Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it
Explanation:
Which of the following describes email nonrepudiation?
A.
the elimination of emails that may contain dangerous viruses
B.
the review of every email sent by the CIA
C.
the use of tracking methods that can identify senders and their locations
D.
the use of encryption methods that ensure senders and their locations cannot be identified
Answer:
I believe the answer is C, im sorry if im wrong
what is a copy of a theme with different color schemes called?
Answer:
A copy of a theme with different color schemes is called a Variant
Explanation:
Which type of list should be used if the items in the list need to be in a specific order?
Answer:
chronological
Explanation:
if your list is in chronological order that means it will be in the exact specific order in which you need it to be
Is this statement true or false? While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. True false.
Considering the Microsoft PowerPoint application, it is False that while in slide show mode, if you are not careful, you can close the application by clicking the X on the menu bar.
Why is it False?During the slide show of documents whereby the pages of documents are being passed or moved automatically, or by itself, when a user mistakenly or intentionally presses the X on the Menu Bar, the window will ask the user if he wants to save the document before closing.
Slide show in Microsoft PowerPoint is one of the techniques in which a user or Speaker can make a presentation to the audience.
Hence, in this case, it is concluded that the correct answer is False.
Learn more about Microsoft PowerPoint here: https://brainly.com/question/14388120
Answer:
"False"
Explanation:
I took the test!
in python:
The mode of a list of numbers is the number listed most often. The median of a list of numbers is the value in the middle of the list if the list is arranged in order. For this software solution you will do the following:
Take 10 numbers as input from the user and display the number with the highest mode. If there is a tie, you will need to show all of those numbers.
Your program must create a user-defined function that takes an array of numbers as a parameter and returns the value that appears the most often in the array.
For those same 10 numbers your program must create a user-defined function that takes an array of numbers as a parameter and returns the value which is the median for those numbers.
please help!
Python can be used to implement central of tendencies such as mean, median and mode using the statistic module
The program in Python, where comments are used to explain each line is as follows:
#This imports the statistics module
import statistics
#This defines the function that calculates the mode
def calcMode(myList):
#This prints the mode
print(statistics.multimode(myList))
#This defines the function that calculates the median
def calcMedian(myList):
#This prints the median
print(statistics.median(myList))
#The main method begins here
#This initializes the list
myList = []
#The following iteration gets input for the list
for i in range(10):
myList.append(int(input()))
#This calls the calcMode method
calcMode(myList)
#This calls the calcMedian method
calcMedian(myList)
Read more about similar programs at:
https://brainly.com/question/25026386
define management styles
Answer:
man·age·ment style
noun
plural noun: management styles
the methods used by a person in managing an organization or group of people.
"the players seemed to lose confidence in his management style"
Explanation:
lol is that good?
Answer:
A Management style is the particular way managers go about accomplishing these objectives.
If your company uses a non-price competition strategy what should you focus on
A. lowering prices
B. differentiation
C. creating direct competitors
D. the public sector
B- differentiation
nonprice competition strategy refers to strategy to win a business competition that does not involved lowering price of the product.
Businesses mostly do this using differentiation strategy, which is increasing the different variety of product that they sell in the market.
Wikis are designed for ________, which is allowing people to contribute more than just posting a response
Answer:
collabirations
Explanation
Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.
who develop computer first?
sorry bro...,......................................
What is the full form of MOS
Answer:
Military occupational speciality
Find the error in the following code fragment. int a: System.out.print(a):
Answer:
If your using java, then its supposed to be "System.out.print("a")"
Explanation:
its supposed to have quotations
A multinational pharmaceutical company used a saffron trident in a promotional campaign for one of its drugs in India. The saffron trident, a religious symbol in India, was meant to indicate the three levels of efficacy of the drug but mistakenly conveyed a religious message to Indians. This miscommunication indicates a problem associated with which step of the international communications process?
i. information source selection
ii. media channel selection
iii. encoding
iv. noise cancellation
v. message transmission
Based on the given information, This miscommunication indicates a problem associated with the encoding step of the international communications process. Thus the correct option is 3.
What is communication?Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.
In the given case, it is explained that during a marketing campaign for one of its medications in India, a multinational pharmaceutical company utilized a saffron trident to represent the drug's three degrees of efficacy.
The method used to transform thoughts into communication is called encoding. The communicator must start decoding in order to communicate meaning in the form of symbols that stand in for concepts or thoughts.
Therefore, option 3 is appropriate.
Learn more about Communication, here:
https://brainly.com/question/22558440
#SPJ6
One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.
One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.
Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.
Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.
So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.
Learn more about structured programs here:
https://brainly.com/question/25770844
The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit.
Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?
A.
alongside the development of the app
B.
after the app has been developed
C.
during the testing phase
D.
during the design phase
Answer:
C option
Explanation:
Because in testing phase the game has been developed and test for errors in game.
While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal
The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.
A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.
This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.
In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.
Read more: https://brainly.com/question/5660386
moving images of real event
Answer:
What
Explanation:
A _____ is a question about the data structured in a way that the DBMS can recognize and process. a. query b. relationship c. tuple d. product
Answer:
a
Explanation:
A query is a question about the data structured in a way that the DBMS can recognize and process.
