_________ is a system in which any object, animate or inanimate, has a unique identity and is able to send and receive data over the internet without human interaction.

Answers

Answer 1

Answer: the ioT

Explanation:


Related Questions

Ensure the Sales worksheet is active. Enter a function in cell B8 to create a custom transaction number. The transaction number should be comprised of the item number listed in cell C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use Auto Fill to copy the function down, completing the data in column B.Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or equal to $4000. Otherwise, the function will display a blank cell. Use Auto Fill to copy the function down, completing the data in column G.Create a data validation list in cell D5 that displays Quantity, Payment Type, and Amount.Type the Trans# 30038C in cell B5, and select Quantity from the validation list in cell D5.Enter a nested lookup function in cell F5 that evaluates the Trans # in cell B5 as well as the Category in cell D5, and returns the results based on the data in the range A8:F32.Create a PivotTable based on the range A7:G32. Place the PivotTable in cell I17 on the current worksheet. Place Payment Type in the Rows box and Amount in the Values box. Format the Amount with Accounting Number Format.Insert a PivotChart using the Pie chart type based on the data. Place the upper-left corner of the chart inside cell I22. Format the Legend of the chart to appear at the bottom of the chart area. Format the Data Labels to appear on the Outside end of the chart.Note, Mac users, select the range I18:J20, on the Insert tab, click Recommended Charts, and then click Pie. Format the legend, and apply the data labels as specified.Insert a Slicer based on Date. Place the upper-left corner of the Slicer inside cell L8.Ensure the Inventory worksheet is active. Import the Access database eApp_Cap2_Inventory.accdb into the worksheet starting in cell A3.Note, Mac users, download and import the delimited Inventory.txt file into the worksheet starting in cell A3.Sales SheetBeta ManufacturingMarch Transactions Search ResultsTrans # Category Results Date Trans # Item Quantity Payment Type Amount Status3/1/2018 3003 8 Credit $4,800 3/2/2018 5005 4 Financed $2,800 3/3/2018 5005 1 Credit $700 3/3/2018 5005 10 Financed $7,000 3/5/2018 1001 6 Credit $1,500 3/7/2018 5005 5 Credit $3,500 3/9/2018 1001 5 Credit $1,250 3/10/2018 5005 3 Credit $2,100 3/10/2018 2002 1 Financed $500 3/10/2018 4004 4 Financed $2,600 3/11/2018 2002 9 Financed $4,500 3/11/2018 3003 8 Credit $4,800 3/12/2018 1001 9 Financed $2,250 3/13/2018 2002 8 Financed $4,000 3/13/2018 2002 9 Credit $4,500 3/14/2018 3003 9 Credit $5,400 3/18/2018 3003 1 Credit $600 3/24/2018 4004 1 Credit $650 3/24/2018 4004 3 Financed $1,950 3/24/2018 4004 10 Cash $6,500 3/28/2018 2002 10 Credit $5,000 3/28/2018 1001 9 Cash $2,250 3/30/2018 3003 8 Credit $4,800 3/30/2018 4004 6 Financed $3,900 3/30/2018 2002 9 Cash $4,500

Answers

The Sales workbook is open. a formula in cell B8 that generates a unique transaction number. and the following outlines all procedures and formulas.

Goto cell B8 in Sales workbook and Type function “=C8&D8&LEFT(E8,1)” Now drag the Auto Fill handle for all the cells in column B

Goto cell G8 and Type function “=IF(AND(E8="Credit",F8>=4000),"Flag"," "). Now drag the Auto Fill handle for all the cells in column G

Step1: Goto cell D5, Select Data Validation from Data menu.

Step 2: Choose Data Validation option. A Data Validation window opens.

Step 3: In Settings tab, Select List from the drop down menu under Allow and Type “=$D$7:$F$7” under Source.

Step 4: Click on OK

Goto cell B5 and Type “30038C”. Then Goto cell D5 and Select Quantity from the drop down menu

Goto cell F5 and Type “=INDEX($A$7:$F$32,MATCH(B5,$B$7:$B$32,0),MATCH(D5,$A$7:$F$7,0))”

Learn more about Data Validation here:

https://brainly.com/question/29033397

#SPJ4

Which two methods can be used to delete a table from a query once the user has clicked on the table?

a. right-clicking and selecting Delete, or clicking Delete on the keyboard
b. right-clicking and selecting Remove Table, or clicking Delete on the keyboard
c. right-clicking and selecting Delete, or clicking the space bar on the keyboard
d. right-clicking and selecting Remove Table, or clicking the space bar on the keyboard

Answers

The two methods can be used to delete a table from a query once the user has clicked on the table are: "right-clicking and selecting Delete, or clicking Delete on the keyboard" (Option A)

What is a Query?

Simply open the table in Datasheet view, pick the fields (columns) or records (rows) you wish to delete, and then hit DELETE. It should be noted that the material in this article is only meant to be used with desktop databases. In Access web applications, you cannot remove or amend queries.

A query is an information or data request from a database table or databases. This data can be generated as Structured Query Language (SQL) outputs or as pictorials, graphs, or more complex results, such as trend analysis, utilizing data-mining tools.

Learn more about Query:
https://brainly.com/question/16349023
#SPJ1

describe two ways that two factor authentication restrict user access to computer systems​

Answers

Answer:

1. Requiring a Token or Authentication Code

2. Requiring Biometric Authentication

Explanation:

1. Requiring a Token or Authentication Code: This method requires users to provide an additional form of verification (usually a code sent to their phone or email) when logging into a system.

2. Requiring Biometric Authentication: This method requires users to provide biometric data such as fingerprints, a retinal scan, or voice recognition when logging into a system. This data is unique to each individual and provides an extra layer of security.

which of the following is true about subtype entities? group of answer choices all subtypes must be exclusive. all subtypes must be inclusive. if subtypes are exclusive, one supertype can relate to one or more subtypes. a subtype entity is a special case of a supertype entity.

Answers

The option that is true about subtype entities is option B: All subtypes of a supertype must have the same attributes.

What are the characteristics required for subtypes?

The Definitions must be used to support subtypes and supertypes. Attributes can exist for both supertypes and subtypes. Subtypes are given properties specific to them; common attributes are also given to those subtypes.

Hence, one should know that a supertype's subtypes must share the same characteristics. Subtypes might not coexist. To prevent a situation where some properties must be null, subtypes are employed.

Learn more about subtype entities from

https://brainly.com/question/28901187
#SPJ1

See full question below

Which of the following is not true about subtype entities?

The supertype and subtypes will have the same identifier.

All subtypes of a supertype must have the same attributes.

Subtypes may be exclusive.

Subtypes are used to avoid a situation in which some attributes are required to be null.

hich compatibility issues can be fixed for an app by using the capabilities included in windows 10? (choose all that ap

Answers

These compatibility issues can be fixed for an app by using the capabilities included in windows 10 are:

required to right-click and run as administratorodd colors issue, when the color depth is greater than 16 bits.When the screen resolution is 1920 X 1024, the display quality on full screen is poor.

What is compatibility issues in Windows 10?

Some functions' implementations may change as the Windows operating system evolves to support new technology and functionality. This might cause issues for some applications that rely on original-implementation. You can avoid compatibility issues by creating a specific application fix for a specific version of an application using the Microsoft Windows Application Compatibility (Compatibility Fix) infrastructure.

To learn more about Windows 10, visit: https://brainly.com/question/28847407?referrer=searchResults

#SPJ4

in problem solving, a method that always produces a problem solution (though not necessarily very efficiently) is known as group of answer choices an algorithm. a heuristic. a matrix. the hill-climbing heuristic.

Answers

A method that always produces a problem solution, though not necessarily very efficiently, is known as an algorithm.

What is an Algorithm?

An algorithm is a step-by-step procedure for solving a problem or achieving a specific goal. It is a set of instructions that, if followed in the correct order, will always produce the same result.

Algorithms are often used in computer programming and other fields where precise, repeatable steps are necessary to solve a problem or accomplish a task.

Algorithms are typically designed to be efficient and effective, but they may not always be the fastest or most efficient way to solve a problem. Other approaches, such as heuristics, may be faster but less reliable, as they may not always produce a solution.

To Know More About heuristics, Check Out

https://brainly.com/question/14718604

#SPJ1

write a program that reads in the name and salary of an employee. here the salary will denote hourly wage, such as $9.25. then ask how many hours the employee worked last week. be sure to accept fractional hours. compute the pay. any overtime work (over 40 hours per week) is paid at 150 percent of the regular wage.

Answers

The program that reads in the name and salary of an employee will be:

name = input("Enter name : ")

wage = float(input("Enter wage : "))

hours = int(input("Enter hours : "))

if hours <= 40:

tpay = hours * wage

else:

nhours = hours - 40

tpay = 40 * wage

nhours += nhours * 1/2

tpay += nhours * wage

print("Total pay is : $%s" % tpay)

What is a program?

A program is a specific set of ordered operations that a computer can perform. It contains a one-at-a-time sequence of instructions that the computer follows. Typically, the program is saved in a location accessible to the computer.

A computer program is a set of instructions written in a computer programming language that instructs the computer to perform a specific task. The above program illustrates the salary.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

question 2 according to the mccandless method, what is the most effective way to first present a data visualization to an audience?

Answers

The McCandless method recommends giving an audience an overview of the information first, such as an elevated summary or a list of the main points, before providing a visualization tool.

How does visualization work?

The graphic depiction of data and information is the focus of the multidisciplinary topic of data and information visualization. When interacting with large amounts of data or information, like a time series, it is especially effective. In order to improve cognition, different aspects of abstract data are also being studied. Both non-numerical and numerical data, including such text and geospatial information, are included in the abstract data.

To know more about Visualization
https://brainly.com/question/29430258
#SPJ4

a. consider a flow network in which vertices, as well as edges, have capacities. that is, the total positive flow entering any given vertex is subject to a capacity constraint. show that determining the maximum flow in a network with edge and vertex capacities can be reduced to an ordinary maximum-flow problem on a flow network of comparable size. b. describe an efficient algorithm to solve the escape problem and analyze its running time.

Answers

The following can be done to handle vertex capacities. We add two edge-containing vertices in and out for every vertex

What is a vertex?

A vertex is a corner point formed by the junction of an object's edges, faces, or facets, and it can be a polygon, polyhedron, or any higher-dimensional polytope. If the internal angle of the polygon—the angle produced by the two edges at the vertices with the polygon inside the angle

In general, a polyhedron or polytope vertex is convex if the intersection with a suitably small sphere centered at the vertex is convex and concave otherwise.

The edge with the highest weight in a spanning tree is called a bottleneck edge. If there isn't a spanning tree with a smaller bottleneck edge weight in the graph, the tree is a minimum bottleneck spanning tree. A comparable issue is known as Minimum Bottleneck Spanning Arborescence for directed graphs (MBSA).

Therefore, All edges connect a reachable vertex to an unreachable vertex. Write down all such edges.

Learn more about vertex here:

https://brainly.com/question/29030495

#SPJ1

1. What is a naming model used for?
2. List the four major activities associated with software configuration management.
3. What are check-in and check-out?
4. List three concerns you may need to look into before choosing a configuration management tool.
5. What are the build steps of a single program?
6. What is linking and what are we linking in a build process?
7. Explain the difference between the view and the modify functions in the storage and access model of configuration management.
8. Name a tool from each of the three tiers of automating the configuration management activities.

Answers

The four major activities associated with software configuration management are:

1. Being aware of the necessary management of the policy, process activities, and producing artifacts

2. Establishing the framework that must be utilized to manage these artifacts.

3. Identifying and incorporating any tools that need to be expanded to make managing this item easier.

4. Providing instruction and making sure that the regal and configuration management prostheses are used and followed,

What does software configuration management refer to?

The term Program configuration management, a subset of the broader, multidisciplinary area of configuration management, is the activity of monitoring and regulating changes to the software. SCM procedures is one that is made up of baseline creation and revision control.

