De dónde proviene la mayoría de cosas que utilizamos en el hogar​

Answers

Answer 1

Answer:

La mayoría de las cosas que utilizamos en el hogar proviene de distintas industrias ubicadas a lo largo y ancho del mundo, dado que vivimos en un mundo globalizado e industrializado, en el que las distintas naciones intercambian bienes y servicios a través del comercio internacional.

De esta manera, en los distintos hogares hay cosas de diversos orígenes, como electrodomésticos provenientes de China, Japón o los Estados Unidos, muebles provenientes de México o Suecia, alimentos provenientes de Argentina, etc.


Related Questions

When creating a PowerPoint presentation, what does it mean to apply movement to text or an object to control its display during the presentation? Group of answer choices animate hyperlink slide layout transitions

Answers

Answer:

animate

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Furthermore, slide transition is an inbuilt feature of a presentation software that automatically changes the slides at regular intervals.

Generally, when a PowerPoint presentation is created, applying movement to a text or an object in order to control its display during the presentation is simply referred to as animation. There are various animation effects that could be applied by the user depending on his or her choice.

I'm reviewing a test and can't get past this problem:

What is the difference between printing (n) and printing row[n]?

Answers

Answer:

The answer is "Option A"

Explanation:

Following are the complete code to these question:

public class Main//defining a class-main

{

public static void main(String[] args)//main method  

{

        int [][] numbers={{1, 2, 3},{4,5,6}}; //defining 2D array numbers

for(int[] row : numbers) //use for loop that holds all array value into 1D  array

{

for (int n: row)//defining n variable that holds row array values  

{

System.out.print (n); //print n variable value

}

}

}

}

what are the answers for theses question?

Answers

Answer: me no comprende coding

Explanation:

sorry

Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
A. Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system.
B. The maintenance cost of Treston's new database system was less than the one it was previously using.
C. Treston's new database system was not supported by the database system of its suppliers and distributors.
D. Treston's competitors implemented its database a few days prior to Treston's implementation date.
E. Treston had internally trained personnel managing its new database system, keeping costs low.

By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.
A. True
B. False

In a distributed online environment, performing real-time analytical processing enhances the performance of transaction processing.
A. True
B. False

________ are produced at predefined intervals to support routine decisions.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
A. Ad hoc queries
B. Exception reports
C. Drill-down reports
D. Scheduled reports
E. Key-indicator reports

Answers

Answer:

C. The New database system of Treston was not supported by the database system of its suppliers and distributors.

TRUE

False

Scheduled reports

Drill down reports

Explanation:

The just-in-time is popularly known as the JIT. The JIT inventory system is defined as a management strategy in which the company gets goods and products as close as when they are actually needed. Some goods are received 'just in time' at the processing or at the manufacturing time of the final product.

In the context, the data base system failed for Treston company as the new data base system did not support the database system for the suppliers as well as the distributors of the car manufacturing company, Treston.

It is true that by combining the intelligence of human and the reasoning capabilities with that of retrieval and the analysis of the technology, the visual analytics can help in the process of decision making.

In the distributed environment done online, performing the real-time analytical processes does not enhances the performance of the transaction processing. So the answer is false.

A scheduled report is a report that is sent out or delivered at a specified time by an email provider. They are produced to support the routine decisions at predefined intervals.

A Drill down reports helps to see the data for a more detailed and a comprehensive view. It helps to analyze that a key indicator is not the appropriate level.

             

When planning a media project, what do you mention in the objective of a proposal?

A. strategies to make sure that the project reaches your intended audience
B. reason for creating the project
C. strategies to tell the story
D. strategies to engage your audience
E. résumés of your team members

Answers

Answer:

B reason for creating project

Explanation:

When planning a media project, one thing mentioned in the objective of a proposal is the reason for creating the project. The correct option is B.

What is a media project?

The Media Projects initiative fosters the creation, production, and distribution of radio shows, podcasts, documentaries, and documentary series that creatively and enticingly introduce humanities concepts to public audiences.

The Media Project began as an international non-profit organization in 2006 with the goal of enhancing the practice of religion reporting in the field of journalism and providing a forum for journalists to discuss the place of religion in society.

Print media (books, magazines, newspapers), television, movies, video games, music, cell phones, various types of software, and the Internet are just a few of the many formats available for modern media.

Therefore, the correct option is B. reason for creating the project.

To learn more about media projects, refer to the link:

https://brainly.com/question/6647138

#SPJ2

(25 POINTS)What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily

Answers

Answer:

Automatically add missing opening or closing tags to the HTML

Explanation:

What does using nesting in HTML allow you to do? Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easily

A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called

Answers

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

Olivia works at a company that creates mobile phones. She wanted to estimate the mean amount of time their new phone's battery lasts with regular use after a full charge. She took a random sample of
6
66 of these phones and randomly assigned each of them to a volunteer. She instructed them to fully charge the phones and use them as they regularly would until the battery died (without recharging the phone). Here are the data they reported:
Phone
1
11
2
22
3
33
4
44
5
55
6
66
Battery life (hours)
8.0
8.08, point, 0
6.0
6.06, point, 0
10.5
10.510, point, 5
9.0
9.09, point, 0
8.5
8.58, point, 5
12
1212
Mean
x
ˉ
=
9
x
ˉ
=9x, with, \bar, on top, equals, 9 hours
Standard deviation
s
x
=
2.07
s
x

=2.07s, start subscript, x, end subscript, equals, 2, point, 07 hours
Assume that all conditions for inference are met.
Which of the following is a
90
%
90%90, percent confidence interval for the mean battery life (in hours)?
Choose 1 answer:
Choose 1 answer:

(Choice A)
A
9
±
1.4
9±1.49, plus minus, 1, point, 4

(Choice B)
B
9
±
1.7
9±1.79, plus minus, 1, point, 7

(Choice C)
C
9
±
2.0
9±2.09, plus minus, 2, point, 0

(Choice D)
D
9
±
2.07
9±2.079, plus minus, 2, point, 07

Answers

An swer:  

                               

 E. xpl an ation:    

                               

wants to redesign the user interface. The customer service agents use ________ to enter explicit statement to invoke operations within the system and cannot always remember the commands.

Answers

Answer:

The correct answer to use in filling in the gap is "Command languages interaction".

Explanation:

Command languages interaction occurs when the user enters command which are not always remembered, the computer executes it (with feedback if necessary), then requests next command.

This implies that under command languages interaction, "Command prompts" are employed by users who enter in commands and maybe certain parameters that impact how the command is executed.

Therefore, the correct answer to use in filling in the gap is "Command languages interaction".

!!!!!16 POINTS!!!!Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?

DO NOT JUST ASWERE FOR POINTS OR YPU WILL BE REPORTED AND BLOCKED. IF YOU HAVE ANY QUESTION PLEASE ASK THE IN THE COMMENTS AND DO NOT ASWERE UNLESS YOU KNOW THE ANSWER TO THE PROBLEM, thanks.

Answers

Answer:

Yes a computer can evaluate between a true or false. x < 1, and if the condition is met, the value is true, else its false. A computer itself cannot handle any "maybe" expression, but with the influence of human opinion, in theory its possible. Chocolate cake < Vanilla cake, is an example. Entirely on opinion.

Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?

Answers

1. Most animators work in big cities where movie and television studios, animation studios, software developers, and video game design firms are located.
2. I’m confused about this one.
3. An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... The dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 76.45%.
4. A database is an organized collection of data, generally stored and accessed electronically from a computer system.
5. An app, which is short for "application," is a type of software that can be installed and run on a computer, tablet, smartphone or other electronic devices. An app most frequently refers to a mobile application or a piece of software that is installed and used on a computer.

Uses of ITs in different sectors​

Answers

Answer:

technology helps in managing, manipulating, storing, regaining, sharing/communicating and transmitting small as well as large amount of information/data conveniently and effectively. Work that was done manually in the past now can be done easily and efficiently with the help of computers.

Explanation:

Who wants to Play Sea of Thieves with me I am a Pirate Legend

Answers

Not me, I am here for your points...

Not me, I just answered so I don’t have to buy Brainly plus

Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another coworker searches for parts that need to be ordered. Erica’s company uses a _____.


spreadsheet

Web page

data warehouse

word processor

Answers

Spread sheet I think

What does Spam mean in tech

Answers

Answer:

Spam is digital junk mail. They are unsolicited communications sent in bulk over the internet or through any electronic messaging system. For example, when you text someone "hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi hi" they will tell you "stop spamming!"

Answer:

Spam means Digit Junk Mail in tech context.

Explanation:

Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system. It is unsolicited bulk messages, spamming is the act of sending these messages, and a person who engages the practice is a spammer. Most of the time, spamming is commercial in nature, and though the spam is bothersome, it isn’t necessarily malicious or fraudulent (though it can be).

Long answer questions.
1. Explain the various methods of communication.
2. Explain the elements of communication cycle.
3. Explain the factors affecting perspective in communication.
4. Explain the meaning of phrase with example.​

Answers

Answer:

ans-I have outlined four types of communication, but I believe there are actually five types of communication: verbal, non-verbal, written, listening, and visual.

Please help me here: h t t p s : / / t i n y u r l . c o m / y t 7 r 3 y a m

Answers

Why would you even be promoting this


b. An advantage of a WAN is that everyone on the network can access the same
data and​

Answers

Ns provide dedicated traffic for your organization, and they are much more secure than the internet itself. Additionally, sending your information across the internet means that you have to share bandwidth with millions of other businesses rather than having your own dedicated bandwidth by using WAN

iwill give 20 points and.
brainlyes

unscramble the word

CTYIECLRCEI

a typw of energy that is a result
of the flow of electrons​

Answers

The answer is ELECTRICITY

[tex] \implies \huge \tt \underline \red{answer}[/tex]

Your Answer Was Electricity.

