component that collects data from peapleb or other devices and sends it to the computer us called​

Answers

Answer 1

The component that collects data from people or other devices and sends it to the computer, is called the Input device.

What are input devices?

The data is received by input devices in a format that the computer can understand, and it is then sent to the processing unit. The electronic circuitry in the processor, more formerly known as the central processing unit (CPU), transforms input data into the desired information.

Therefore, the input device is the part of the system that gathers data from people or other sources and transmits it to the computer.

To learn more about input devices, refer to the link:

https://brainly.com/question/13014455

#SPJ1


Related Questions

Importance of page break in Ms word

Answers

Answer:

Page breaks are used to end a page without filling it with text. To make sure the title page of your thesis/dissertation is separate from the signature page, for example, insert a page break after the graduation date on the title page.

PLEASE GIVE BRAINLIEST THANK YOU!!!

Research statistics related to your use of the Internet. Compare your usage with the general statistics.
Explain the insight and knowledge gained from digitally processed data by developing graphic (table, diagram, chart) to communicate your information.
Add informational notes to your graphic so that they describe the computations shown in your visualization with accurate and precise language or notations, as well as explain the results of your research within its correct context.
The statistics and research you analyzed are not accomplished in isolation. The Internet allows for information and data to be shared and analyzed by individuals at different locations.
Write an essay to explain the research behind the graphic you develop. In that essay, explain how individuals collaborated when processing information to gain insight and knowledge.

Answers

By providing it with a visual context via maps or graphs, data visualization helps us understand what the information means.

What is a map?

The term map is having been described as they have a scale in It's as we call the longitude and latitude as well as we see there are different types of things are being different things are also in it as we see there are different things are being there in it as we see the oceans are there the roads and in it.

In the US, 84% of adults between the ages of 18 and 29, 81% between the ages of 30-49, 73% between the ages of 60 and 64, and 45% between the ages of 65 and above use social media regularly. On average, users use social media for two hours and 25 minutes each day.

Therefore, In a visual context maps or graphs, and data visualization helps us understand what the information means.

Learn more about the map here:

https://brainly.com/question/1565784

#SPJ1

you have just configured the password policy and set the minimum password age to 10. what is the effect of this configuration?

Answers

Answer:

User cannot change the password for 10 days.

Which phrase best describes the hardware layer of computing abstraction?
A. The physical components of a computing system
B. The interface that allows users to run programs
C. The programs that give computers instructions
D. The system that manages a device's resources

Answers

Answer:

A. The physical components of a computing system

Explanation:

think of hardware like the hard, physical, tangible parts of your computer. hope this helped!!

"Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), random access memory (RAM), monitor, mouse, etc..."

how is interaction of electrons with the nucleus of an atom similar to the interaction of two magnets?

Answers

Answer:

One of the harder ideas to grasp in fusion is that nuclei, which, because of their electric charge, strongly repel at long range

(compared to the size of a nucleus), can strongly attract at short range. This activity allows students to explore a similar situation in

which

the magnetic interaction provides the repulsion (similar to the electric interaction within

the nucleus) and Velcro provides an attractive force at short range (similar to the nuclear

strong interaction).

Explanation:

When a code block is placed inside this loop, what happens to the code?

A. It repeats until the program stops running.

B. It repeats once and then stops.

C. It repeats a certain number of times and then stops.

D. It repeats as long as a certain condition is true.

Answers

When a code block is placed inside a loop, what happens to the code is that: D. It repeats as long as a certain condition is true.

What is a looping structure?

A looping structure can be defined as a type of function that is designed and developed (written) to instruct a computer to repeat specific statements, especially for a certain number of times based on some certain true condition(s).

The types of looping structure.

In Computer programming, there are different types of looping structure and these include the following:

If/Else StatementIf StatementFor LoopWhile LoopForever loopIndefinite loop

This ultimately implies that, a code block would repeat particular statements for a certain number of times (iterations) based on some certain true condition(s) in the looping structures.

Read more on loop here: brainly.com/question/26130037

#SPJ1

Answer:

C.

It repeats a certain number of times and then stops.

