Calendar exceptions can be used for all of the following variations from a workweek, except:

Answers

Answer 1

Calendar exceptions can be used for all of the variations mentioned except multiple days with working times that vary from day to day

What is the Calendar exceptions?

Calendar exceptions are a way to define specific dates or ranges of dates that differ from the normal work schedule, and can be used to represent holidays, company-wide meetings, non-working periods such as factory maintenance, or multiple days with working times that vary from day to day.

Therefore,  By using calendar exceptions, you can ensure that the schedule accurately reflects the actual availability of resources and avoids scheduling conflicts.

Read more about Calendar exceptions  here:

https://brainly.com/question/21852427

#SPJ1

Calendar exceptions can be used for all of the following variations from a workweek, except:

Select an answer:

multiple days with working times that vary from day to day

a multi-day non-working period such as factory maintenance

a recurring event such as a company-wide meeting

a holiday


Related Questions

How can you optimize the performance of a function written in assembly language, while ensuring that it still performs the intended functionality and produces correct outputs? What factors should you consider when making trade-offs between speed and correctness?

Answers

While optimizing the performance of an assembly language function, a range of techniques can be implemented such as minimizing data access, reducing instruction count and utilizing hardware features like caching and pipelining.

Why  is this so ?

It is vital to validate that these optimizations do not compromise the intended functionality of the program or lead to erroneous results.

To achieve this, comprehensive testing should be deployed on different inputs and conditions to guarantee that the optimized function behaves as anticipated.

As one makes trade-offs between speed and correctness, various factors must be considered like the complexity of code, criticality of function and how error impacts system operation.

Learn more about performance optimization:
https://brainly.com/question/14015474
#SPJ1

Program 7 - Circle You write ALL the code, then run it - Produce the correct output. Turn in code and screen print of successful run, for credit * Write a class for a Circle * Input only the radius. * Write functions that Calculate the circles Circumference, Area and Diameter, and print out the value of the radius * Include error checking for radius, must be greater than zero. Test all combinations

Answers

Answer:

Here is the Circle class:

public class Circle {   // class definition

private int radius;    // private data member of type int of class Circle named radius that stores the value of radius

public Circle(int r) {   // parameterized constructor of class Circle that takes radius as argument

 radius = r;  }    // sets value of radius as r

public int getRadius() {   // accessor method to get the value of radius

 return radius;  }   // returns the current value of radius

public int Diameter() {   // method to compute diameter of a circle

 return radius * 2;  }   // multiply radius value by 2 to compute diameter of Circle

 

public double Area() {   // method to compute area of a circle

 return Math.PI  * Math.pow(radius, 2);   }   //the formula of area is

π x radius² where value of π is get using Math.PI

 

 public double Circumference() {   // // method to compute circumference of a circle

 return 2* Math.PI * radius;   }   }  //the formula of circumference is

2 x π x radius where value of π is get using Math.PI

Explanation:

Here is the Main class:

import java.util.Scanner;  //to accept input from user

public class Main {  //definition of Main class

public static void main(String[] args) {  //start of main method

   

    Scanner scanner = new Scanner (System.in);  //creates Scanner object to take input from user

    System.out.println("Enter radius: ");  //prompts user to enter radius

    int r = scanner.nextInt();  //reads the value of radius from user

 Circle c = new Circle(r);  // calls Constructor of Circle passing r as argument to it using the object c of class Circle

 

    if(c.getRadius()<=0){  //calls getRadius method to get current value of radius using objec and checks if this value (input value of r ) is less than or equal to 0

        System.out.println("Error!");   }  //when above if condition evaluates to true then print this Error! message

    else {  //if the value of radius is greater than 0

System.out.println("the radius of this Circle is: " +c.getRadius());  //calls getRadius method to return current value of r (input value by user)

System.out.println("the diameter of this Circle  is: " + c.Diameter());  //calls Diameter method to compute the diameter of Circle and display the result on output screen

System.out.printf("the circumference of this Circle  is: %.2f", c.Circumference());  //calls Circumference method to compute the Circumference of Circle and display the result on output screen

System.out.println();  //prints a line

System.out.printf("the Area of this Circle  is: %.2f", c.Area()); } }  }

//calls Area method to compute the Area of Circle and display the result on output screen

The program and its output is attached.

Program 7 - Circle You write ALL the code, then run it - Produce the correct output. Turn in code and
Program 7 - Circle You write ALL the code, then run it - Produce the correct output. Turn in code and

What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play? pseudostory metagame ludonarrative iambic pentameter

Answers

Game theory provides a conceptual paradigm for picturing social situations with contending individuals. Game theory can be thought of as the study of strategy.

What role does choice play in games?

Choice can be integrated into games in a plethora of ways. A game might offer options for customizing characters, dialogue, player actions, gameplay, level/path design, etc. For any of these given aspects of a game, a developer has many options in how they could use choice.

Is metagaming cheating?

In the realm of competitive gaming, metagaming is perceived as unscrupulous or cheating and is typically not well appreciated because it contradicts the importance of authentic character depiction based on in-game experiences and backstory, which distinguishes role-playing games.

To know more about game experience visit:

https://brainly.com/question/30273245

#SPJ4

Why does trust usually break down in a designer-client relationship?


A lack of service

B lack of privacy

C lack of communication

D lack of contract

Answers

Trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.

How do you end a client relationship?

You would end a client relationship by staying calm, rational, and polite. Apart from this, reasons for terminating the relationship, but keep emotion and name-calling out of the conversation.

Follow-up with a phone call. You can start the process with an email, but you should follow up with a phone call in order to talk your client through the process and answer any questions.

But on contrary, one can build trust with clients by giving respect to them, Admit Mistakes and Correct Ethically, listening to them, listening to their words first followed by a systematic response, etc.

Therefore, trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.

To learn more about Client relationships, refer to the link:

https://brainly.com/question/25656282

#SPJ1

what is containment and why is it part of the planning process

Answers

Answer:

Isolating affected channels, processes, services, or computers; stopping the losses; and regaining control of the affected systems. It is part of the planning process to identify the best containment option for each scenario or system affected.

Explanation:

Consider the following classes.
public class Dog
{
/* code */
}

public class Dachshund extends Dog
{
/* code */
}
Assuming that each class has a default constructor, which of the following are valid declarations?

I. Dog sadie = new Dachshund();
II. Dachshund aldo = new Dachshund();
III. Dachshund doug = new Dog();

Group of answer choices

I only

II only

III only

I and II only

II and III only

Answers

Assuming that each class has a default constructor, Only I and II are valid declarations.

What is default constructor?

In object-oriented programming, a constructor is a special method that is called when an object is created. It initializes the object's data members and prepares the object for use.

Dog sadie = new Dachshund();

This is valid because Dachshund is a subclass of Dog, so a Dachshund object can be assigned to a Dog variable.

Dachshund aldo = new Dachshund();

This is also valid because it creates a Dachshund object and assigns it to a Dachshund variable.

Dachshund doug = new Dog();

This is not valid because a Dog object cannot be assigned to a Dachshund variable. While a Dachshund is a Dog, a Dog is not necessarily a Dachshund.

Thus, only I and II are valid declarations.

For more details regarding default constructor, visit:

https://brainly.com/question/31053149

#SPJ3

acronym physical education​

Answers

The acronym of physical education is PE or phys-ed.

a) Create a list of your 10 friends in python where you include the first name, last name and food preference, include yourself in that list
b) Use the basic structures you have learn in this chapter

Solution
1. (5 pts) Draw the flowchart (in a Word document)
2. (10 pts) Submit the code of the program that you have written and run and also the results (in a Word document)

Answers

a) Here's an example of how to create a list of friends in Python with their first name, last name, and food preference, including yourself:

```
friends = [
{"first_name": "John", "last_name": "Doe", "food_preference": "pizza"},
{"first_name": "Jane", "last_name": "Smith", "food_preference": "sushi"},
{"first_name": "Bob", "last_name": "Johnson", "food_preference": "tacos"},
{"first_name": "Alice", "last_name": "Lee", "food_preference": "ramen"},
{"first_name": "David", "last_name": "Kim", "food_preference": "burgers"},
{"first_name": "Sarah", "last_name": "Park", "food_preference": "pasta"},
{"first_name": "Michael", "last_name": "Chang", "food_preference": "steak"},
{"first_name": "Emily", "last_name": "Wang", "food_preference": "sushi"},
{"first_name": "Oliver", "last_name": "Garcia", "food_preference": "tacos"},
{"first_name": "My", "last_name": "AI", "food_preference": "data"}
]
```

b) Here's an example of how to print out the list of friends in Python:

```
friends = [
{"first_name": "John", "last_name": "Doe", "food_preference": "pizza"},
{"first_name": "Jane", "last_name": "Smith", "food_preference": "sushi"},
{"first_name": "Bob", "last_name": "Johnson", "food_preference": "tacos"},
{"first_name": "Alice", "last_name": "Lee", "food_preference": "ramen"},
{"first_name": "David", "last_name": "Kim", "food_preference": "burgers"},
{"first_name": "Sarah", "last_name": "Park", "food_preference": "pasta"},
{"first_name": "Michael", "last_name": "Chang", "food_preference": "steak"},
{"first_name": "Emily", "last_name": "Wang", "food_preference": "sushi"},
{"first_name": "Oliver", "last_name": "Garcia", "food_preference": "tacos"},
{"first_name

Answer:

{"first_name": "Helen", "last_name": "Johnson", "food_preference": "oranges"},

{"first_name": "Asia", "last_name": "Lee", "food_preference": "steak"},

{"first_name": "Ella", "last_name": "Grotjohn", "food_preference": "watermelon"},

{"first_name": "Addie", "last_name": "Sims", "food_preference": "Crackers"},

{"first_name": "Allie", "last_name": "Soraches", "food_preference": "Fries"},

{"first_name": "Andy", "last_name": "Lett", "food_preference": "soup"},

{"first_name": "Yo", "last_name": "Mama", "food_preference": "Sour Cream"},

{"first_name": "John", "last_name": "Soucha", "food_preference": "Dirt"},

{"first_name": "Lizzie", "last_name": "Hellina", "food_preference": "Jeans"},

{"first_name": "ME", "last_name": "HUNGY", "food_preference": "Peanut-butter-banana-grilled-sandwich"}

]

```

Banks will pay you interest on your money based on the interest rate. True or false?​

Answers

Answer:

The bank will pay you for every dollar you keep in your savings account. The money the bank pays you is called interest. How much the bank pays can change from month to month. The amount the bank pays is talked about as a percentage.

Explanation:

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

6. A rental car agency classifies the vehicles it rents into four categories: compact, midsize, full-size, and sport utility. The agency wants to record the following data for all vehicles: Vehicle_ID, Model, Year, and Color. There are no unique attributes for any of the four classes of vehicle. The entity type vehicle has a relationship (named Rents) with a customer entity type. None of the four vehicle classes has a unique relationship with an entity type. Would you consider creating a class/subclass relationship

Answers

Answer:

there are no possibilities

Explanation:

A class / subclass relatonship is not going to be possible here.

This is because we have these four caegories namely

1. compact,

2. midsize,

3. full-size, and

4. sport utility

These four categories have no real unique relationship or attributes with an entity type. A minimum of a supertype has atleast one subtype as well as following the total specialization situation.

Which HTML tag is used to add an ordered list to a web page?

Answers

Answer:

<ol> Defines an ordered list

Answer:

<ol>

Explanation:

with aid of diagram describe the segmentation memory allocation technique as applied in operating System ​

Answers

Note that the image or diagram that  describe the segmentation memory allocation technique as applied in operating System is attached.

What is ​segmentation memory allocation technique?

Segmentation is a memory management method used in operating systems that divides memory into variable size segments. Each component is known as a segment, and it can be assigned to a process. A table called a segment table stores information about each segment.

Segmentation is a memory management strategy that divides each task into numerous segments of varying length, one for each module that comprises elements that perform similar activities. Each segment corresponds to a separate logical address area in the program.

Learn mor about segmentation memory allocation technique:
https://brainly.com/question/31199513
#SPJ1

with aid of diagram describe the segmentation memory allocation technique as applied in operating System

What is the proper format of a speaker label (Speaker)?

Answers

The proper format of a speaker label in written transcripts or dialogue scripts is to include the speaker's name or identifier in all caps, followed by a colon and a space before the spoken words.

What is the speaker label (Speaker)?

For example:

SPEAKER 1: Hello, how are you?

SPEAKER 2: I'm good, thank you. How about you?

If the speaker has a specific title or role, it can be included as part of the identifier. For example:

MODERATOR: Welcome to today's panel discussion. Our first speaker is Dr. Jane Smith.

DR. JANE SMITH: Thank you for having me. I'm excited to be here.

The use of speaker labels helps to clarify who is speaking in a conversation, especially when there are multiple participants or if the dialogue is presented in written form.

Learn more about speaker label  from

https://brainly.com/question/29583504

#SPJ1

How would you show an external document in a running presentation?​

Answers

There are a few steps that show an external document in a running presentation.

What are the steps needed?

1. On the slide, select the icon or link to the object that you want to set to run.

2. On the Insert tab, in the Links group, click Action.

3. In the Action Settings dialog box, do one of the following:

4. To click the embedded icon or link in order to open the program, click the Mouse Click tab.

5. To move the mouse pointer over the embedded icon or link in order to open the program, click the Mouse Over tab.

6. Under Action on click or Action on mouse-over, select one of the options, then select from the list at that option. For example, you can select Run Program and then browse to a program that you want to run, such as a web browser. Or if the object is a document, you can select Object action and then select Open to display the document or edit to work on it during your presentation.

