Answer:
The contents of the portfolio will depend on individual education, work experience and future goals
Explanation:
The contents of the portfolio will depend on the following -
a) Work biography/experiences
b) Career goals
c) personal details
d) contact information
e) Professional photograph
f) Relevant skills
g) Relevant documents, certificates, degree etc.
etc.
Answer:
target audience
Explanation:
plato/edmentum
In thinking ahead to the future of technological innovation, what new technology products or digital software do you/would you like to see in the future?
Answer: Flying cars with jet propulsion in the wheels to lift it up in the air.
Students who understand what the teacher is saying do not need to take notes.
Please select the best answer from the choices provided
T
F
Answer:
false
Explanation:
edge 2022
que es la felicidad??
One benefit of proprietary licensed software is that it
is free of cost
will always be supported.
has undergone quality assurance testing.
comes with a EULA that guarantees access to source code.
Answer:
has undergone quality assurance testing.
Explanation:
Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical? native web hybrid mobile
Answer:
Hybrid.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.
Some of the models used in the software development life cycle (SDLC) are;
I. A waterfall model: it can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.
II. An incremental model: it refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.
III. A spiral model: it can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.
Basically, softwares are categorized into three (3) main categories based on the development platform and these are;
a. Web application.
b. Native application.
c. Hybrid application.
A hybrid application is a type of software application that is designed based on the combination of the elements of both web applications and native applications.
Typically, a hybrid application is a web application that is developed in a native application shell, using a standardized web programming language such as CSS, JavaScript, and HTML.
Generally, a hybrid application avails a programmer the opportunity to write a code for a mobile application once while accommodating or being compatible with multiple app platforms such as Android, Windows, iOS, etc.
Hence, a hybrid application is the best choice of an application when it's critical for the end users to be able to use the features associated with a device such as a mobile phone but performance isn't critical.
Answer: Hybrid
Explanation: Hybrid apps are suited to situations where performance is not critical but using the device’s features are.
Ask how many apples the user wants. Ask how many people the user will share the apples with. Find out how many apples will remain if you share the apples equally. Hint: use modulus %.
Answer:
The program in Python is as follows:
apples = int(input("Apples: "))
people = int(input("People: "))
apples%=people
print("Remaining: ",apples)
Explanation:
This gets the number of apples
apples = int(input("Apples: "))
This gets the number of people to share the apple
people = int(input("People: "))
This calculates the remaining apple after sharing the apple evenly
apples%=people
This prints the calculated remainder
print("Remaining: ",apples)
what are human made materials ?
Answer:
Natural materials may include wood, cotton, fur, or wool. Human-made materials may include plastic, rubber, glass, and Styrofoam.
Which of the following are items that are concerns for e-government?
Check all of the boxes that apply.
sharing information with people
sharing trustworthy information
keeping personal information safe
catching people who plagiarize
Answer:
I. Sharing information with people.
II. Sharing trustworthy information.
III. Keeping personal information safe.
Explanation:
Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.
An e-government is abbreviation for electronic government and it can be defined as the strategic use of information and communication technology (ICT) such as the internet, computers, etc., to effectively and efficiently to enhance high level of growth and development in the public sector i.e delivering reliable and credible government services to the citizens and businesses.
The following are items that are concerns for e-government;
I. Effectively and efficiently sharing information with people in a timely manner.
II. Continuously sharing trustworthy and credible information.
III. Keeping personal information of the citizens, employees and business partners safe.
Answer:
A.B.C
Explanation:
Give 3 advantages of using shortcut key, especially in MS Office.
Answer:
Efficient and time-saving. Using shortcuts makes you more efficient at doing certain tasks on your computer. ...
Multi-tasking. Being a multi-tasker is sometimes required in life. ...
Health benefits.
In the space provided, explain the evolution of newspaper reporting, from the early 1900s to the Digital Age.
The first newspaper,daily doings, was published by the ancient Romans in 59 BCE. In the new era, the newspaper is evolving continuously.
What is newspaper?A newspaper is a bimonthly publication that contains written information on current events and is often typed in black ink on a white or gray backdrop.
The publication has gone through several changes during its lengthy and complicated existence.
Examining the history of newspapers can provide insight into how and why they have grown into the diverse media that they are today.