Explanation:

31
What is the different between Diaster.
and data inters integrity.

Answers

A disaster is a catastrophic event, typically one that is sudden and damaging.The accuracy and completeness of data are defined as data integrity.

What do you mean by Data integrity?
Data integrity
is a crucial component of the design, implementation, and use of any system that stores, processes, or retrieves data. It is the preservation and assurance of data accuracy and consistency over the course of its full life-cycle. The phrase has a wide range of applications and can signify quite different things depending on the situation, even within the same broad computing context. Data integrity requires data validation, which is sometimes used as a stand-in for data quality. The opposite of data corruption is data integrity. Any data integrity technique has the same main goal: to make sure data is recorded exactly as intended. Additionally, make sure the information is accurate when it is later retrieved.

To learn more about Data integrity
https://brainly.com/question/14127696
#SPJ1

Could some help me please

Design a program to determine if a student is entitled to an incentive granted upon payment of his/her Boarding Fee in full. Accept the boarding fee and the amount paid. Output a message stating whether the incentive will be granted. (Required: IPO Chart)​

Answers

The program to determine if a student is entitled to an incentive is illustrated below:

#include <stdio.h>

int main() {

int num;

printf("Enter an integer: ");

scanf("%d", &num);

// true if num is perfectly divisible by 2

if(num % 2 == 0)

printf("%d is even.", num);

else

printf("%d is odd.", num);

return 0;

}

python program.

num = int(input("Enter a number: "))

if (num % 2) == 0:

print("{0} is Even".format(num))

else:

print("{0} is Odd".format(num))

Pseudocode:

0. Start

1. Print "Enter Any Number to Check, Even or Odd"

2. Read input of a number

3. If number mod = 0

4. Print "Number is Even"

5. Else

6. Print "Number is Odd"

7. End

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

Source code refers to a computer program in its human-readable form. In this case, the program to determine if a student is entitled to an incentive granted upon payment of his/her boarding fee in full is given.

Learn more about programs on:

https://brainly.com/question/1538272

#SPJ1

Which activities would Full Screen Reading View be most helpful for? Check all that apply.
editing a document
removing text from a document
reading a document
Dwriting a document
looking at the layout of a document

Answers

Reading a document and looking at the layout of a document are the activities for which Full Screen Reading View is quite helpful.

What exactly is a Document?

A document is a type of information that may be useful to one or more users. This data can be in both digital and nondigital formats. As a result, a document can be digital or nondigital. Digital and nondigital documents are stored using various methods and layouts.

A nondigital or paper document can be physically stored in a file cabinet, whereas an electronic or digital document is stored as one or more files in a computer. A database can also include digital documents. Electronic document management software is used to manage, store, and secure electronic documents.

To learn more about Document, visit: https://brainly.com/question/28578338

#SPJ9

Can anyone hep me in this question pls?...

Answers

The operations from the highest priority to the lowest priority in Javascript are 1. Opeartions enclosed in parentheses 2. Exponentiation 3. Multiplication and divison and 4. Addition and Substraction.

What is Operator precedence?

How operators are parsed in relation to one another depends on operator precedence. Higher precedence operators become the operands of lower precedence operators.

Operator  Operation Order of Precedence Order of Evaluation

     ++         Increment           1                                  R -> L

     --         Decrement           1                                  R -> L

     -                  Negation           1                                  R -> L

     !                     NOT                   1                                  R -> L

 *, /, %      Multiplication,

                 division, modulus          2                                  L -> R

  +, —  Addition, subtraction  3                                  L -> R

   +              Concatenation          3                                  L -> R

 <, <= Less than, less than,

                       or equal                  4                                  L -> R

 >, >= Greater than, greater than,

                      or equal                 4                                 L -> R

To learn more about Javascript, visit: https://brainly.com/question/16698901

#SPJ1

Write an algorithm program to accepts two students score and print out who save the greater score

Answers

An algorithm is a set of clear instructions for solving a specific problem in computer programming. It generates the desired output from a set of inputs. And here the desired inputs are the scores of two students.