What is relationship in DBMS?A relationship, in the scope of databases, is known to be a kind of scenario where two relational database tables and one table is known to have a foreign key that is said to references the primary key.
Note that A query is a question about the data structured in a way that the DBMS can recognize and process.
Learn more about query from
https://brainly.com/question/2569440
#SPJ2
What are the steps for adding a Watch Window?
Select the cell to watch
Answer:
How to The Watch Window in Excel
Select the cell you want to watch.
Click the Formulas tab.
Click the Watch Window button. ...
Click the Add Watch. ...
Ensure the correct cell is identified and click Add.
Scroll to the area of the worksheet where you need to add or update values.
Update the cell values.
Does anybody have the answer for 2.19.6 checkerboard for codehs??
Answer:
speed(0)
penup()
setposition(-200,-200)
pendown()
def draw_square_row():
color_value = 0
for i in range (10):
if color_value %2 == 0:
begin_fill()
color("red")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
elif color_value %2 == 1:
begin_fill()
color("black")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
def draw_square_row_2():
color_value = 1
for i in range (10):
if color_value %2 == 0:
begin_fill()
color("red")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
elif color_value %2 == 1:
begin_fill()
color("black")
for i in range (4):
forward(40)
left(90)
forward(40)
color_value = color_value + 1
end_fill()
def move_up_a_row():
left(90)
forward(40)
right(90)
backward(400)
for i in range (5):
draw_square_row()
move_up_a_row()
draw_square_row_2()
move_up_a_row()
Explanation:
tell me if you get it right
With the goal of keeping your hardware safe, explain the physical hazards you should avoid.
Based on health safety procedures, the physical hazards you should avoid include "eyestrain."
What are Physical Hazards in Computing?Physical hazards are computing are hazards that affect the physical body of the users due to operating the Computer system.
Different Physical Hazards in ComputingBack pain Neck and shoulder painsHeadacheEyestrainInjuries of the arms, hands, and thumbs, etc.Hence, in this case, it is concluded that there are various physical hazards computer users need to avoid.
Learn more about Physical hazards in Computing here: https://brainly.com/question/5622984
You see a whiteboard that has “8-10 years olds, interested in horses” written on it. This is MOST likely a description of:
A.
data management.
B.
target users.
C.
GUI.
D.
iterative development.
Answer:
B target users
Explanation:
because it targets 8-10 year olds that are interested in horses so it targets that audience range
A numeric test score is to be converted to a letter grade of A, B, or C according to the following rules: A score greater than 90 is considered an A; a score between 80 and 90, inclusive, is considered a B; and any other score is considered a C. What code segments will assign the correct letter grade to grade based on the value of the variable score?
The code segment makes use of conditional statements.
Conditional statements in programming are used to make decisions
The code segment in C++ is as follows
if (score > 90) {
grade = 'A';
}
else if (score >= 80 && score < =90) {
grade = 'B';
}
else {
grade = 'C';
}
The above code segments take the score, make comparison, and then determine the appropriate letter grade.
Read more about code segments at:
https://brainly.com/question/20475581
II and III
Explanation:If it is the test i think it is
I is incorrect because it is saying that automatically it is set as C but if the score is over 90 then you get an A if it's anything else then it's a B. This is false because then your outcome will never be C. It would only be A or B.
II is correct because it starts off by saying that if the score is greater than 90 then you'll get an A if else then if your score is equal to or greater or equal to than 80 then you get B and then if anything else then it's a C. This incoorporates everything.
III is also true because it start off by saying if anything is below an 80 then you automatically get a C. If it's anything over than 80 then if it's equal to or less than 90 then you get a b and if it's anything else then you get an A. This also checks out which means it's true.
So the answer is II and III
A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.
A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet
To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.
Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.
Read more on botnets at; https://brainly.com/question/13624552
What is data communication..
Hope this helps you❤!!
when demonstrating 2022 versa’s maneuverability, what available systems should you point out when backing up?
When demonstrating 2022 Versa's maneuverability, what you should you point out while driving in a parking lot is the excellent rearward visibility that is given or shown by the RearView Monitor.
2022 Nissan Versa is a new model by Nissan. They are known to have different technology and safety features. Its includes automatic emergency braking with pedestrian detection, remote keyless entry etc.
This vehicle comes with 2 functions such as a 5-speed manual transmission or an Xtronic Continuously Variable Transmission. With this one can quickly adjusts to the best gear ratio for a easyy acceleration and efficiency.
Learn more about 2022 Versa's from
https://brainly.com/question/25980600
Need Some Photography help
How does the computer help me with school work
A company is looking for an employee to install new computers and integrate them into its existing network. Which computer field most likely include this job ?
A. Network systems administrator
B. Information security analysis
C. Computer support
D. Application Development
Answer:
A. Network systems administrator
Explanation:
trust me i just did it 1.3.2
Why is experience in their own factory setting
crucial for a manager in the manufacturing
business?
Answer:
How to Manage Manufacturing Operations Effectively
Ensure High-Quality Products. ...
Ensure High-Quality Equipment. ...
Know How To Maximize Resources. ...
Look Into Technological Advancements. ...
Check Your Customer Service. ...
Consider Reducing Waste. ...
Conclusion.
Explanation: