Which option will likely be used by a traveling salesman? A tablet PC or a laptop A server or a laptop A laptop or a desktop A desktop computer or a server

Answers

Answer 1

Answer:

it is A

Explanation:

they are the smallest and can be easily moved.

hope this helps

Answer 2

The option that will likely be used by a traveling salesman is A tablet PC or a laptop. Thus the correct answer is A.

What is a salesman?

A salesman is referred to as an individual who mainly worked for selling, advertising, and promoting commodities in the market to the customers. They move from one location to another for their sale.

A tablet or laptop is considered a portable electronic device that works similar to any computer or desktop device which helps in making ease of business or day-to-day functions.

These devices are used by a salesman who used to travel as they are small in size which makes them easy to carry from one location to another without causing any trouble. They provide mobility to their user.

Therefore, option A tablet PC or a laptop is appropriate.

Learn more about laptops, here:

https://brainly.com/question/14252596

#SPJ2


Related Questions

1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?

Answers

Answer: c

Explanation:

Because you divide the end to the five

Diligent people are as concerned with the ____ as the ___ of their work

Answers

Answer:

Duration; quality/correctness.

Explanation:

Diligence is a way of life. It adds value to a piece of work. When a work is diligently done, it is said to be good or almost perfect. A diligent work evaluates all errors and corrects them from start to finish.

A diligent person takes time to analyse and complete a task to perfection. But diligence also comes with speed. A diligent work as to meet up with deadlines. Diligent people are also as concerned with the speed or duration of their work as to the correctness and quality.

A wall is built of bricks. What force is being applied to each brick from the bricks above? ​

Answers

Answer:

Gravitational Pull is the force that is being applied to each brick.

What kind of keybord is tis ned help pleese I don't no wat itis​

Answers

Answer:

judging by the logo at the top it's a hyperx keyboard and looks to be the alloy core rgb... hope this helps!

hyperX is the brand because it says it right at the top

Describing Editing Task
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word
3) Intro
Done

Answers

Answer:

changing the case of a word

changing the spelling of a word

changing a word to another word

Explanation:

Fill in the blank

A is a reserved word and can only be used for its intended purpose within a python program

Answers

Answer:

Keywords

Explanation:

In computer language, a word that cannot be used as an identifier is called reserved word e.g function, name of a variable or label, all these are reserved from use, while in python keywords are called  reserved words, they have specific purpose and meaning. They cannot be used for anything else apart from their specific purposes. Python keywords are always available hence there is no need to import them into code.

Answer: keyword

Explanation:

Simply put, a Python keyword cannot be used outside of its intended purpose. It's reserved for it's intended purpose within a Python program. The person above wasn't necessarily wrong, they just made the term plural. Be sure to enter "keyword", as written.

I hope this helped!

Good luck <3

When citing an Internet source:__________. a. it is ok to omit quotation marks if you change some words in the original sentence. b. it is ok to omit quotation marks when the source is a URL. c. it is ok to omit quotation marks for a paraphrase of the source. d. it is ok to omit quotation marks when there is no way to paraphrase.

Answers

Answer:

c. it is ok to omit quotation marks for a paraphrase of the source.

Explanation:

Plagiarism can be defined as the act of representing or using an author's work, ideas, thoughts, language, or expressions without their consent, acknowledgement or authorization.

In order to avoid plagiarism, it is very important and necessary to reference or cite the source of the informations and data.

However, when citing an Internet source, it is ok to omit quotation marks for a paraphrase of the source because the idea, thoughts or intellectual work as being rephrased.

Network convergence refers to using a single_______________.

Answers

Answer:

Network, vendor, and bill.

Explanation:

Network convergence is a term used in communication networking that describes the productive synergy among telephone, video, and data transmission using a single network, vendor, and a bill. It enables usage of numerous devices and numerous services with single network, vendor, and bill.

Hence, in this case, it can be concluded that, Network convergence refers to using a single network, single vendor, and single bill.

What are 2 ways to access the vendor credit screen in quickbooks online?

Answers

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

Answer:

Apply it to an existing unpaid bill, apply it to a future bill

Explanation:

What is the first step you would take to create a table of authorities?
A. Open the table of authorities dialog box and select text.
B. Select the category before positioning the cursor on the page.
C. Mark citations before opening the Insert Table of Authorities dialog box.
D. Select text and open the Table of Authorities dialog box.