Algorithm to print greater score:

START

Take input Score from Student1 and assign it to Score1.

Take input Score from Student1 and assign it to Score2.

Compare the Score1 and Score2.

Assign the larger score value to Max_Score

Print Max_Score

END

What is Algorithm?

An algorithm is a set of instructions, or a set of rules to adhere to, for carrying out a particular task or resolving a particular issue. In the ninth century, the term algorithm was first used. There are algorithms all around us.

For example,

An algorithm to add two numbers:

Take two number inputs

Add numbers using the + operator

Display the result

To know more about Algorithm, visit: https://brainly.com/question/13800096

#SPJ9

PYTHON
The assignment:
41.3 Summing LoD
Use the Loop Summing Pattern to calculate and print the total score of all the games in this list of dictionaries:

games = [
{"Name": "UD", "Score": 27, "Away?": False},
{"Name": "Clemson", "Score": 14, "Away?": True},
{"Name": "Pitt", "Score": 32, "Away?": True},
]

It's a list of dictionaries, so I'm having difficult accessing this.

Answers

Using the knowledge in computational language in python it is possible to write a code that  use the Loop Summing Pattern to calculate and print the total score of all the games in this list of dictionaries.

Writting the code:

games = [

   {"Name": "UD", "Score": 27, "Away?": False},

   {"Name": "Clemson", "Score": 14, "Away?": True},

   {"Name": "Pitt", "Score": 32, "Away?": True},

]

total_score = 0  # initialize total_score to 0

for d in games:     # go through all dictionaries of games list

   total_score += d["Score"]   # add each score to total_score

# print total score with a print function

print(total_score)

See more about python at brainly.com/question/18502436

#SPJ1

In computer science, decomposition is breaking a problem down into sub-problems and smaller parts.
TRUE OR FALSE

Answers

Answer:

!TRUE!

Explanation:

It involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand. The smaller parts can then be examined and solved, or designed individually, as they are simpler to work with.

The hardware components that write data to storage media storage devices true or false

Answers

Answer:

True

Explanation:

i think i am right computer forever

Workers at a particular company have won a 7.6% pay increase retroactive for six months. Write a program that takes an
employee's previous annual salary as input, and outputs the amount of retroactive pay due the employee, the new annual
salary, and the new monthly salary. For example:

Answers

The C++ code for the program in question will be as follows:

#include <iostream>

using namespace std;

int main()

{

double oldSalary, retroSalary, newSalary, increaseSalary, newMonthlySalary;

const double payIncrease = .076;

 

cout << "Enter your old annual salary." << endl;

cin >> oldSalary;

newSalary = (oldSalary * .076) + oldSalary;

increaseSalary = newSalary - oldSalary;

newMonthlySalary = newSalary / 12;

retroSalary = (oldSalary / 2) * payIncrease;

cout << endl;

cout << "Your new annual salary is: $" << newSalary << endl;

cout << "You received a $" << increaseSalary << " increase in salary." << endl;

cout << "You will receive $" << retroSalary << " in retroactive salary." << endl;

cout << "Your new monthly salary is: $" << newMonthlySalary << endl;

return 0;

}

What is C++ programming? Why is it useful?

Applications with great performance can be made using the cross-platform language C++. As a C language extension, it was created by Bjarne Stroustrup. With C++, programmers have extensive control over memory and system resources.

Given that C++ is among the most widely used programming languages in use today and is used in embedded devices, operating systems, and graphical user interfaces, it is helpful. C++ is portable and may be used to create applications that can be converted to other platforms since it is an object-oriented programming language, which gives programs a clear structure and allows code to be reused, reducing development costs.

To learn more about C++, use the link given
https://brainly.com/question/24802096
#SPJ1

Which is referred to as the "Banker's Bank?"
(1 point)
FDIC
Treasury Department
IRS
The Federal Reser
ve (The Fed)

Answers

The option D: The Federal Reserve (The Fed) is referred to as the "Banker's Bank".

What exactly does the Federal Reserve do?

To guarantee that the financial system supports a strong economy for American people, communities, and businesses, the Federal Reserve analyzes financial system risks and actively participates at home and abroad.

Note that The United States of America's central banking system is called the Federal Reserve System. With the passage of the Federal Reserve Act on December 23, 1913, it was established in response to the need for centralized control of the monetary system to prevent financial crises following a string of financial panics.

Learn more about Federal Reserve from

https://brainly.com/question/382312
#SPJ1

A compound conditional is a type of selection that uses statements with ____________ or more logical conditions.

Answers

A compound conditional is a type of selection that uses statements with control or more logical conditions.

What are the applications of compound conditional statements?

It is possible to test two conditions with compound conditionals in a single sentence. In Blockly, there are two methods to complete this using just one block! You can check to see if a statement's two criteria are true or simply the first one.

Therefore, When defining a constraint, compound logic operators like AND, NOT, and OR are utilized to connect expressions. For instance: Item C is required by (Condition A AND Condition B). Boolean operators are another name for compound logic operators.

Learn more about compound conditional from

https://brainly.com/question/28060852
#SPJ1

i need like 2 sentences for each

Explain the characteristics of the Internet and the systems built on it.
Explain the abstractions in the Internet and how the Internet functions.
Explain how the characteristics of the Internet influence the systems built on it.

Answers

Accessibility. The Internet is a service that is available to everyone worldwide.

Participation in Other Media.

What is the internet?

The Internet, sometimes known as "the Net," is a global system of computer networks. It is a network of networks that allows users at any one computer to obtain information from any other computer with permission (and sometimes talk directly to users at other computers).

A vast network of specialized computers known as routers makes up the Internet. Knowing how to move packets from their source to their destination is the responsibility of each router. During its journey, a packet will have passed through numerous routers. A hop occurs when a packet passes from one router to the next.

Therefore,  . The Internet is a service that is available to everyone worldwide.

Learn more about the internet here:

https://brainly.com/question/13308791

#SPJ1

What are the problems that could occur in data science?

Answers

The problem that could occur in data science is Data growth issue i.e, Big Data. The proper storage of all these enormous sets of data is one of the biggest problems with big data. Companies' data centers and databases are storing an ever-growing amount of data. It becomes increasingly challenging to manage these data sets as they grow exponentially over time.

The 3 biggest Data science challenges are:

Data collection:

Any ML or data science project must start by locating and gathering the necessary data assets. However, one of the most frequent issues that businesses and data scientists encounter is the lack of appropriate data, which has a direct bearing on their capacity to create reliable ML models.

The abundance of data sources:

Companies now routinely gather information about their clients, sales, workers, and other topics. They do this by utilizing a wide variety of tools, programs, and CRMs, and the sheer volume of data that is fired at businesses by the various sources can start to pose issues with data management and consolidation.

Data security and privacy:

The next difficulty is gaining access to the appropriate datasets once they have been identified. Data scientists are finding it more difficult to access datasets due to rising privacy concerns and compliance requirements.

To know more about Data Science, visit: https://brainly.com/question/13104055

#SPJ9

Briefly discuss the relationship between waterfall model and HCI (5mks)

Answers

HCI (human-computer interaction) is the study of how people engage with computers and how computers are or are not designed to communicate successfully with humans. HCI, as the name indicates, comprises of three components: the user, the computer, and the methods in which they interact.

The waterfall model is a traditional paradigm used in the system development life cycle to build a system in a linear and sequential manner. The model is called a waterfall because it progresses methodically from one phase to the next in a downward direction.

What is the importance of the Waterfall model?

The waterfall process has the following advantages: requirements are accomplished early in the project, allowing the team to define the whole project scope, construct a comprehensive timeline, and design the total application.

This model is straightforward and simple to grasp and apply. Because of the model's rigor - each phase has precise deliverables and a review procedure - it is simple to maintain. Phases are analyzed and completed one at a time in this methodology. The phases do not mix.

Learn more about Waterfall Model:

https://brainly.com/question/13439438

#SPJ1

Using programming libraries is one way of incorporating existing code into new programs.
TRUE/FALSE

Answers

Using programming libraries is one way of incorporating existing code into new programs is a true statement.