Therefore, one can say that additionally referred to as "software change management," Version control, as well as security administration of software assets, software promotion, quality reviews, and software distribution are all part of the software lifecycle management (SCM) methodology.

Learn more about software configuration from

https://brainly.com/question/17080816
#SPJ1

service desks that recognize information as a resource and try to prevent incidents and prepare for the future are known as

Answers

Proactive service desk is kind of service desks that recognize information as a resource and try to prevent incidents and prepare for the future. A service desk is the main contact point between users/service providers, handling issues, refunds, and more.

Proactive customer service refers to send what customers require before they know they need it. It's going one step more away than what the customer would expect, solving help, advice, or education to assist customers before they create a request or complain. Service desk refers to the particular point of contact between the service provider and the users. A kind of service desk manages incidents and service requests, and also handles communication with the users.

Learn more about service desk, here https://brainly.com/question/24850891

#SPJ4

_____ is data and instructions entered into the memory of a device.

Answers

Answer:storage

Explanation: this is the answer b/c any data that enters the memory of a computer is STORAGE


( hope this helped )

Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:

#1: You entered _____
When DONE is entered, the total number of words entered should be printed in this format:

A total of __ words were entered.
Sample Run
Please enter the next word: cat
#1: You entered the word cat
Please enter the next word: iguana
#2: You entered the word iguana
Please enter the next word: zebra
#3: You entered the word zebra
Please enter the next word: dolphin
#4: You entered the word dolphin
Please enter the next word: DONE
A total of 4 words were entered.

Answers

Answer:

def main():

   word = input("Please enter the next word: ")

   count = 0

   while word != "DONE":

       count += 1

       print("#{}: You entered the word {}".format(count, word))

       word = input("Please enter the next word: ")

       print("A total of {} words were entered.".format(count))

       

main()

penny is setting up computers at a local nonprofit organization. the computers were donated by a company that was upgrading to new computers. penny must decide whether to use a 32-bit or 64-bit version of windows 8.1. what hardware on the computers should penny check? (select all that apply.)

Answers

The computer hardware to be tested by penny are:

Hard DriveRAMProcessor

Correct answer: letter B, D y E.

Penny needs to test the computer hardware (Hard Drive, RAM, Processor) to ensure with the Windows 8.1 operating system, regardless of whether she chooses a 32-bit or 64-bit version. Penny should also check the amount of RAM and the size of the hard drive to ensure the system will have enough space to run the operating system and any applications that may be installed.

What is computer hardware?

Computer hardware refers to the physical components of a computer, such as:

The monitorKeyboardMouseHard driveGraphics cardMotherboard

As opposed to computer software, which are the programs and applications that run on the hardware.

Penny is setting up computers at a local nonprofit organization. The computers were donated by a company that was upgrading to new computers. Penny must decide whether to use a 32-bit or 64-bit version of Windows 8.1. What hardware on the computers should Penny check? Select all that apply:

A) Video card

B) Hard drive

C)Motherboard

D) RAM

E) Processor

F) Network card

Learn more about computer hardware:

https://brainly.com/question/3186534

#SPJ4

in linux and other unix-based operating systems, which of the following is not considered a classification of users in connection with each file?

Answers

UNIX is a multi-user operating system, which is a collection of applications that manages a computer and allows users to interact with its hardware and software.

What is Unix is used for?Internet servers, workstations, and mainframe computers all often used UNIX. The key characteristics of UNIX were its portability, multitasking, multiuser, large software library, and hierarchical file system.The original AT&T Unix, whose development began in 1969 at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others, is the ancestor of the Unix family of multitasking, multiuser computer operating systems.The Linux operating system is a continuation of the Unix design principles. The most well-known and robust direct descendants of Unix are Linux distributions.According to POSIX, the seven standard Unix file types are regular, directory, symbolic link, FIFO special, block special, character special, and socket.

To learn more about UNIX  refer :

https://brainly.com/question/4837956

#SPJ4

motor programming involves a pattern of feedback, control, and modification of movements. specifically, proprioceptive sensory information is sent to the , which then sends corrective feedback to the cerebral nuclei and cortex, so the movements can be adjusted.