Ram cannot be written again and again true or false​

Answers

Answer:

The answer is: False

What tag would you enter to link the text “White House" to the URL
http://www.whitehouse.gov?*

Answers

Answer:

3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

Explanation:

The exact question is as follows :

To find - What tag would you enter to link the text “White House" to the URL

http://www.whitehouse.gov with the destination document displayed in a new unnamed browser window?

1.<a ="http://www.whitehouse.gov" target="_blank">White House</a link>

2.<a href="ftp://www.whitehouse.gov" target="_blank">White House</a>

3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

4.<link="http://www.whitehouse.gov" target="_blank">White House</link>

The correct option is - 3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

an interface

Explanation:

(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.

Which set of keys is your right pointer finger responsible for typing (3 points)

a
3, E, D, and C

b
4, R, F, and V

c
5, T, G, and B

d
6, Y, H, and N

Answers

Answer:

D

Explanation:

Your right pointer finger is responsible for typing the Y, H, and N keys

Answer:

D

Explanation:

When typing, you rest your right pointer finger on the J key.

Most people are able to find this key without looking due to a small bump on the lower half of it.

Having your finger rest here allows for your hands to each take up roughly one half of the keyboard.

Your right pointer finger is responsible for typing the 6, Y, H, and N keys due to its positioning on the keyboard.

what is a cell address in xsl sheet

Answers

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

what is spoofing.HELPPPPPP

Answers

Answer:

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

Answer:

imitate

Explanation:

something while exaggerating its characteristic features for comic effect

Write short notes on slide show view. (In easy way)​

Answers

Answer:

Slide Show View takes up the full computer screen, like an actual slide show presentation. In this full-screen view, the presentation is shown the way it will be seen by the audience. Graphics, timings, movies, animated elements, and transition effects are shown how they will look in the actual show.

I need the answer ASAP!!!! I’ll mark brainliest if correct

Select the correct answer.
What model defines data structures and expands software architecture and components?
O A.
architectural design model
OB.
data design model
O C.
interface design model
OD.
component-level design model

Answers

Answer:

Option D

Explanation:

option d component level design model is the correct answer

Define ulility software

Answers

Answer: Utility Software is where it helps analyze and maintain the computer system.

I hope this helped.

Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance

polymorphism

encapsulation

operation overloading

Answers

Answer:

Encapsulation

Explanation: got it right

Answer:

Encapsulation

Explanation:

I took the quiz.

Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.

Answers

[tex] \implies \huge \tt \underline \red{answer}[/tex]

Hlo

Other Questions
Read the following passage:In Vietnam, the jungle itself turned you into an animal. Itreached out and pulled you in. We willingly performed theoutward transformation of camouflaging ourselves -tucking foliage into our helmets, smearing our faces withash that stung our nostrils. But something inside us waschanging as well. We were becoming beasts - stalking ourprey, baring our fangs. And when the time came, attacking.Which best explains how imagery contributes to the meaning of thispassage?O A. It provides details about the different kinds of plant and animal lifefound in Vietnam,O B. It describes the jungle to help readers understand the unfamiliarsettingO C. It helps the reader imagine the sight and smell of the soldierscamouflaging themselves.OD. It explores the narrator's feelings of fear by comparing him to ananimal. Find the sum of the series please help please calculate the area of this triangle plzzz solve this brainlist for sure How did the development of steel, oil, transportation, communication, and business practices affect the US economy?Steel - Oil - Transportation - Communication - Business Practices - BRAINLIEST!!!!!! WILL MARK BRAINLIEST!!!!!!!!What does inveigled mean in this passage?A. ForcedB. GuidedC. LuredD. Rushed Hi,please someone can help me i'm lost..Nick was thinking of a number. Nick divides by 6, then adds 6 to get an answer of 2. What was the original number? Graph points (- 4, - 1)(4, 3) . Write the equation of the line that passes through the points in slope-intercept form HELPP I NEED IT NOW WILL GIVE BRAINLIEST What type of compound are fossil fuels A party rental company has chairs and tables for rent. The total cost to rent 7 chairs and 9 tables is 73. The total cost to rent 5 chairs and 3 tables is 29 . What is the cost to rent each chair and each table? A boy has a weekend job advertising an upcoming play. He has 2 options for being paid. Option A is an hourly wage of $7.00. Option B is a 5% commission on all money made at the play she plans to work 8 hours each day on Saturday and Sunday. He estimates the play will make about $2,100 this weekend. Which option gives him more earnings this weekend? Where did paco make an error in his calculation?Explain. 18 m 13m 13 m find the surface area DIRECTIONS: Matching Match each item with its definition Need explanation for this question please How does the Theory of Relativity change perceptions of the physical world? What would happen to this ecosystem if the sardines experienced a disease and their population shrank by 75%? Which of the expressions below is equal to 24/18? Select all that apply.Which of the expressions below is equal to 2418? Select all that apply.