A good practice when using public domain content is to

a. Credit the source
b.Get a copy of the trademark
c.Make donations when able
d.Ask for permission

Answers

Answer 1
Maybe try C I don’t really get it

Related Questions

Case Project 2-1: The Differences Between IPv4 and IPv6 You are a network engineer for an IT consulting firm named F1IT. One of your clients, Beautivision, a chain of plastic surgery clinics with 80 locations nationwide, has asked you to prepare a proposal for implementing IPv6 in Beautivision’s corporate headquarters, its WAN network, and its clinic locations. In preparation, you need to create a one- to two-page memo that describes the main differences between IPv4 and IPv6. Write the memo to Mary Jane Newman, communications manager for Beautivision. When preparing the memo, keep in mind that Ms. Newman has some knowledge of information technology but is not an expert.

Answers

Answer:

Following are the difference to this question:

Explanation:

IPv4:

The [tex]IPv_4[/tex] is uses the packet changed method, that is a Link Layer networks(like Ethernet).  It has 4.3 billion addresses capacity. It uses the 32-bit logical device address, that written in decimal language. It is divided by 4 bytes E.g. 192.168.1.1  

The host part and network part are 2 parts. For a network, the host part may vary, while for the entire subnet, the network part remains equal. The scheme of 232 addresses is available on application depends on security.

IPv6:

The IPv6 is used in the internet protocoland it is higher than IPv4. It can provide endless number Opf addresses, and use to solves the problem of IPv4 exhaustion and satisfies  the demand for rising networking.

IPv4 Substitutor Built to meet more IP address requirements. In the Logical address of 128-bit Written hexadecimally and with colons divided, and the Space of 128 addresses are required. IPsec is an integrated security feature.

what is the mest gun in pixel gun 3d imma give you brainliest

Answers

Answer:

The Mest Gun or the gun on your avatar

Explanation:

Because typo!!

What is that I would like to know?

is this very epik or not?

Answers

Answer:

e p i k ༼ つ ◕_◕ ༽つ

Answer:

much epic

Explanation:

14^6×15^5÷35^6×6^5




can anyone help me to solve this question​

Answers

Answer:

(7^6×2^6×5^5×3^5)÷(7^6×5^6×3^5×2^5)

7^(6-6)×2^(6-5)×5^(5-6)×3^(5-5)

7^0×2¹×5-¹×3^0

1×2×5^-1×1

2/5

Your program for a game allows users to choose a car to drive. You have 50 models.


You have designed each model to have different qualities, such as maximum speed, ability to turn tight curves, fuel usage rate, etc.


Which collection is best to store the characteristics of each model?



list


tuple


deque


dataset


Will Give Brainliest to Best or correct answer

Answers

Answer:

dataset

Explanation:

For the information being described the best collection to store this data would be a dataset. This is mainly due to the fact that each individual car has a wide range of separate variables and values that are attached to each car model. Such variables/values include maximum speed, ability to turn tight curves, fuel usage rate, etc. The dataset allows each individual model to be registered alongside all of their individual characteristics/qualities. Therefore, connecting each model with their own data.

Answer:

Deque is the right option

Explanation:

deques are more useful for large amounts of data and will locate specific things faster (E2020)

what is two examples of software and hardware?​

Answers

Answer:

Hardware Software

If hardware is damaged, it is replaced with new one. If software is damaged, its backup copy can be reinstalled.

Ex: Keyboard, Mouse, Monitor, Printer, CPU, Hard disk, RAM, ROM etc. Ex: Ms Word, Excel, Power Point, Photoshop, MySQL etc.

Explanation:

Answer:

hardware= key board ,mouse

software =excel,power point.

Help me with this please

Answers

Answer:

q1 chees

q2 web and digital continant

Explanation:

because haaa haaa haa dhum

10. There is repeated code in these onevent blocks. Choose the correct code for the updateScreen() function which would be called in each of the onEvent blocks.

1

var counter

0;

2

3

onEvent("upButton", "click",

function

4

counter

counter + 1;

5

setText ("counter_label", counter);

set Property ("counter_label", "text-color",

6

"red");

7

if

counter

8

set Property ("counter label",

"font-size", 24);

9

10

11

onEvent ("downButton",

"click",

function

12

counter

counter

Answers

Answer:

front zise24

Explanation:

on event down botton

The correct code for the updateScreen() function which would be called in each of the onEvent blocks is setText ("counter_label" counter) = = 0.

What is a function?

A function refers to a set of statements that makes up an executable code and it can be used in a software program to perform a specific task on a computer.

In this scenario, the correct code for the updateScreen() function is written as follows:

function updateScreen()   { ⇒

       setText ("counter_label" counter)  {

       if (counter == 0);

          setProperty ("counter_label", "font-size", "24") ;

       }                         +

}

In conclusion, the executable code for the updateScreen() function which would be called in each of the onEvent blocks is "setText ("counter_label" counter) = = 0."

Read more on function here: brainly.com/question/20264183

#SPJ2

The goal of a system is to

a) be natural or human-made

b) use energy

c) perform a task

d) be social or physical

Answers

Answer:

d it is d I know cause I answered it on a test I had

hope it helps

Which type of data is is usually collected as numerical data that can be presented in a graph or chart?

Answers

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

How will you define a text?

Answers

Answer:

Text refers to content rather than form; for example, if you were talking about the text of "Don Quixote," you would be referring to the words in the book, not the physical book itself. Information related to a text, and often printed alongside it—such as an author's name, the publisher, the date of publication, etc.—is known as paratext.

The idea of what constitutes a text has evolved over time. In recent years, the dynamics of technology—especially social media—have expanded the notion of the text to include symbols such as emoticons and emojis. A sociologist studying teenage communication, for example, might refer to texts that combine traditional language and graphic symbols.

Explanation:

I Hope it help

Why is it important to organize your computer files?

“With a explanation”

Answers

Answer:

Explanation:

Keep your computer files organized to make them easy to find and access. Your personal computer can be a wonderful tool. It can provide you access to the Internet, give you a place to store photos and documents, and allow you to easily do many tasks that might have once been difficult.

Answer:

It's important to organize your computer files for many reasons. It can be neat, and when you want to look for something, you can easily find it. You won't have to dig through to find something you need and you might be able to impress people with your neatness

Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is
this?
А. NIC
В. hub
C. modem
D. switch
E. bridge

Answers

it’s a modem which is like a router

The image shows various objects.

A microscope, calculator, pen, beakers with liquid, and test tubes with liquid sitting in a rack.
The items in the image show tools most useful in

illustrating a project.
conducting an experiment.
administering a test.
asking research questions.

Answers

Answer:

B. conducting an experiment.

Explanation:

Environmental science can be defined as an interdisciplinary field of science that comprises of chemistry, economics, engineering, zoology, geography, geology, biology, ecology, physics, etc., used for the study and understanding of various environmental factors, issues in relation to human life.

All of the laboratory tools such as conical flasks, microscope etc shown in the attached image are used by scientists, biochemists, and laboratory technologists, for conducting an experiment.

An experiment can be defined as an investigation which typically involves the process of manipulating an independent variable (the cause) in order to be able to determine or measure the dependent variable (the effect).

This ultimately implies that, an experiment can be used by scientists to show or demonstrate how a condition causes or gives rise to another i.e cause and effect, influence, behavior, etc in a sample.

Answer:

Lanuel  is correct

Explanation:

A key and scale are important components in what visual aid?

pie charts
line graphs
maps
diagrams

Answers

Answer:

maps

Explanation:

I hope it's help you

Can someone please tell me how to save a screenshot on windows 10?
I have to do this assignment for tec and I don't understand how to do it.
PLEASE DON'T USE ME FOR POINTS!! Please and Thank you!

Answers

Answer:

u just press windows botton and shift and s lol

Explanation:

u can also search up this by tyoing "How to take a screenshot on windows 10" if this does not work.

:)

Your ____ should always be bigger than your gutters

Answers

Answer:

Roof.

Explanation:

I don't know, lol.

Hubris

i think
Maybe prob wrong

Erin would like to add a photo to a presentation. However, she only has the printed copy of the photo. She does not have a digital copy. What should Erin do?

Answers

Answer:

Erin should scan the photo.

Took it on Edge <3

Answer:

Erin should scan the photo.

Explanation:

That´s what I thought :)

what is a password attack?

