developed to avail end users the ability to deploy their websites on the world wide web (WWW) or Internet.
In this scenario, an employee sets up an Apache HTTP Server and types 127.0.0.1 in the web browser to check that the content is there. Thus, the next step in the setup process would be to set up a domain name system (DNS) so the server can be accessed by its users through the Internet.
In conclusion, the employee should set up a domain name system (DNS) in order to make the Apache HTTP Server accessible to end users through the Internet.
Find more information here: https://brainly.com/question/19341088
What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
Think link
Formal outline
Time lines
Guided notes
Answer:
Think link
Explanation:
Jasmine is using the software development life cycle to create a song-writing app. She wants to work with others to create music. What should Jasmine do to begin the process?
Analyze and document the requirements for building the app
Break up the work into chunks and begin writing the app code
Make improvements and enhancements to the app based on feedback Write pseudocode and create a mock-up of how the app will work and look
Answer:Python's built-in library of functions allows programmers to import pre-written applications.
Explanation:
Answer: Analyze and document the requirements for building the app
Explanation: I took a quiz with that question and guessed and got it right. Other than that, I got nothing
Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables
Answer:
tables
Explanation:
For accessing the database there are four objects namely tables, queries, forms, and reports.
As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database
Therefore in the given case, the last option is correct
Answer:
D. tables
Explanation:
took the test, theyre right too
What is Relational Computerized Database
Answer:
Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases
Create Python program code that will use a for loop to ask the user to enterfourintegers. Itwillcount how many of the integers are divisible by 2. The programwill print each of the 4integers and a message saying whether the integeris even or odd. The code will print the total number of even integers
Answer:
is_even = 0
int_numbers = []
for n in range(4):
n = int(input('press any four integer numbers')
int_numbers.append(n)
for n in int_numbers:
if n%2==0:
print(n, 'integer is even')
is_even+= 1
else:
print(n, 'integer is odd')
print('Total even numbers =', is_even)
Explanation:
is_even = 0 (initiates a counter to record the number of even integers).
int_numbers creates a list to store the inputs entered by the user.
int(input()) : allows users to enter an integer number
int_numbers.append(n) : adds user input to list list variable created.
n%==2 : checks if entered digit leaves a remainder of 0 when divided by 2; hence an even number
is_even+= 1: counter updates by 1 for every even number confirmed.
Write a program segment with a do-while loop that displays whether a user-entered integer is even or odd. The code should then ask the user if he or she wants to test another number. The loop should repeat as long as the user enters 'Y' or 'y' . Use a logical OR operator in the do-while loop test expression
Answer:
Following is the program in C++ program
#include<iostream> // header file
using namespace std; // namespace
int main() // main function
{
int num1 = 0; // variable declaration
char test;// variable declaration
do
{
cout << " Enter the number: ";
cin >> num1; //Read the input by the user
if (num1 % 2 == 0) // check the condition of even
cout << " number is even.\n";
else // check the condition of odd
cout << "Number is odd.\n";
cout << " Do you wanted the another test of number (y/n)? ";
cin >> test; //Read the input by user
} while (test == 'y' || test == 'Y'); //terating the loop
return 0;
}
Output:
Enter the number:45
number is even.
Do you wanted the another test of number (y/n) Y
Enter the number:5
Number is odd.
Do you wanted the another test of number (y/n) n
Explanation:
Following are the description of program
Declared a variable "num1" as integer type and initialized as 0 to them Declared a variable "test" as char type .After that iterating the do -while loop .Read the value by the user in the "num1" variable .Check the condition of even and odd by using % operator .Read the value of test by the user .If the user enter Y or y then loop again executing otherwise not .Roger is getting a $5,000 loan. Which option will allow Roger to pay off the loan and keep his payments under $100?
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
Answer:
DNS or Domain Name System
Explanation:
You can query a DNS server with a domain name to get an IP address.
IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?
Answer:
The American Registry for Internet Numbers ARIN
Explanation:
The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands
There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.
convert thefollowing decimal number to its equivalent binary, octal, hexadecimal 255
Answer:
Binary: 11111111
Octal: 377
Hexadecimal: FF
Explanation:
Given
Decimal Number: 255
Required
Convert to
- Binary
- Octal
- Hexadecimal
Converting to binary...
To convert to binary, we take note of the remainder when the quotient is divided by 2 until the quotient becomes 0;
255/2 = 127 R 1
127/2 = 63 R 1
63/2 = 31 R 1
31/2 = 15 R 1
15/2 = 7 R 1
7/2 = 3 R 1
3/2 = 1 R 1
1/2 = 0 R 1
By writing the remainder from bottom to top, the binary equivalent is 11111111
Converting to octal...
To convert to octal, we take note of the remainder when the quotient is divided by 8 until the quotient becomes 0;
255/8 = 31 R 7
31/8 = 3 R 7
3/8 = 0 R 3
By writing the remainder from bottom to top, the octal equivalent is 377
Converting to hexadecimal...
To convert to hexadecimal, we take note of the remainder when the quotient is divided by 16 until the quotient becomes 0;
255/16 = 15 R 15
15/16 = 0 R 15
In hexadecimal, 15 is represented by F; So, the above division can be rewritten as
255/16 = 15 R F
15/16 = 0 R F
By writing the remainder from bottom to top, the hexadecimal equivalent is FF
Name all of the gates used in programming.
Answer:
BUFFER GATE, NOT GATE, OR GATE, AND GATE, NOR GATE, NAND GATE, XOR GATE and , XNOR
The parallax perspective says that objects that are close up appear to move __________ than far away objects.
A. More smoothly
B. More randomly
C. Slower
D. Faster
Answer:
It appears to move faster.
Is the IOT governable by frameworks? Explain your rationale.
Answer:
Absolutely yes.
Explanation:
IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.
Some of the aspects that should be governed by these frameworks are;
i. Data confidentiality:
Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.
ii. Data integrity:
These data should also be assured of consistency and accuracy over a long period of time.
iii. Accountability:
When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.
While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for
Answer:
Record time offsets.
Explanation:
In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.
The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.
Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.
Additionally, the time stamp varies depending on the operating system being used;
- For windows operating system, it uses a 64 bit time stamp.
- For Linux or Unix, it uses a 32 bit time stamp.
a force of 50n acts on a body of mass 5kg. calculate acceleration produced .
Answer:
Force = 50n
mass = 5kg
Force = m * acc
50 = 5 * A
A = 50/5
A = 10 m/s^2
HOPE IT HELPS!!!
Explanation:
A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative hypothesis, test statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative hypotheses
Answer:
The answer is:
[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]
Explanation:
[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]
The test value of statistic t= [tex]\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}[/tex]
[tex]=\frac{2.31688-2.2}{0.206915}\\\\=0.56[/tex]
The value of P = P(T>0.56)
=1-P(T<0.56)
=1-0.712
=0.288
Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected. Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.