What exactly is a programming language and how do programs relate to it?

A notational scheme used to write computer programs is known as a programming language. Although they may also be graphical, formal text-based programming languages make up the majority of the field. They are an assortment of computer languages.

Therefore, Programmers can use a collection of prewritten code called a programming library to streamline tasks. This library of reused code typically focuses on a small number of widespread issues. Several different pre-coded components are typically included in a library and thus from time to time can be place on a new program if need be.

Learn more about libraries from

https://brainly.com/question/28101070?source=archive
#SPJ1

1. Identify at least 3 security vulnerabilities on the HQ LAN.

Answers

There are numerous types of network vulnerabilities, but the following are the most prevalent and The three security vulnerabilities of the LAN are Malware, Outdated or unpatched software and Misconfigured firewalls.

Common LAN Network Security Issues :

Internal Security Threats: Human error accounts for more than 90% of cyberattacks. Instances of this include phishing scams, hasty decisions, using unsecure passwords, and more.

Distributed Denial-Of-Service (DDoS) Attacks: Websites that are subjected to DDoS attacks frequently crash, have technical difficulties, or load slowly. Cybercriminals infect internet-connected devices (such as computers, smartphones, and other devices) in these situations, turning them into bots. The bots are sent to a victim's IP address by hackers.

Malware: Malware are malicious software applications that are used to gather data on victims from infected devices. After successful deployments, hackers can mine devices for sensitive data (such as email addresses, bank account numbers, and passwords) and use it for identity theft, extortion, or other damaging business practices.

To know more about LAN, visit: https://brainly.com/question/8118353

#SPJ9

Java Question: What is printed as a result of executing the code segment?

Answers

The answer should be [tex]7.[/tex]

Jasper created a slide with three pictures and text with font size 16. What should he do to make his slide easy to read and engaging? Group of answer choices Choose one picture and increase the font size to at least 18. Decrease font size and add more pictures. Get rid of all the pictures and increase the font size to 44. Remove all text and add one more picture.

Answers

Answer:

Choose one picture and increase the font size to at least 18 or Decrease font size and add more pictures.

Explanation:hope this helps ^-^

Steps for Adjusting the width of a cell in ms Excel​

Answers

After that, select "Format" from the "Cells" submenu. There is a drop-down menu where you may choose between "Row Height" and "Column Width." Choose the one that you wish to make the initial adjustment to.

What are cells in Excel?The fundamental building block of an Excel spreadsheet is a cell. The hundreds of tiny, rectangular rectangles you see when you start a new sheet in a spreadsheet are called cells. You can enter the data you intend to utilize in your spreadsheet in these cells.The system arranges rows by number and columns by letter, with each cell located at the junction of a row and a column. As a result, depending on its column and row, each cell has a unique cell address. For instance, the cell in row six and column B holds the address B6. Additionally, you may pick a cell range, which is a collection of cells, at once.List the first and last cells in a cell range to make a reference to that range. For instance, you could write "B3:B6" for the cell range that consists of B3, B4, B5, and B6.

Learn more about Excel spreadsheet refer to :

https://brainly.com/question/24749457

#SPJ9

What are some resources you can learn from now to learn how to use these different devices with different operating systems?

Answers

The resources that I can learn from now to learn how to use these different devices with different operating systems are:

Learning Operating Systems from scratch [Best Udemy Course] ...Learning Operating Systems Fundamentals [Udemy] ...Learning Computer Hardware and Operating Systems [edX Course]

Why is understanding operating systems critical to IT?

You can "speak" to your computer using your operating system even if you don't understand its language. The file system, scheduler, and device driver are the three components of an OS that are most crucial. You can assess your computer's general health by understanding the fundamentals of your operating system.

Note that A computer user and computer hardware interact through an operating system (OS). An operating system is a piece of software that handles all the fundamental operations like managing files, memory, processes, handling input and output, and managing peripheral devices like disk drives and printers.