Answers

Answer:

C. Mark citations before opening the Insert Table of Authorities dialog box

Answer:c

Explanation:

8.

Question

An Internet connection problem for customers is found to be outside

a carrier's regional office. As a result, which area needs

troubleshooting?


Answers

Answer:

local loop

Explanation:

The local loop is a term often used in computer or communication networking, which is used to describe a form of actual connection line, that joins two points; the customer's starting point and the communication carrier's end or border point.

Hence, the area that needs troubleshooting when an Internet connection problem for customers is found to be outside a carrier's regional office, is known as LOCAL LOOP.

In SQL the statement select*from R,S is equivalent to:_______(a) Select * from R natural join S(b) Select * from R cross join S(c) Select * from R union join S(d) Select * from R inner join S

Answers

Answer: (b) Select * from R cross join S

Explanation: The SQL query command, Select * from R, S selects each rows from table R and merges combines it with each row of table S such that the number of columns increases. The merging could be said to be horizontal in nature since it results in an increased number of data columns. The Cross join method produces the same exact result with the output all columns in both tables (R and S). The inner join combines rows in tables as well but requires that both tables have a matching column values. The union join merges data the data in both tables vertically and will not produce the same output as the SELECT * FROM R, S statement.

The development of various technologies led to many historic events. Use information from the Internet to describe one major historic event initiated by a technological development or discovery.

Answers

Answer:

The Compass

Explanation:

The compass was one of the foremost technological inventions that forever changed sea navigation.

Before its invention, sailors used landmarks to navigate and when it got dark, they had to stop and wait for daybreak before resuming their journey. Some other people used the inaccurate means of the sun and stars to navigate at sea.

But with the invention of the compass, all these problems were a thing of the past because the compass could provide direction despite the weather or time of the day and as a result, it opened more trade routes and assisted in the Age of Discovery.

Are natural languages capable of expressing algorithms?

Answers

Answer:

Yes.

Explanation:

Natural Language often referred to as Pseudocode, is capable of expressing algorithms. However, it is considered to be extremely difficult to employ due to the following reasons:

1. Natural language is extremely verbose

2. It lacks structure, hence, difficult to locate specific sections of the algorithms.

3. It has expanse meanings.

Therefore, it can be concluded that YES, natural languages capable of expressing algorithms

Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of any examples where ethical hacking occurs? What is your opinion of ethical hacking and can it be beneficial?

Answers

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

Which of these field types allows multiple, non-exclusive options?

Answers

Question:

Which of these field types allows multiple, non-exclusive options?

A. multi-part

B. checkbox

C. text

D. radio button

E. button

Answer:

The correct option is B) Checkboxes

Explanation:

Field types is a terminology often associated with Database Management.

A field type is often found in a data collection apparatus such a form. It's inherent quality or nature will determine the kind of data that it can collect.

Some field types allow for exclusive options. That is, in some data field types, it's impossible to select more than one option.

For example, a Button field type can only collect one type of value.

A Checkbox on the other can be configured to allow for multiple selections which may or may not be exclusive.

When working with Microsoft Access, for instance, you are required to select the name of the field and define the type of field data.

Cheers!

Learning new skills will not help you become a better digital artist: True or false?

Answers

Answer:

false, it'll help a lot

Answer:

false

Explanation:

You can get context-sensitive help information from the Code Editor by_________.A) selecting Contents from the Help menu
B) selecting Index from the Help menu
C) selecting Search from the Help menu
D) positioning the insertion point in a keyword and pressing F1

Answers

Answer:

D) positioning the insertion point in a keyword and pressing F1

Explanation:

In order to get context-sensitive help information from the Code Editor, a user should do the following:

1. call in your code to open the help topic with functions description

2. select the function name and press F1. This will open the topic with the function description

3. a user can view this help in the Microsoft Help Viewer or Web browser, this is based on the Visual Studio IDE Help settings.

Hence, the correct answer is: option D positioning the insertion point in a keyword and pressing F1

Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a server on the Interne.

Answers

Answer:

D.  server on the internet

Explanation:

The correct answer is:

Cloud storage refers to the storage of data on a server on the internet.

Every organization relies on data, In our daily job, we all make use of a huge amount of data(either in gigabytes or terabytes). And if you have a lot of files on your computer, it's probable that your computer may lose momentum and slow down, resulting in bad performance. While there are several external storage options available for storing and backing up your data, these devices are not infallible. Any incident, such as theft, or damage, might result in the loss of vital data.