Answers

Motor programming involves a pattern of feedback, control, and modification of movements. Specifically, proprioceptive sensory information is sent to the cerebellum, which then sends corrective feedback to the cerebral nuclei and primary motor cortex, so the movements can be adjusted.

What is a feedback loop?

In Science, a feedback loop can be defined as a biological process through which the output of a system either inhibits (negative feedback) or amplifies (positive feedback) the body system, depending on the surrounding conditions.

Under motor programming, there are several patterns of feedback, control, and modification of movements such as the transmission of proprioceptive sensory information to the cerebellum, which is saddled with the responsibility of sending or transmitting corrective feedback to the cerebral nuclei and then, the primary motor cortex, in order to make it possible for the movements of a living organism to be adjusted.

Read more on feedback loop here: brainly.com/question/28386507

#SPJ1

Complete Question:

Motor programming involves a pattern of feedback, control, and modification of movements. Specifically, proprioceptive sensory information is sent to the _____________, which then sends corrective feedback to the cerebral nuclei and _____________ cortex, so the movements can be adjusted.

which element did the wi-fi developers create to use as another level of naming to apply to the bss or ibss to help the connection happen?

Answers

Service Set Identifier (SSID) is the element that the wi-fi developers create to use as another level of naming to apply to the bss or ibss to help the connection happen.

What is a wi-fi?

To connect computers, tablets, smartphones, and other devices to the internet, Wi-Fi is a wireless technology that is used.

Wi-Fi refers to a radio signal that is transmitted from a wireless router to a nearby device, which then converts the signal into information that can be seen and used. To the router, which is wired or connected via cable to the internet, the device sends a radio signal back.

In a nutshell, a Wi-Fi network is just a wireless router that distributes an internet connection to a number of devices in a building or home. The router, which is directly connected to your internet modem, serves as a hub to disseminate the internet signal to all of your Wi-Fi capable devices. As long as you are in your network's service area, this gives you the freedom to stay connected to the internet.

Learn more about Wi-Fi

https://brainly.com/question/13267315

#SPJ4

with streaming stored multimedia applications, the user can pause, fast forward, skip ahead the audio/video.

Answers

The statement "with streaming stored multimedia applications, the user can pause, fast-forward, skip ahead the audio/video" is false.

What are multimedia applications?

Interactive software that integrates several media at once to inform a viewer is known as a multimedia application. You can utilise a variety of media formats, such as text, images (photographs, illustrations), and audio (music, sounds).

The entertainment industry is one of the most important and well-known places where multimedia is used. Special effects and animations, like VFX, are increasingly used to create movies, commercials, and short clips.

Therefore, the statement is false.

To learn more about multimedia applications, refer to the link:

https://brainly.com/question/27960328

#SPJ1

The question is incomplete. Your most probably complete question is given below:

True/false

What is the correct port number that should be used with the winscp or cyberduck secure file transfer program?.

Answers

Popular FTP and SFTP software for Windows is called WinSCP.

What purposes does WinSCP serve?WinSCP is a Windows SFTP, FTP, WebDAV, S3, and SCP client that is open source and free.File transfers between local and distant computers are its principal purpose.Beyond this, WinSCP provides scripting and fundamental file manager features.Popular SFTP and FTP clients for Windows include WinSCP! Using the file transfer protocols FTP, FTPS, SCP, SFTP, WebDAV, or S3, copy files between a local computer and distant servers.WinSCP allows you to establish connections to servers running SSH (Secure Shell) that support SFTP (SSH File Transfer Protocol), SCP (Secure Copy Protocol), FTP (File Transfer Protocol), HTTP servers that support WebDAV, and storage systems that use the S3 protocol.

To learn more about SFTP refer to:

https://brainly.com/question/28089419

#SPJ4

are seen as the driving forces of motivating a client toward certain activities and provide an individual's fundamental sense of identity, according to ltcc model.