Learn more about operating systems from

https://brainly.com/question/22811693
#SPJ1

When do you use while loop instead of a for loop?
Group of answer choices

1: To loop exactly 10 times

2: To perform number calculations

3: To loop until a certain condition is reached

4: To make sure a correct number is entered

Answers

A while loop is used until a certain condition is reached unknown number of times.

Option 3

What is the difference between a while loop and a for loop?

Both the for loop and the while loop is used to execute the statements repeatedly while the program is running. The main distinction between the for loop and the while loop is that the for loop is used when the number of iterations is known, whereas the while loop executes until the statement in the program is proven incorrect.

Iteration refers to a single execution of the loop body. In the preceding example, the loop iterates three times.

If i++ were not present in the preceding example, the loop would (in theory) continue indefinitely. In practice, the browser provides methods to stop such loops, and we can kill the process in server-side JavaScript.

Any expression or variable, not just comparisons, can be used as a loop condition: while evaluating the condition and converting it to a boolean.

Hence to conclude use a while loop instead of a for loop, To loop until a certain condition is reached

To know more on loops follow this link

https://brainly.com/question/26098908

#SPJ1

Suppose you work for a company that has just hired a new senior vice president. After reviewing the budgets of all departments, the new VP went on record saying that the amount of money spent on cybersecurity is too large in proportion to the size of the company. She recommends an immediate 23 percent reduction in the cybersecurity budget. she has decided on this amount after informal conversations with other companies that have about the same number of employees. However, these other companies perform completely different functions: one company is in manufacturing while the other is a service organization, neither of which is the same as your company. The new VP says she will retract her recommendation if someone can prove that there have been no significant attacks due to the money spent on cyber defenses and not just because your company is unattractive to threat actors

Answers

Answer:

Explanation:

Suppose you work for a company that has just hired a new senior vice president. After reviewing the budgets of all departments, the new VP went on record saying that the amount of money spent on cybersecurity is too large in proportion to the size of the company. She recommends an immediate 23 percent reduction in the cybersecurity budget. she has decided on this amount after informal conversations with other companies that have about the same number of employees. However, these other companies perform completely different functions: one company is in manufacturing while the other is a service organization, neither of which is the same as your company. The new VP says she will retract her recommendation if someone can prove that there have been no significant attacks due to the money spent on cyber defenses and not just because your company is unattractive to threat actors

Resources shared on a computer network include

Answers

Resources shared on a computer network include files, data, multimedia, and hardware resources like printers, fax machines, and scanners.

What is a computer network?

Servers, clients, transmission media, shared data, shared printers, other hardware and software resources, network interface cards (NIC), local operating systems (LOS), and network operating systems are among the devices, features, and services that computer networks share (NOS).

Therefore,  the resources that are shared are data, multimedia, and hardware resources like printers, fax machines, and scanners.

To learn more about computer networks, refer to the link:

https://brainly.com/question/14276789

#SPJ1

On a computer with 32-bit addresses, suppose we have a 2 GB main memory, that is byte addressable, and a 512KB cache with 32 bytes per block.

What would be the format of the memory address for fully associative caching technique?

Answers

The format of the memory address for fully associative caching technique is option C:  c) TAG= 13 SET = 14 WORD =5.

The definition of fully associative cache

A fully associative cache allows data to be stored in any cache block rather than forcing each memory address into a specific block. — Data can be stored in any vacant block of the cache when it is read from memory.

Note that the term "fully associative mapping" refers to a cache mapping technique that enables mapping of the main memory block to an openly accessible cache line.

Furthermore, data could be stored in any cache block with a fully associative cache. Every memory address wouldn't have to be confined to a specific block and option c best fit the statement above.