The first newspaper, daily doings, was published by the ancient Romans in 59 BCE, according to scholars. Despite the fact that no copies of this periodical have survived.
it is usually assumed that it chronicled events, assemblies, births, funerals, and daily gossip. These handwritten Avis, or gazettes, covered politics and military engagements.
Hence,the newspaper is evolved before 1900s and growing to a new digital Age.
To learn more about newspaper, refer:
https://brainly.com/question/21528399
#SPJ2
NEED HELP IMMEDIATELY MY COMPUTER IS DOWN AND I CANT SEARCH ANYTHING.
Fun facts about Nevada?
Nicknamed the "Silver State", Nevada is actually the largest gold-producing state in the U.S. and fourth-largest in the world.
What does FPS stand for?
Film Production Studio
O Footage Per Second
O Film Perspective Sound
O Frames Per Second
Answer:
D) or Frames Per Second
Explanation:
Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio violates a a nondisclosure agreement. •check whether the content in the portfolio corresponds to the job requirements. •make sure that I am clear about my role in creating each document in the portfolio.
Which element of the portfolio does this checklist best apply to?
A.Cover letter
B.resume
C.templates
D.writing samples
E.task summaries
Answer: A. Cover letter
Explanation:
The element of the portfolio that this checklist best apply is the cover letter. The cover letter is a document that a job applicant will send along with his or
her resume in order to provide additional information with regards to the skills and experience that the person possesses and why the person is qualified for the position.
Since Antwon checks whether the content in the portfolio corresponds to the job requirements and also made sure that his role in creating each document in the portfolio is clear, this is a cover letter.
Which function can be used to find the date of the last payment made on a customer account? average count order maximum
Answer:
the answer is going to be c, order
Explanation:
this is because whenever a consumer or customer orders something, a product, or a good, companies may go back into records of a customer’s account and see the last order they made. also i took the test on edgen 2021. hope this helped!
To see if a website is using a secure connection, what should you look for?
Question 8 options:
A plus sign (+) to the right of the tab
A star icon to the right of the URL.
A lock icon to the left of the URL.
A minus sign (-) to the right of the tab.
Answer:
A lock icon
Explanation:
Well, take a look at brainly that uses HyperText Transfer Secure
Btw it's to the left
PLEASE HELP ME ITS A TIMED TEST
Select all that apply.
Carmen wants to do a basic search on the Internet to find what software can be used to do data mining. Select each of the steps Carmen should complete.
A. Navigate to a search engine.
B. Type "software data mining."
C. List the synonyms for software.
D. Select the keywords "software" and "data mining."
E. Create a link.
F. Press Enter.
G. Form the question: What software can be used to mine data?
There are ways to mine data. The steps Carmen should complete are:
Press Enter.Navigate to a search engine.Form the question: What software can be used to mine data?List the synonyms for software.Select the keywords "software" and "data mining."Type "software data mining."What is data mining?Data mining is regarded as the act or the process of sorting that is often done through a large data group to known the patterns and relationships that can help handle business issues via data analysis.
Note that Data mining methods and tools helps firms to predict future trends and as such can make more better and informed business decisions.
Learn more about data mining from
https://brainly.com/question/26885075
Q2. What does JSON stand for? Can you give an example of a JSON object. Q3. What is the purpose of a "projection" in a find query for MongoDB?
Answer:
Q2: JavaScript Object Notation
Q3: The $project function in MongoDB passes along the documents with only the specified fields to the next stage in the pipeline. ... The specification for $project command contain the inclusion of fields, the suppression of the _id field, the addition of new fields, and the resetting the values of existing fields.
Explanation:
write short cut of
fully justified
Answer:
To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L
One benefit of open source software is that it
is free of cost.
allows access to the source code.
has robust training and support.
requires less technical expertise.
Answer:
allows access to the source code
Explanation:
this means you can edit and customize it however you wish
an example of one is AnkiDroid
Answer:
Its B
Explanation:
the second one
Create a paper of at least 1,800 words describing the situation you selected and explaining the logic that would support an array.
Answer:
I dont know about 1800 words but I sure can tell you abit about array
Explanation: Array in simple sense refers to a collection of similar data. It holds data which is homogeneous in nature, meaning they are all alike. The use of array provide a lot of advantages in the fields of computer programming. When you declare a variable for an array, you can store as much data as you wish in the same variable without having to declare many variables. A 2X2 dimensional array can also be used in programming which represents matrices as well. The search process in an array too is really convenient and time saving. Also in an array, accessing an element is very easy by using the index number.