Answers

Core goals are seen as the driving forces of motivating a client toward certain activities and provide an individual's fundamental sense of identity, according to LTCC model.

What is LTCC model?

LTCC technology uses ceramic substrate tapes or sheets to create multilayer circuits. Each sheet or tape is coated with the appropriate conductive, dielectric, and resistive pastes before being laminated together and fired (often in a carefully regulated oven or kiln) in one step.

The end result is a monolithic, hermetic structure. A typical LTCC model is made up of multiple dielectric layers, low-loss conductors that have been screen-printed or photographed, baluns, resistors, and capacitors that are embedded, as well as viaholes for connecting the various layers.

Before firing, each layer can be checked to replace any circuits that are damaged, increasing yield.

Learn more about LTCC

https://brainly.com/question/16179312

#SPJ4

Which network device would be the most appropriate to provide stateful packet filtering, email filtering, and vpn services?

Answers

A Universal Threat Management (UTM) device is a multipurpose security tool that may act as a VPN connection point for remote users as well as a firewall, proxy filter, email filter, and network access control service provider.

In the past, businesses have used a variety of point security technologies to counteract particular cybersecurity threats. A company might have a separate firewall, antivirus software, etc. Because a UTM solution can handle a variety of network security tasks in a single appliance, it reduces the requirement for this group of independent solutions.

At the network perimeter, unified threat management tools are set up to scan all incoming and outgoing data. The UTM system gains the required visibility into network packets via deep packet inspection (DPI), allowing it to identify inbound threats and deny web requests to inappropriate or dangerous websites. A security team can also control each of these aspects using a single dashboard that UTM offers.

To learn more about Universal Threat Management (UTM) click here:

brainly.com/question/6957939

#SPJ4

which type of communication path-sharing technology do all 802.11 standards for wireless networking support?

Answers

Path sharing in 802.11 standards is accomplished via the Ethernet protocol and CSMA/CA.

Where is Ethernet protocol used?Ethernet is still a widely used type of network connection and is used to link devices in a network. Ethernet is utilized for local networks because of its high speed, security, and dependability in places where it is specifically needed, including corporate offices, campuses of educational institutions, and hospitals.The common LAN technology is the Ethernet protocol. Local area networks based on standard Ethernet can send data at up to 10 Mbps per second. With data transmission speeds up to 100 Mbps, new Ethernet cards known as Fast Ethernet represent high-speed LAN technology.

To learn more about Ethernet  refer,

https://brainly.com/question/26956118

#SPJ4

which of the hash table collision-handling schemes could tolerate a load factor above 1 and which could not?

Answers

The hash table collision-handling schemes could tolerate a load factor above 1 and which could not is option A: Hash Tables need to deal with collisions. Which of the hash table collision- handling schemes could tolerate a load factor above 1 and which could not a. Hint: Think about which of the schemes use the array supporting the hash table exclusively and which of the schemes use additional storage external to the hash table

What purposes serve hash tables?

A hash table is a type of data structure that allows for constant-time direct access to its components while storing data in key-value format. Associative hash tables are those where each key only appears once in the data, thus the name.

Therefore, one can say that It is a type of abstract data that associates values with keys. An array of buckets or slots are used in a hash table to provide an index, also known as a hash code, from which the requested data can be retrieved. The key is hashed during lookup, and the resulting hash shows where the relevant value is kept.

Learn more about hash table from

https://brainly.com/question/29510384
#SPJ1

See full question below

Hash Tables need to deal with collisions. Which of the hash table collision- handling schemes could tolerate a load factor above 1 and which could not? a. Hint: Think about which of the schemes use the array supporting the hash table exclusively and which of the schemes use additional storage external to the hash table. b. Assume you want to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, 5 and store them in a hash table. Implement linear probing, and double hashing to handle collision. Print out the positions of keys stored. Hash functions for linear probing and double hashing as described as follows. Linear probing: h(k) (3k+5) mod 11 Double hashing: hi(k) (3k+5) mod 11, h2(k)-7 (k mod 7)

When creating a time series–based forecast for the amount of soda to be sold in the cafeteria next week, which data sources can you include in your forecasting process?.

Answers

We can include "old demand data" data source in the forecasting process while creating a time series–based forecast for the amount of soda to be sold in the cafeteria in the next week.

What is Data Source?

A data source can be the initial location where data is created or where physical information is first digitized, but even the most refined data can serve as a source if another process accesses and uses it. A database, a flat file, live measurements from physical devices, scraped web data, or any of the numerous static and streaming data services available on the internet are all examples of data sources.

To learn more about Data Source, visit: https://brainly.com/question/14655484?referrer=searchResults

#SPJ4

what are two reasons why some people resist the brain-computer analogy, and how does hinrichs counter those objections?

Answers

Information is sent by chemicals in the brain, as opposed to electricity in computers.They both transfer data.

What people resist the brain-computer analogy?

In other words, the metaphor of the brain as a computer represents a reductionist view of cognition, which holds that all cognitive functions—such as perception, decision-making, motor control, etc.—are shared by all members of the animal kingdom.

According to Hinrichs, the brain, which gave rise to the mind, is a computer. The brain is a computational device, but it is not like a computer; it is a different kind of computer.

Therefore, It is actually made up of simple cognitive processes, similar to those used by educated people to perform calculations.

Learn more about computer analogy here:

https://brainly.com/question/18943642

#SPJ1

What questions should be considered when evaluating the reliability of a website? (site 1).

Answers

- The sources marked at the bottom of the webpage where they got their information
- Author credibility
- you would need to find out if the website is accessible to other users to add information to.

Which of the following is NOT an example of a game mechanic?

A.
solving a puzzle

B.
shooting a robot

C.
jumping over a building

D.
listening to the game sounds

Answers

The term that is NOT an example of a game mechanic is option D. listening to the game sounds.

What does a gaming mechanism mean?

Game mechanics are the guidelines or rules that control and direct the player's actions and the game's reactions in both tabletop and video games. A ludeme, or play element, is similar to the L-shaped move of the knight in chess while a rule is a set of instructions on how to play.

Therefore, The rules and procedures that direct the player and determine how the game will react to their moves and actions are known as the game's mechanics. You design the game's mechanics, which determine how it will function for the players.

Learn more about game from

https://brainly.com/question/29411392
#SPJ1

Answer: D

Explanation:

To any of you who are also taking Game Design, I have respect for you.

what is the term used to describe the connections and bonds people have with those in their social networks?

Answers

Social capital.

it’s a byproduct of one's social networks and interpersonal relationships.

what do you need to consider prior to the administration of warfarin (coumadin) keeping in mind there is an iv heparin infusion running at 15 units/kg/hr.

Answers

You need to calculate the International Normalized Ratio (INR) of patients prior to the administration of Warfarin (Coumadin).

Warfarin is a prescription medication that interferes with normal blood clotting (coagulation). In some countries, Warfarin is sold under the brand name Coumadin. Warfarin is prescribed to those people who are at increased risk of developing harmful blood clots. Before the prescription of Warfarin, the blood test, known as prothrombin time, is used to calculate International Normalized Ratio (INR). INR helps the healthcare provider to determine how well Warfarin is working to prevent blood clots and whether the dose needs to be adjusted.

You can learn more about Warfarin at

https://brainly.com/question/29022659

#SPJ4

what is true regarding the comparisons between asynchronous transfer mode (atm) and frame relay (fr)? a. fr has predictable data delays compared to atm where delays are variable b. atm cannot easily support real-time voice, whereas fr readily supports real-time voice c. fr consists of variable sized data frames, whereas atm is comprised of fixed cell sizes d. neither atm nor fr are connection-oriented protocols

Answers

It is TRUE to state that  Frame Relay (FR) consists of variable-sized data frames, whereas  Asynchronous Transmission Mode (ATM) is comprised of fixed cell sizes. (Option C)

What is Frame Relay?

Frame Relay is a defined wide area network technology that uses packet switching to specify the physical and data connection levels of digital telecommunications channels.

Frame Relay is a packet-switching network technology that operates at the network's data connection layer. It is used to link LANs and to carry data over Wide Area Networks (WANs).