Learn more about caching from

https://brainly.com/question/3522040
#SPJ1

Other Questions
Which group of drugs is used in animals with ammonium urate uroliths? What is the contribution of 5G and Edge computing to society perfect price discrimination is mostly hypothetical. however, as data mining becomes more ubiquitous, we can expect markets to perfect price discrimination, as . b. under perfect price discrimination, sellers benefit, because they can thereby sell their products at maximum prices. buyers with smaller marginal benefits benefit, because . c. perfect price discrimination leads to market output. 5. What is the independent variable in the following function?f(c) = 2c + 909Of0: State the coordinates of the point. PLEASE HELP ASAP ON THE JUSTIFY THE ANSWER NET FREE WATER MOVEMENT PART!!!! I WILL GIVE BRAINLIEST TO BEST ANSWERR!!!! in 2001, the council of europe drafted the european council cybercrime convention, which empowers an international task force to oversee a range of security functions associated with _____ activities. a farm worker comes into the clinic reporting headache, dizziness, and muscle twitching after working in the fields. what condition does the nurse suspect? What are the two key observational facts that led to widespread acceptance of the big bang model?. Blyu has been friends with Amelia since kindergarten. Lately, Biyu is having a hard time because Amelia only talks about herself. Rather than enjoyingher company, Biyu feels drained after spending time with Amelia. She has tried telling Amelia how she feels, but it does not make a difference. Underthese circumstances, should Biyu end the friendship?A. Yes, the friendship is no longer working for BiyuB. No, they were friends once so they should be again.C. Yes, and Biyu should warn others not to be friends with Amelia.D. No, you should hang on to friends as long as you can no matter what PLEASE HELP WILL GIVE 40 POINTS, 5 STAR RATING, AND BRAINLIEST, PLEASE HELP ASAPPP!!!!!, if wrong will report and give a 0 rating on personal account. PLEASE HELPPPP!!!!! PLSSS HELP IF YOU TURLY KNOW THISS how does the poet discuss the theme of duty in flanders fields write 3 PEEKER paragraphs pointevidence explanation key wordexplainationreaders link at 3 years of age, a child has a cardiac catheterization. after the procedure, which interventions would be most important? n the a-b-c method of self-management the 'a' items are: those items that are very important and need to be done today or tomorrow at the latest. those items that absolutely must be done today. those items that are important but don't need to be done today. those items that can become 'b' or 'c' items if it helps us manage time better. Match the key terms with their definitions.1. An animated segment within a Tour.2. An association between two related tables where both tables contain a related field of data, such as IDs.3. A business intelligence tool that can connect and shape data from multiple sources.4. A feature that enables you to integrate data from multiple sources within a workbook.5. A file type that uses commas to separate data into columns and a newline character to separate data into rows.6. A special character (such as a tab or space) that separates data.7. A method of importing external data into Excel but not maintaining a link to the original data source.8. A special character that designates the end of a line and separates data for the next line or row.9. A built-in add-in that offers the key functionality that is included in Excels stock PivotTable options, plus a variety of useful features for the power user.10.A process that updates the linked data in an Excel workbook with the most up-to-date information.11.The process of inserting external datadata created or stored in another formatinto the current application.12.The settings that control how imported data in cells connect to their source data.13.The process of editing information from one or more data sources to desired parameters before importing into an application.14.An online application suite designed to help users manage, supplement, visualize, and analyze data.15.A time-based animation that can display a 3D Map from different perspectives.16.A file type that uses tabs to separate data into columns.17.A data file that contains characters, such as letters, numbers, and symbols, including punctuation and spaces.18.A method of summarizing data visually to better understand the significance of the information.19.Attributes that contribute to the visualization of data.20. A file in which each column contains a specific number of characters..Data shapingTab-delimited filePower BIDimensionTourData ModelFixed-width text fileData visualizationComma Separated Values (CSV) fileText fileExternal data propertiesDelimiterPower Query EditorRelationshipImportingEmbedNewline characterRefreshScenePower Pivot Please helpme answer both of them ASAP!! and submit it like this. Example: 1=b and 2=d Explain how the American were able to defeat the British army during the American Revolution In which of these disorders does the build-up of oil, bacteria, and dead skin cells block openings to the sebaceous glands or hair follicles?. PLEASE HELPAfter reading the excerpt from "The Choice," answer the question below. Use the rubric in the materials for help if needed.The author of this passage uses a both a flashback and a flash-forward to give readers more information. Locate the flashback in this reading. What do readers learn from the flashback? How does the flashback affect the outcome of the story? Use details to support your answer.