Answer:
true
Explanation:
output devices do the opposite
How does cybercrime impact the economy? Select 3 options,
People lose their job
Intellectual property is stolen,
It stimulates the economy.
Businesses are ruined,
Opportunities are created.
Answer:
People lose their jobs.
Intellectual property is stolen.
Businesses are ruined.
Explanation:
got it right on edge
Cybercrime impact the economy by:
People lose their jobs.Intellectual property is stolen.Businesses are ruined.What is the effect of cybercrime in the economy?The growing rate of cybercrime issues is one that has lead to high cost in the economy of the world and it has also lead to global losses.
Conclusively, a lot of business has closed up due to cybercrime and the government now spends resources that can be used for other purposes to fight cybercrime.
Learn more about Cybercrime from
https://brainly.com/question/25157310
pls answer the question
Answer:
hi
Explanation:
in what tab the translate button found
Answer:
Display the Review tab of the ribbon and click the Language tool and then click Translate. Click Translate Selection. Word displays the Translator pane. (A window may appear on the screen after clicking Translate Selection asking you to turn on Translation Services.)
Hope this helps : )
Joe is a part of a team where the members come from various cultures and have different perspectives and viewpoints. What does joe need to improve in order to work successfully in the team?
Answer:
I guess learning about every ones backgrounds and being able to adjust to a more diverse team.
You do not have to move your fingers to click the bottom row reach keys.
1. True
2. False
Answer:
2false
Explanation:
hope dis helps u ^_^
A project manager would employ people who have a marketing background to work on which phases of the mobile app development process?
design and development
deployment and possibly discovery
support and possibly discovery
development and testing
Answer:
Development and discovery :)
Hope this helps!!!!!!!
Explanation:
What strategies do businesses use to protect their networks from internal threats?
select all that apply
-having employees change their passwords regularly
-requiring a login to access the network
-using dial-up connections to access the Internet
-implementing peer-to-peer networking
-providing employees with access privileges
Answer:
I think the answers would most definitely be requiring a login to access the network because if businesses had a network with no login, anyone could get into it. Others would be providing employees with access privileges so that way ONLY employees may get into certain things, and possibly having employees change their passwords regularly so that way, anyone who has the employees previous password can't log in at any time to steal anything cause it's changed.
Hope this helped! Have a great day! - Olli :]
Why do computers use binary code?
Answer:
To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand
Answer:
It has two clearly distinct states that provide a safety range for reliability and the least amount of necessary circuitry, which results in the least amount of space, energy consumption, and cost.
(14) Click on the
sloping forwards
button to change the selected text to appear
(Bold Italic)
Click on which button to change the selected text to appear sloping forward: Mouse button
What are the functions of a mouse?To give you an idea of all the mouse capabilities, here is a list of all the computer mouse functions and options.
Move the mouse pointer on the screen - The primary function is to move the mouse pointer on the screen.
Point - After moving the mouse, you can point something out to another user or a digital object. In a game, for example, you can use the mouse to point a gun in the direction you want to shoot.
Open or run a programme - After pointing to an icon, folder, or other object, clicking or double-clicking that object opens the document or runs the programme. Some programmes even allow you to triple-click. For more information on, please visit our click page.
To know more about Mouse, click on the link :
https://brainly.com/question/14399800
#SPJ1
Best beginner racing drones?
Answer:
Walkera Runner 250
Explanation:
This drone is durable, and offers a lot of features while not totally being over the top!
Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many
Answer:
Many-to-one
Explanation:
Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.
Which of the following best describes what a long-term goal is?
En la historia del Computador porque se caracteriza la primera generación? *
1 punto
a.Por que se reemplazo el ábaco
b.ninguna de las anteriores
c.Por la implementación del calculo
d.Por el uso de tubos de vacío
D. Por el uso de tubos de vacio.
Give five examples of physical networking.
Answer:
Fully connected Network Topolgy, Common Bus Topolgy, Mesh Network Topolgy, Star Network Topolgy, and Ring Network Topolgy.
Explanation:
5.10.4: Snake Eyes
My code:
var SENTINEL = 1;
function start(){
var diceOne;
var diceTwo;
while(true) {
println("" + diceOne + "," + diceTwo);
diceOne = Randomizer.nextInt(1,6);
diceTwo = Randomizer.nextInt(1,6);
if (diceOne && diceTwo == SENTINEL){
println("" + diceOne + "," + diceTwo);
break;
}
}
}
What am I doing wrong here?
Answer:
You didn't specify what the function actually does. BTW, good luck coding, I love coding and it is lots of fun, just stick with it!
Explanation:
5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats
Answer:
Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.
Match the tools corresponding to their description.
Answer:
Explanation:
software to design UI - Flash
database software - Oracle
tool to design UX - Firework
programming language - Perl
Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.
soak testing.
stress testing
load testing
spike testing
speed(?)
penup?
? (-200, -200)
? (90)
Pendown?
begin_fill?
? ("tan")
#Trace the outside of the grid (shape is a square)
? (400)
right(?)
? (400)
right(?)
? (400)
right(?)
? (400)
right(?)
end_fill?
? Go to lower, left corner of R and have turtle look up. Pen and shape fill blue
?()
set position(?)
?()
? ("blue")
begin_fill?
? Trace the outside of the letter R.
forward(?)
? (90)
? (160)
right(?)
forward(?)
? (90)
? (20)
? (100)
? (120)
right(?)
? (40)
right(?)
? (120)
? (80)
forward(?)
left(?)
? (120)
? (90)
? (40)
right(?)
end fill ()
? Move to inside of R (lower left corner). Color tan and fill the shape.
penup?
? (-40,20)
?()
color ("?")
begin_fill?
? Trace the inside of R (shape is a square).
forward(?)
? (90)
? (80)
right(?)
forward(?)
? (90)
? (80)
right(?)
end_fill?
? Go to lower, left corner of R. Make pen white and pensize 8.
?()
? (-80, -140)
? ("white")
pensize(?)
?()
? Trace outside of the letter R.
forward(?)
? (90)
? (160)
right(?)
forward(?)
? (90)
? (20)
? (100)
? (120)
right(?)
? (40)
right(?)
? (120)
? (80)
forward(?)
left(?)
? (120)
? (90)
? (40)
right(?)
? Move to inside of R (lower left corner).
penup?
? (-40,20)
?()
? Trace the inside of R (shape is a square).
forward(?)
? (90)
? (80)
right(?)
forward(?)
? (90)
? (80)
right(?)
Answer:
used HP UC visit relationship Nurs.Makrapar.
You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use to find the saved file?
Group of answer choices.
A. Spreadsheet program
B. Microsoft Windows Explorer
C. Word-processing program
D. Notepad
Answer:
B. Microsoft Windows Explorer
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
In this scenario, you saved a file on drive "C" of your computer. The software program or application which you would use to find and open the file is Microsoft Windows Explorer.
The Microsoft Windows Explorer is an inbuilt resources that avails the end users the ability to perform various operations on a file and it provides the folder paths used for the storage of user files. It is the default program for file and folder documents on a computer system.
Need answer ASAP. I’ll mark brainliest if correct
Answer:
I am pretty sure for the first option the answer is tasks, and for the second option, it is logical.
Explanation:
"tasks to be performed in a logical manner" sounds right to me.
A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an error called?
A.
syntax-level ambiguity
B.
semantic information complexity
C.
lexical ambiguity
D.
context error
A natural language processor comes across a sentence that contains the word "weightless." The morphology component identifies the word "weight" and the suffix "-less." What type of morphology does this follow?
A.
inflectional morphology
B.
compounding morphology
C.
functional morphology
D.
derivational morphology
Pick the sentence that is true with regards to NLU.
NLU stands for natural language unit. It deals with generating human language. It works by mapping input to representations and analyzing them. It also accesses content from a knowledge base and maps sentence structures. NLU is comprised of NLP and NLG.
A language translator software works by recognizing the words a person is speaking and translating the semantics and meaning into another language. What components of NLP are utilized in this software?
The software first uses
to map and analyze the input. It then creates the output using
.
Which of these is a compound morphology?
A.
bookkeeper = book + keeper
B.
happiness = happy + ness
C.
books = book + s
D.
banker = bank + er
Answer: Which of these is a compound morphology? (A. bookkeeper = book + keeper)
The software first uses (NLU) to map and analyze the input. It then creates the output using (NLG).
(It works by mapping input to representation and analyzing them.)
What type of morphology does this follow? (D. derivational morphology)
What is such an error called? (C. lexical ambiguity)
Explanation: Plato
A natural language processor misinterprets the noun "walk" as a verb in the sentence "The walk was tiring." Such an error is called lexical ambiguity. The correct options are C, D, and A respectively.
Lexical ambiguity refers to a situation wherein a word or phrase has more than one feasible meanings or interpretations.
The word "weightless" follows derivational morphology. Derivational morphology involves including affixes to a base word to create new phrases with extraordinary meanings or phrase training.
The real sentence close to NLU is: NLU stands for herbal language know-how. It offers with mapping input to representations, reading them, and gaining access to content from a expertise base.
In a language translator software, two components of NLP are applied. The software program first uses natural language expertise (NLU) to understand the words being spoken and translate the semantics and which means.
The compound morphology example is bookkeeper = e-book + keeper. Compound morphology involves combining or extra separate words to create a new phrase with a awesome which means.
Thus, the correct options are C, D, and A respectively.
For more details regarding software, visit:
https://brainly.com/question/32393976
#SPJ2
A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session.
Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions.
The following code segment is intended to create lunchList, which is initially empty.
It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise.
FOR EACH child IN morningList
{
}
Which of the following could replace so that the code segment works as intended?
(A)
IF (IsFound (afternoonList, child))
{
APPEND (lunchList, child)
}
(B)
IF (IsFound (lunchList, child))
{
APPEND (afternoonList, child)
}
(C)
IF (IsFound (morningList, child))
{
APPEND (lunchList, child)
}
(D)
IF ((IsFound (morningList, child)) OR
(IsFound (afternoonList, child)))
{
APPEND (lunchList, child)
}
Answer:
The answer is "Option A".
Explanation:
In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.
explain the word length
Answer:
the measurement or extent of something from end to end
Explanation:
What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural light to your advantage?
Answer:
lights
Explanation:
Use which command when you apply formatting to text and then want to apply the same formatting to other text in the document.
Answer:
Use the Format Painter on the Home tab to quickly apply the same formatting, such as color, font style and size, and border style, to multiple pieces of text or graphics.
Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?
Answer: 0
Explanation: 1/2
Answer:
a
Explanation:
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the internet today?
Answer:
Problem solvers are smart, practical, well-informed, and well-intentioned. However, not everyone uses the internet to address a problem for the greater good these days. As a result, because it was designed for good deeds, there is plenty of room for terrible deeds now.
4. What type of electromagnetic waves does a computer scanner use? Explain how the photoelectric effect is an important part of this process. (2 points)
Answer:
Computed tomography
Explanation:
Study of the photoelectric effect led to important steps in understanding the quantum nature of light and electrons and influenced the formation of the concept of wave-particle duality. The photoelectric effect is also widely used to investigate electron energy levels in matter.
A type of electromagnetic wave a computer scanner use is high-frequency radio waves.
The concept of wave-particle dualism was developed and key milestones in the understanding of the fundamental nature of light and electrons were made possible by research into the photoelectric effect.
What is the use of a computer scanner?A scanner is a tool that digitizes information by scanning or taking a photo of a document and displaying it on a computer screen. It makes it easier for both teachers and students to copy instructional resources like documents and pictures, as well as to take and preserve pictures.
Discovering the quantum nature of light was advanced by research into the photoelectric effect. Examining the electron energy levels of the matter is another common application of the photoelectric effect.
Learn more about computer scanners, here:
https://brainly.com/question/14259590
#SPJ5
I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!
2 things are required to make a loop: a. ______________ b. _____________
Answer:
(not quite sure what the question is asking seems you need, but bare minimum is)
an initial value and an increment or decrement
a condition where the loop stops
Explanation:
assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.
e.g. say you want to add up the numbers from 1 to 10, inclusive
sum = 0
for I is 1 to 10 incremented by 1
sum=sum+I
end of loop