To know more about External document, Check out:

https://brainly.com/question/13947276

#SPJ1

.

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

what is the difference between hydra and hadoop?​

Answers

Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.

The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.

What is Hydra?

It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.

Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.

Know more about Big Data: https://brainly.com/question/28333051

Benedetta was cyber bullied by her classmates about her looks. WHAT computer ethics was violated?

Answers

Answer:

Digital Rights Foundation’s Cyber Harassment Helpline is Pakistan’s first dedicated, toll-free Helpline for victims of online harassment and violence.  The Helpline will provide a free, safe and confidential service. The Helpline aims to provide legal advice, digital security support, psychological counselling and a referral system to victims of online harassment. The Helpline will provide a judgment-free, private and gender-sensitive environment for all its callers.

Explanation:

plz help me of this question​

plz help me of this question

Answers

its not be seen clearly bro

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

Illustrate a possible future software development with implications in terms of security?

Answers

Currently, the camera application or software on our mobile devices has an AI component that aids in scene identification.

What is software development?

The process of conceiving, defining, designing, programming, documenting, testing, and bug-fixing that goes into building and maintaining applications, frameworks, or other software components is known as software development.

Best Practices for Software Security

Consider security from the outset.Make a policy for secure software development.Consider using a secure software development framework.To satisfy security needs, create software using best practises.Keep the integrity of the code.

Thus, these are possible future software development with implications in terms of security.

For more details regarding software development, visit:

https://brainly.com/question/20318471

#SPJ1

3. What is a Trojan horse?
O A. Antivirus software for your computer
O B. Another name for a hacker
OC. A computer virus that can damage or delete files
O D. Software that eats cookies

Answers

C. A computer virus that can damage and delete files
The correct answer is: C. A computer virus that can damage or delete files. A Trojan horse is a type of malware that disguises itself as a legitimate program. Once inside the computer, it can steal data, damage files, or even take control of the computer.

Write a program that inputs a five-digit integer, spearates the integer into its digits and prints them seperated by three spaces each. [Hint: Use the ineger division and remainder operators.]

Answers

Explanation:

The source code and a sample output have been attached to this response.

The code has been written in Java and it contains comments explaining important parts of the code.

A few things that are worth noting are in the for loop used in the code;

The loop goes from i = 4 to i = 0

When i = 4;

=> (int) Math.pow(10, i) = (int) Math.pow(10, 4) = 10000

Then the fiveDigit is divided by 10000. Since this is an integer division, the first digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 3;

=> (int) Math.pow(10, i) = (int) Math.pow(10, 3) = 1000

Then the fiveDigit (which is the remainder when i = 4) is divided by 1000. Since this is an integer division, the second digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 2;

(int) Math.pow(10, i) = (int) Math.pow(10, 2) = 100

Then the fiveDigit (which is the remainder when i = 3) is divided by 100. Since this is an integer division, the third digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 1;

(int) Math.pow(10, i) = (int) Math.pow(10, 1) = 10

Then the fiveDigit (which is the remainder when i = 2) is divided by 100. Since this is an integer division, the fourth digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit

When i = 0;

(int) Math.pow(10, i) = (int) Math.pow(10, 0) = 1

Then the fiveDigit (which is the remainder when i = 1) is divided by 1000. Since this is an integer division, the fifth digit of the 5-digit number will be stored in digit which is then printed to the console.

Next, the remainder is calculated and stored in fiveDigit and then the program ends.

Write a program that inputs a five-digit integer, spearates the integer into its digits and prints them

from which family does Ms word 2010 belong to​

Answers

Answer:

Microsoft Word 2010 belongs to the Microsoft Office 2010 suite.

Explanation:

Microsoft Word 2010 was released as part of the Microsoft Office 2010 suite, which was launched in June 2010. The suite included various applications such as Word, Excel, PowerPoint, Outlook, and others. Microsoft Word 2010 specifically is a word processing software designed to create and edit text-based documents. It introduced several new features and improvements compared to its predecessor, Word 2007. These enhancements included an improved user interface, enhanced collaboration tools, new formatting options, an improved navigation pane, and improved graphics capabilities. Therefore, Microsoft Word 2010 is part of the Microsoft Office 2010 family of software applications.

A group of 8 bits of information produces a ____.