Answers

Answer:

A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.

Answer:

A hacker trying to hack into your accounts/systems by cracking your password.

Last two question, Let's go

Answers

For question 9, it's science

for question 10 it's the "world works"

Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning food, calories, fat grams, protein, cholesterol, and sodium. Alicia should use a _____. word processor smart card digital ink pen database

Answers

Answer:

database

Explanation:

As a dietitian, Alicia must be well-grounded with the way diet and nutrition work in relation to health and disease. So, provided she wants to organize a huge amount of data on this particular field, she should consider the use of a database. This is because the information in the database is well organized and regularly structured. It can also serve as a means of storing, retrieving, and manipulating data sets.

Most jet engines today use what type of design?

Answers

Answer:

Explanation:

The 5 Main Types of Aircraft Jet Engines

Turboprop Engine.

Turbojet Engine.

Turboshaft Engine.

Turbofan Engine.

Ramjet Engine.

plz help im timed
An artist posted a picture of a painting on his website in order to sell it. Another business copied the picture and used it as a background on a website without giving credit to the artist. This action is most strongly related to which aspect of life?

culture

society

ethics

economy

Answers

Answer:

i believe C. Ethic

Explanation:

Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of correct and wrong behavior". The field of ethics, along with aesthetics, concerns matters of value, and thus comprises the branch of philosophy called axiology.

Camille wants to buy a game online for her little sister’s birthday. She would like it to be a surprise but is worried that her sister will find a record of the purchase on the family computer. Camille can keep this a secret by:

A.
erasing her digital footprint.

B.
using only certain gaming sites.

C.
clearing her browser history.

D.
stopping advertisers from using her information.

Answers

Answer:

Clearing her browser history.

Explanation:

I’m pretty sure it’s c

hanna specifies the constants 7, 3, 3, and 5 as the arguments of a function. the function returns the result 18. which function does hanna use?
=____ (7,3,3,5)
[using spreadsheets for data analysis, plato]​

Answers

Answer:

The sum function

Explanation:

Given

Arguments:  (7,3,3,5)

Result = 18

Required

Determine the function used

When the arguments are added together, we have:

[tex]Result=7 +3 + 3 + 5[/tex]

[tex]Result = 18[/tex]

Ths implies that the function used is the SUM function and is used as:

=SUM(7,3,3,5)

Answer:

The Answer is SUM

Explanation:

It says spell all words correctly so no #(Numbers)#

7.3 Code Practice edhesive

Write a function named print_sum that accepts three numbers as parameters and prints the sum. First, write the print_sum function. Then, prompt the user for three inputs, and call your print_sum function on those inputs.

Sample Run:
Enter the 1st number: 11
Enter the 2nd number: 9
Enter the 3rd number: 8
The sum: 28

Answers

def print_sum(a,b,c):

   print(a+b+c)

one = int(input("Enter the 1st number: "))

two = int(input("Enter the 2nd number: "))

three = int(input("Enter the 3rd number: "))

print_sum(one,two,three)

I wrote my code in python 3.8. I hope this helps.

Following are the python program to the given question:

Program Explanation:

Defining a method "print_sum" that takes three parameters "n, x, g".Inside the method, a "print" method is used that adds the value of the parameters and prints its value with the message.In the next step, the "n, x, g" variable is defined that inputs and store its value.At the last, the "print_sum" method calls that accept values.

Program:

def print_sum(n,x,g):

   print("The Sum : ",n+x+g)

n=int(input("Enter the 1st number: "))

x=int(input("Enter the 2nd number: "))

g=int(input("Enter the 3rd number: "))

print_sum(n,x,g)

Output:

Please find the output file in the attachment.

Learn more:

brainly.com/question/16690412

Select the correct answer.
Which of these factors can be created as a physical model?
OA
a next-generation car
OB.
software code
OC. website address
OD.
conversion of energy
O E knowledge of a product

Answers

A. a next generation car

When inserting a comment in a cell, the command on the Review tab is New Comment, but if you right-click in the cell,
what command would you choose from the shortcut menu?

A.)New Comment

B)Insert Comment

C)Review Comment

D)Add Comment

Answers

Answer:

B) Insert Comment

Explanation:

Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.