This is where Cloud Storage comes into play. Cloud storage is a handy and dependable method of storing and retrieving information on the internet.

It is a cloud computing system in which data is stored on the server-side of the Internet and is managed and operated by a cloud computing provider. 

Therefore, from the above explanation, we can conclude that the correct Option is D

Learn more about Cloud Storage here:

https://brainly.com/question/23073532?referrer=searchResults

Who is demonstrating entrepreneurship?
O A contractor makes money providing technical support to two different companies.
O A biomedical researcher finds a cure for a rare disease and shares it in a manuscript.
O Atechnician works on a certification to increase her chances of promotion.
O A recent graduate makes money helping teachers sell their lesson plans online.

Answers

Answer: D: A recent graduate makes money helping teachers sell their lesson plans online.

Explanation: I am in accounting and have taken it for 3 years.

Answer:

It is A

Explanation:

Since D was proven wrong ^ The only answer that makes sense is A

Examine the following algorithm.
1. Get the student name.
2. Get the degree program name.
3. Subtract the number of credits taken so far from the required credits for the degree.
4. Get the number of credits required for the degree program.
5. Get the number of credits the student has taken so far.
6. Display the input information in Step 1 and 2.
7. Display the calculated information.
A. What logic error do you spot and how would you fix it?
B. What steps require user interaction (Ex: user must type in some input)?

Answers

Answer:

See the explanation please

Explanation:

A.

The algorithm tries to subtract the number of credits taken so far and the required credits for the degree before getting the number of credits required for the degree program and the number of credits the student has taken so far. Since the values are not known, calculation cannot be done.

Write the step 3 after step 5

B.

Step 1, 2, 4, 5 require user interaction, since it is asking the user to enter values

1. Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
2. Digital video is a core technology for which of the following?
(a) digital telivision
(b) video conferencing
(c) video messaging
(d) all of the above

Answers

Answer:

(d) all of the above

Explanation:

This is because, not only is digital video a core technology for digital television, it also happens to be a core technology for video conferencing and video messaging. This could be seen in its application in messaging apps for private discussion of for holding official meetings between employees in virtual conference.

What are all the folders located on the DOCK called?

Answers

Answer:

Folders on the DOCK bar are called stacks

what is TCP/IP adress​

Answers

Answer:

It's a computer networking protocol

Explanation:

TCP/IP stands for Transmission Control Protocol / Internet Protocol.

Hope this helps!

(Please mark Brainliest)

which bus slot provides highest video performance​

Answers

Answer:

The best slot to use for video cards is the PCI-Express x16 slot. The next best is the AGP slot. The next best is a PCI-Express x1 slot but video cards which fit that slot are very hard to find as of late 2006. The worst choice for a video card is a PCI slot.

How to represent derived attributes in database?

Answers

Answer:

Derived attribute can be defined as a type of attribute where its value will be derived from one or more of the other attributes of the same entity set.

Explanation:

An example of derived attribute is when we have an entity set called General. The set then has attributes like [Form], [Characteristics], [Address}, (Employment No).

(Employment No) which is represented distinctly in the attribute set can be called a derived attribute if it can be derived from one or more of the other attributes.

Derived attribute can be gotten through calculating values and not storing values.

For example, let us consider the following record of Teachers records;

(‘Teacher Number’, ‘Name’, ’Date of Birth’, Age today)

(‘E105’, ‘Samson’, ’07-Dec-1990’, 0)

This record shows that the teacher Samson was born on 7th of December, 1990. At the time of record insertion, he was born and 0 years old. What will be the value of his age on ’07-Dec-2000’? It is about 10 years. It clearly shows that the value is not fixed and it is a variable whenever the DOB is adjusted.

Therefore, we are not creating our table with derived attributes in it. Instead, the values ofderived attributes can be calculated at the time of retrieval and shown to the user. Hence, the record will look like as follows;

(‘E105’, ‘Samson’, ’07-Dec-1990’)

This means that 0 is a derived attribute from the Date of birth.

Why is it important to use systems analysis and design methodologies when building a system? Why not just build the system in whatever way seems to be "quick and easy"? What value is provided by using an "engineering" approach? Also, Give a specific example of an organization (not one listed in the book) that does a good job of this and why.

Answers

Answer:

It encourages the documentation of the building process and serves as a good reference point when information about the system is needed. It also helps in the testing of the various components of the system for efficiency.

