Question #2
Multiple Choice
What is the index of 7 in this list?
[5, 6, 10, 7, 3, 2.5]

A ) 3
B ) 2
C ) 4
D ) 7

Answers

Answer 1

Answer:

C.

Explanation:

mukhang

letter

C.

pambihira

ka

naman

bat

hindi

ka

magtanong

sa

mga

nakakatanda

mong

kapatid

Answer 2

Answer:

The answer to your question is C. Have a wonderful safe day. <3 <3 <3

Explanation:


Related Questions

Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.

Question 6 options:

True

False

Answers

Answer:

True

Explanation:

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

They are connected through networks

Explanation:

N/A

Answer:

the other guy is correct

Explanation:

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.

Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?

Answers

Explanation:

It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.

In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.

If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:_______a. shared content with version management b. shared on Google drive c. shared content with no control d. shared with the public e. shared content with version control

Answers

Answer:

d

Explanation:

Because a decimal number

If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is considered to be a: c. shared content with no control.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.  Thus, it offer or avail individuals and businesses a fast, effective and efficient way of providing services to their clients over the internet.

Generally, cloud computing comprises three (3) service models and these are;

Infrastructure as a Service (IaaS). Software as a Service (SaaS). Platform as a Service (PaaS).

A file server can be defined as a type of computer that centrally stores, manage and fetch all data files (audio, image, text and video) as they are requested over the internet or network by end users (clients).

An access control refers to a security technique that is used to determine whether a user has the minimum requirements (credentials) to access, use or view resources such as documents on a computer by ensuring they are who they claim to be (authentication).

In this context, when a document (content on a computer) is shared on a file server without the implementation of an access control, the file can be anonymously edited by end users because it won't ask or request for authentication.

However, a shared content on a file server with an access control would only grant permission to authorized users while denying other users access to edit or modify its content.

Find more information: https://brainly.com/question/14014672

I need help with my previous question please

Answers

I can’t find your previous question :(

Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview

Answers

Answer:

Page Layout view

Explanation:

Answer:

C. Page layout view

Explanation:

A man is charged a fee by the city for having numerous broken cars and auto parts in his front yard. Which of the following correctly describes why the city punishes him? He has committed a crime. He is in violation of a city statute. He has violated an amendment of the U.S. Constitution. A judge has decided that he is in violation of civil law.

Answers

Answer:

Violation of city Statute

         

Answer:

B

Explanation:

What are three techniques used to generate ideas? O A. Free writing, brainstorming, and concept mapping O B. Free writing, clustering, and detail mapping O c. Free writing, pre-writing, and drafting O D. Pre-writing, drafting and revision​

Answers

freewriting brainstorming and concept mapping

Both pre writing and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

What is Pre-writing or surveying?

Pre-reading or surveying is the process of skimming a text to locate key ideas before carefully reading a text (or a chapter of a text) from start to finish. It provides an overview that can increase reading speed and efficiency.

Reading strategies aim to facilitate the understanding of difficult texts. These strategies are very effective and can facilitate not only reading but also the interpretation of the text. Among the reading strategies, we can mention the use of context clues, which facilitate the understanding of difficult and unknown words.

Synthesizing the text is also a very beneficial strategy, as it allows the text to become smaller, more objective, and direct. Reading strategies should be used even by people who find it easy to read texts with different difficulties, as it allows the text to be understood in a deeper and more complete way.

Therefore, Both prereading and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

More information about context clues at the link:

brainly.com/question/8712844

#SPJ2

Which of the following tools can be used to aggregate relational data from multiple sources?
A.)Power Pivot
B.)PivotTables
C.)Get & Transform

Answers

Answer:

ApOWER PIVOT

Explanation:

The tools that can be used to aggregate relational data from multiple sources is Power Pivot.

Data aggregation is the known as putting or gathering of data and presenting a summary form of it.

The data can be gathered from multiple data sources with the intent of combining these data sources into a summary for data analysis.

conclusively, Data warehouses gives users room to run queries, compile reports, generate analysis, and retrieve data in a consistent format.

Learn more from

https://brainly.com/question/21263038

Write a function that returns a pointer to the maximum value of an array of float ingpoint data: double* maximum(double* a, int size) If size is 0, return NULL.

Answers

Answer:

double * maximum( double arr[], int size){

   int max = 0;

   if ( size == 0){

       return 0;

   } else {

        for (int i = 1; i < size; i++){

           if (arr[i] > arr[0]){

               max = arr[i];

           } else {

               max = arr[0];

           }

         }

         return max;

   }

}

Explanation:

The C++ source code above returns the maximum value of an array as a pointer. The function accepts two parameters, the array in question and the size of the array. The for loop iterates over the items in the array and checks for the largest, which is returned as a pointer since the function "maximum" is defined as a pointer to the floating-point number memory location.

Other Questions
The Epic of Gilgamesh is the world's oldest known Select one:a. written law codeb. cuneiform writingc. example of literatured. hieroglyphics HELP ASAP! Given f(x) = ax^2 + c, list each characteristic of the function.What does a do?What shifts the graph from going up to going down?What does x^2 do?What does c do?What is the vertex? 2. The cost of a computer has been discounted by $239, so that the sale price is $1230.Find the original price of the computer, c, by solving the equation: C 239 = 1230 What were the economic effects of the silver trade? are these all right?? PLS HELP IM SO DUMB AHAH. What do the precise words tell you about the different peoples reactions to the fish?Everyone at the table thinks that it looks delicious.Robert finds it unpleasant, and the author is embarrassed by it.It looks delicious, but it has a terrible taste and smell that causes Roberts reaction. The relatives pretend to like it, while Robert clearly shows that he does not. Eric wants to send a package to his mother. If he chooses UPS, the fixed express fee is 10 dollars and each kilogram costs 2 dollars. For Fedex, the fixed fee is 20 dollars and each kilogram costs only 1 dollar. If the total costs of the two options are the same, how many kilogram of package does Ericsend? Write a system of equations in order to solve this problem. ANSWER CORRECT AND I'LL DO ANOTHER QUESTION AND GIVE YOU 100 POINTS!!!! DUE SOON! ONLY ANSWER IF YOU KNOW IT PLEASE! GIVING BRAINLIEST!1:Define Navigation Acts, Dominion of New England, English Bill of Rights.2 Define: Mercantilism, Import, Export, Enumerated article, Legislature, Indentured servant.3: List three ways in which the Navigation Acts helped England.4: How were governments of the colonies organized? What was the location of the Gettysburg Address? Richmond, Virginia Battle cemetery Washington, D.C. O Mississippi River Write the slope intercept form of the equation. PLEASE HELP Which ordered pair is part of the solution set of the inequality 5-y5-3x? Oa (3,-5) Ob. (-3,-5) Oc. (2,-1) Od (-2,-1) what is the answer? pls help ill mark you brainliest! How did Baron von Steuben contribute to the American Revolution?A.He smuggled guns and gunpowder from Spain in order to supply the Continental Army.B.He spied on the British troops and used the information he learned to prevent two battles.C.He trained American soldiers and helped the Continental Army become better organized and more skilled.D.He developed a secret code to help generals and other army leaders send messages to each other and their troops. thx u help now ok yeah select the factored form of this expression if it cannot be factored select already factored 2x-4(A) already in factored form(B) 2(x^2-2)(C) (2x-2)(2x+2)(D) 2x(x-2) a jar contains 10 caramels 5 mints and 15 dark chocolates what is the probability of selecting vs mint expressed as show ur working out How are the magnetic field lines near the south pole of a magnet affected when a second south pole is brought near it? The field lines combine with the lines around the second south pole. The field lines overlap with the lines from the second south pole. The field lines bend toward the second south pole. The field lines bend away from the second south pole. what is 2 x 8 x 10987 Helppppppppppppppppppppppppppppppppppppo