When inserting a comment in a cell, the command on the Review tab is New Comment, but if you right-click in the cell, the command you would choose from the shortcut menu is Insert Comment. The shortcut key for Insert Comment is "Shift+F2."

Which of these is an example of a system?

a circle

force

a single particle of matter

scissors

Answers

Answer:

force and a single particla of matter

Zareen used a school computer to create a fake
website where she posted pictures and rude
comments about her former friend.
What consequences could she face from school
officials for her actions? Check all that apply.
She could have her technology privileges taken
away.
She could face a severe financial penalty.
She could spend time in a juvenile detention facility.
She could face detention or suspension.
O She could be forbidden from attending school social
events.
She could be denied access to certain websites.

Answers

Answer: She could have her technology privileges taken away, She could face detention or suspension, She could be forbidden from attending school social events, She could be denied access to certain websites.

Explanation: ADEF on Edge 2021

The  consequences could Zareen  face from school are-

She could have her technology privileges taken away.She could be denied access to certain websites.She could face detention or suspension.What is a computer?

A computer is referred to as an electronic device that is used to perform arithmetic and logical operations quickly and accurately without causing any error in the result.

In the given case, it is explained that A girl named Zareen used a school computer to post comments inappropriate and rude comments about her former friend by creating a fake website.

This shows that Zareen has violated someone's personal privacy which can result in severe actions against her so the school may restrict her to use this kind of website.

As she disturbs someone's personal or social image it can cause her with suspension from school. The school may restrict her to use any kind of technology due to her immature and rude behavior.

Learn more about computers, here:

https://brainly.com/question/1380748

#SPJ5

Other Questions
Question 1 (2 points)Which of the following would be an example of a closing?I can't wait to see you again!Yours truly,Dear Miranda,June 12, 2013 Is Danganronpa a good game for the career criminology? HELP ME PLEASEEEE HELPPPPPPPPPPPP Which of the following statements is TRUE?a.Many tribes encroached upon reservations after successful peace negotiations with the U.S.b.Quakers were assigned to encroach upon Native American tribes in their negotiations.c.Tribal raids continued in reaction to American encroachment on the frontier.d.Quakers used encroachment to help Native Americans assimilate to life on reservations. Silvia has a coupon for 25% off an item that regularly costs $8. How much will Silvia pay if she uses the coupon? Answer the following questions 27 is what percent of 1875 Find the missing sides using special right triangles What were characteristics of life in Athens but not in Sparta?Select all correct answers.democratic form of governmentunquestioning obedience to authorityopenness to new ideasemphasis on military education Steven and Mark each carried 48 ounces of juice for trekking. At the end of their journey, Steven's juice bottle was 3/4 empty and Mark's bottle was 2/3 empty. Which of the following sentences is correct?A. 28 ounces of juice was remaining at the end of their journey.B. 4 ounces of juice was left at the end of their journey. C. Mark drank 36 ounces of juice during the journey. D. Steven drank 32 ounces of juice during the journey. what is x??????????? Mateo started with morethan 100 boxes of cookies tosell He sold 25 boxes. Afterselling 25 boxes, how manymore boxes can he sell tosell them all? Substance X has a specific heat capacity that is twice as large as Substance Y. If both samples ended up at the same change in temperature from the same amount of energy added, what is the relationship between the masses of the two samples? Explain. Which of the following lists of ordered pairs is a function?O A. (2, 4), (0, 2), (2, -4), (5,3)O B. (1,6), (2,7),(4,9), (0,5)O c. (0, 2), (2, 3), (0, -2), (4,1)O D. (1, 2), (1, -2), (3, 2), (3, 4) WILL GIVE BRAINLIEST!!In the Andes Mountains, how does energy flow in an ecosystem that contains grasses and shrubs, pumas, and guanacos?guanacos to grasses and shrubs to pumasgrasses and shrubs to guanacos to pumaspumas to grasses and shrubs to guanacospumas to guanacos to grasses and shrubs Find the area of these shapes Plssssssss Help!!!! Fill in the chart to compare Socrates with the Sophists. 44 is 25% of what pls help they gave me these without teaching them What is the 27th letter in the alphabet? And the 4 in Greek alphabet? 5. By about how much did average global temperatures increase from 1880 to2020?*