To figure out how to use her MacBook Pro graphics software to update designs originally created on a DEC10, Marianne needs to use a ______ language?
Answer:
Glue Language
Explanation:
I'm not 100% sure, but here is the definition.
Glue language- A programming language that can be used to provide interoperability between systems not originally intended to work together
Requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites
Answer:
Live Telemedicine
Explanation: Telemedicine is a modern system of heath care where the medical care provider and the patient or client utilise the advances in telecommunications to share information about the medical/health needs of a client. In most cases the medical care provider and the client are in different locations communicating virtually. Live Telemedicine is becoming acceptable throughout the world especially in poor and developing countries like Nigeria.
What kind of variable will be created by a line of code that reads num1 = int(input("Please enter your favorite number.")) ? Group of answer choices a string a float an integer a generic
Answer:
An integer
Explanation:
Given
num1 = int(input("Please enter your favorite number."))
Required
The variable type
In Python, when an input is gotten through
var-name = data-type(input(Prompt))
The variable var-name assumes the datatype data-type
This implies that:
num1 = int(input("Please enter your favorite number."))
num1 will assume integer datatype
To open something, using a key or an electronic device/ to use a password in order to use a mobile phone
Answer:
yes that is true
Explanation:
true or false
trueeeee
Make the list of menu icon in MS Excel
●file
●home
●insert
●page layout
●formulas
●data
●review
●view
hi good morning
Type the name of the protocol for each protocol define on the table below
nonsense answers well be reported
Answer:
1. SSH/Telnet.
2. SMTP.
3. DNS.
4. DHCP.
5. HTTPS/SSL.
6. FTP
Explanation:
1. Provides connections to computers over a TCP/IP network: the standard protocol used for this is SSH/Telnet, through port number 22 and 23 respectively.
SSH is acronym for secure shell.
2. Sends e-mail over a TCP/IP network: SMTP using port number 25.
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
3. Translates URLs to IP address: DNS using port number 53.
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
4. Automates assignment of IP address on a network: DHCP using port number 67.
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
5. Securely transports web pages over a TCP/IP network: HTTPS/SSL using port number 443.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
6. Transports files over a TCP/IP network: FTP using port number 20 or 21.
FTP is an acronym for file transfer protocol.
Explanation:
I guess there is no need of mine for giving ans now
as the above guy has explained everything
You were recently hired by a small start-up company. The company is in a small office and has several remote employees.
You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power.
Which cloud service model should you use?
A) SaaS
B) PaaS
C) DaaS
D) IaaS
Answer:
D) IaaS
Explanation:
In this scenario, the best cloud service model would be IaaS. This stands for Infrastructure as a service (IaaS) and basically provides all the physical infrastructure that a company needs virtually. The company itself purchases a piece of software that allows them to remotely use all of the infrastructure provided by the service. Meaning they have access to computing power, data centers space, servers, networking, etc. without actually purchasing any of the physical hardware. This would solve all of "your" business needs as asked by the company.
Why is drive of value when pursuing a career in IT?
Without drive, a person may fall short in their career goals.
Drive is not of value.
Drive is only important when you work for Microsoft.
Drive is only needed when someone does not have a college degree.
Answer:
Drive is only important when you work for Microsoft.
Any shadow fight arena player in here
I'm No. 11 of the Fatui Harbingers, codename Childe, but I also go by Tartaglia. And you... Hmm, you too like to cause quite the stir, don't you? Something tells me we're going to get along splendidly.
Face me in person, man to man, and I'll always have a chance of beating you. Same goes if you're a deity or a monster from the abyss. But the Harbingers? They are more enamored with their intangible methods, spending their days scheming and maneuvering. This is why we cannot get along.
Comrade, a word of advice: Don't go yelling things in the heat of battle. They might sound good in your head, but if you think about it, they make no sense at all. I'm talking about things like, "I'm on fire!" That's the last thing we want. Fire leaves behind nothing but ashes. And you must survive at all costs.
Ah, how time flies. One day, you will see how I conquer the world and crush the thrones of gods beneath my heel. In the meantime... no dying, comrade! Keep yourself alive.
Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology? What are the requirements necessary to pursue this career?