Explanation:

System analysis is the total evaluation of the working components of a system. it shows the health or functionality of components and analyzes the effect of their relationship on the total system performance.

The design methodology is an engineering process to achieving a complete system build. It follows a procedure, documenting its parameters and observations as the system is implemented.

Example of organizations that follows these methods in building their systems are automobile industries like Honda.

It promotes the recording of the construction process and acts as a helpful resource when details about the system are required. Additionally, it aids in the efficiency testing of the system's many parts.

What is System Analysis?

"The process of evaluating a procedure or business to define its aim and purposes and build systems and procedures that will efficiently achieve them," according to the definition of systems analysis.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Six essential steps can be taken while creating a system. Systems analysis entails specifying the problem, its causes, the proposed solution, and the information need that a system solution must satisfy.

System analysis has a wide range of advantages, but it may also have significant drawbacks. The danger of conducting excessive analysis, which may be expensive and time-consuming, is one of the key drawbacks that is frequently disregarded. Finding the ideal balance is consequently a necessary aspect of the analyst's job.

To read more about System Analysis, refer to - https://brainly.com/question/28145726

#SPJ2

You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access memory RAMb. Read-only memory (ROM)c. Compact disc (CD)d. Universal serial bus (USB)

Answers

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

The changes made when a document is modified before saving is stored on; A: Random Access Memory(RAM)

Radom Access Memory (RAM) can be defined as the short term memory of a computer system which makes it to handle all tasks and applications.

Thus means that RAM is a kind of temporary storage that will go off when you shut down the computer. Thus, it is the memory that is required for saving active changes you make before saving.

Read more about Random Access Memory at; https://brainly.com/question/86807

how much heat is required to convert 1 gm of ice into steam​

Answers

Here's an answer a certified website gave me when I asked the same question:

Heat required in converting 1g of ice at −10∘C into steam at 100∘C is: latent heat of fusion= 80 cal/g80 cal/g. latent heat of vaporization=540 cal/g

Hopefully this helps

For what kind of shot is a fisheye lens most appropriate?

a. candid
b. panoramic landscape
c. large group
d. wildlife

Answers

Answer: B

Explanation: a fisheye lense is good for wide shots.

Other Questions
By the beginning of the twentieth century, preparation for release was considered an important part of the prison experience, and correctional systems provided programs to prepare inmates for the community transition.a) trueb) false Are these words antonyms or synonyms? trash-rubbish antonyms synonyms Bepotastine besilate (BEPREVE) ophthalmic solution contains 1.5% w/v of the therapeutic agent. Express this concentration in mg/mL. The city plans to build a highway extension next to a river. Which of the following should they do to make sure they have scientific knowledge to inform their decision? A. Invite several gas and oil companies to build gas stations along the route B. Request a budget increase to extend the project even more C. Conduct a study of the river levels in different seasons to be sure the highway is out of the flood zone D. Publish the highway plans for people to review A team of international researchers discovered a hidden sensory __________ located throughout the blood vessels and sweat glands. Who divides states into congressional districts? If i am in texas then I am in the south Helllopppppppppp plssssssssss Carla is making bracelets she wants to put 10 charms on each bracelet charms are sold in packets of 12 what is the least number of packages she can buy to make bracelets with no charms left over A cyclist rides his bike at a rate of 15 miles per hour. What is this rate in miles per minute? How many miles will the cyclist travel in 10 minutes? The Earths surface is divided into __________ continents and __________ oceans. Select the possessive adjective that correctly completes this sentence. Ella es mi tia Marta que tiene una hija; Hija vive en San Juan. Tus su sus mis What are control variables? How is mulhplying intergersSimilar to multiplying wholenumbers? This infamous leader of Libya was well known for harboring those accused of the 1988 downing Pan Am 103 over Lockerbie, Scotland. He was ousted from power and killed in the Arab Spring of 2011. Group of answer choices The father a star is away from earth, the more it is According to medieval Catholic teachings, which of the following would be considered a violation of Gods law? a. controlling an army b. harming others c. believing in hell d.performing sacraments Find z such that the proportion of observations that are less than z in a standard normal distribution is 0.23. (Enter your answer rounded to two decimal places.)Z=______ The decaying body of the bull will produce bees. Why do you think reasonable individuals once accepted the ideas behind this recipe? How can you find a function that has these roots in a cubic polynomial function?jj