Asynchronous Transfer Mode is a telecommunications standard created by the American National Standards Institute and the International Telecommunication Union-T for the digital transfer of various types of traffic.

Asynchronous transfer mode (ATM) is a wide-area network (WAN) technique that effectively and flexibly arranges information into cells; it is asynchronous in the view that the recurrence of cells relies on the needed or instantaneous bit rate.

Learn more about  Asynchronous Transmission Mode:
https://brainly.com/question/7475174
#SPJ`1

Other Questions
what replaced magazines such as life as the primary method for people to get the news and learn about the world? test 2 The best farmland in Kenya is the savanna.True False What is the range of the function?f(x)=3x12Enter your answer, in interval notation, in the box.range: the primary health care provider prescribes adalimumab. the nurse would prepare to administer this drug by which route? What are 4 physical signs of an eating disorder? Choose all types of sensations that depend on the activation of mechanoreceptors?. the mean score of 888 players in a basketball game was 14.514.514, point, 5 points. if the highest individual score is removed, the mean score of the remaining 777 players becomes 121212 points. what was the highest score? a young child has been brought to the clinic with signs and symptoms that are consistent with otitis externa. what assessment question should the nurse ask to address the etiology of this health problem? Exercise does not improve your social and mental health. true or false The Fashion Store sells fashion items. The demand for one selling season is random and unknown. The store must order inventory many months in advance of the selling season to get a good price on the items and to ensure they arrive right before the selling season. Each unit costs Fashion $100. These units are sold to customers at a price of $250 per unit. Items not sold during the season can be sold to the outlet store at $80 per unit.a. Based on the information above, is the optimal service level more or less than 50%? Provide your answer with a justification.b. If the demand of the fashion items follows a normal distribution, then should the optimal order quantity be more or less than the mean of the demand of the fashion items? Provide your answer with a justification. The graph shows a scatter plot for a set of data. Scatter plot with x-axis labeled year and y-axis labeled megawatts. The 18 points plotted are 1982 and 76.2, 1983 and 50.6, 1984 and 46.4, 1985 and 35.5, 1986 and 31.1, 1987 and 26.1, 1988 and 21, 1989 and 15.6, 1990 and 14.9, 1991 and 13.8, 1992 and 13, 1993 and 13, 1994 and 10, 1995 and 10, 1996 and 7, 1997 and 6.9, 1998 and 6.6, and 1999 and 6. What type of correlation exists? Is the model linear or non-linear? The graph shows a negative correlation, and it is a linear model. The graph shows a positive correlation, and it is a linear model. The graph shows a negative correlation, and it is a non-linear model. The graph shows a positive correlation, and it is a non-linear model. how would teh nurse respond to the parents of anewborn with phenyleketonuria who ask how long will our hcild have ot b eon this diet 14. calculate the stopping distance if landing with a 10 knot headwind on a runway at 7000 ft. msl (assume icao standard conditions). why is it important to perform this reaction in a styrofoam cup? how might your results change if you used two styrofoam cups? When the adhesive forces between a liquid and the walls of a capillary tube are greater than the cohesive forces within the liquid. what is the mass of a large ship that has a momentum of 1.54 109kgm/s, when the ship is moving at a speed of 48.7 km/h? If you travel from the United States to Spain, then you must have a passport. Can this be written as a biconditional? If so, what is the biconditional.If you have a passport, then you travel from the United States to Spain.You travel from the United States to Spain if and only if you have a passport.You have a passport if and only if you travel from the United States to Spain.This cannot be written as a biconditional. when administering measles, mumps, rubella (mmr) and pneumococcal conjugate vaccine (pcv13) to a patient at their 15-month appointment, what must be considered regarding vaccine spacing? Identify the adverbial phrase in each sentence.The students in class could see the dark clouds through the window.For a minute and a half, the alarm bell was ringing.Javiers uncle lifts weights every single morning. According to the sternberg's triarchic theory of intelligence, information synthesis is a strong component of which type of intelligence? (site 1)