Answers

Answer: Byte

Explanation: Eight bits constitute a byte.

Fill in the Blank
1. The
2. Industrial.
forecasts the future of specific job markets.
careers exist to promote and market machines, machine tools, and
engineer continually studies the production process for improvement
engineering.
4. Entry-level CNC employees who are beginning careers in CNC machining, and have little prior knowledge of
CNC machining, are called.
accessories.
3. The

Fill in the Blank1. The2. Industrial.forecasts the future of specific job markets.careers exist to promote

Answers

Job forecasting estimates the number of positions that will be available in a specific industry or profession in the future.

What is forecasting for jobs?Job forecasting estimates the number of positions that will be available in a specific industry or profession in the future.Among their many responsibilities, industrial engineers create programmes for employment evaluation.CNC operators, often known as CNC machinists, take pleasure in a variety of technology and manual labour. They frequently have an excellent sense of detail, a solid grasp of arithmetic, a love of technology, and the mechanical abilities required to operate sophisticated machinery.Engineers go through a set of processes in the engineering design process in order to solve an issue. The procedures include techniques for solving problems, such as choosing your goals and limitations, prototyping, testing, and assessment.

To learn more about Job forecasting refer to:

https://brainly.com/question/28453987

#SPJ1

what does the following return, when passed the argument -702? int recur(int n) { if (n < 0) return -1; else if (n < 10) return n; else return ((n % 10) recur(n / 10)); } group of answer choices 9 -9 -1 -702

Answers

The given function will return -1 when passed the argument -702.

The given program code when passed with the argument -702 will return -1. What is the given program doing? The given program is a recursive function that will take an integer n as input, and it returns the sum of digits of the given integer. If the given integer is less than zero (i.e., negative), then it returns -1. If the given integer is less than 10, then it returns the integer itself. Otherwise, it finds the sum of the given integer's last digit and recursively calls itself with the remaining integer excluding the last digit until it gets a value less than 10. Then, it adds up all the returned values of recursive calls to find the sum of the digits of the given integer. In the given program, when it is passed with the argument -702, the program will first check if -702 is less than 0 or not, which is true. Therefore, the program returns -1 as a result. So, the correct answer is option C. -1.

learn more about integers here:

https://brainly.com/question/15276410

#SPJ11

What is the difference between a prefix and postfix in Java?

Answers

Answer:

prefix comes first

Explanation:

pre means before, and post means after.

layers allow you to work with one element of an image without disturbing the others true or false​

Answers

I think it is True not sure but try it

The local library dealing with a major computer virus checked its computers and found several unauthorized programs, also known as ______.

A. Software
B. Hardware
C. Malware
D. Torrents

Answers

Answer:

malware

Explanation:

Answer: C. Malware

i just did it

Other Questions
What do you mean by the crude birth rate? What information can be gained from the country having high crude birth rate? When Werner and colleagues (2002) placed signs on a campus with a two-sided message that not only stated the importance of recycling but also acknowledged the inconvenience of it, recycling: FASATSTTSTSST PLEASEEEEE !!!!!!!!! PLEASE HELP ASAP !!!!!!!!The Aztecs civilization was nearly destroyed by the new Spanish explorers through the use of A) missionaries and loss of Aztec religious leadership B) weapons and diseases carried by the explorers C) economic trading and loss of gold D) famine and the loss of farmland what tool is most likely used to observe salt crystalsmicroscopeunaided eyepan balancetelescope Hungry Joe was crazy, and no one knew it better than Yossarian, who did everything hecould to help him. Hungry Joe just wouldn't listen to Yossarian. Hungry Joe just wouldn'tlisten because he thought Yossarian was crazy.From Joseph Heller, Catch-22. Copyright 1955 by Joseph Hellerfirst personsecond personthird personSubmitWork it out 5(x+2)= (5+10x) how do i solve a) Name two common Debt Leverage Ratios?For each answer the following:b) What is it measuring?c) Give the equation? d) What risk do these measure and do you want the ratios higher or lower?e) What would the ratio be if 1/2 of the company is financed by debt? The women in the play find several items that indicate Mrs. Wright's household routine was abruptly interrupted. The interruption was likely caused by What are the 5 things in a summary?. hurricane season for the atlantic ocean lasts from june to november. which factor makes an atlantic hurricane less likely to form during the month of march? What is the sum of the interior angles of the polygon pictured below? the security rules requirements are organized into which of the following three categories What is the best measure of unemployment?. Which of the following gives the correct numbers of protons, neutrons, and electrons in a neutral atom of \( \frac{118}{50} \) Sn? 118 protons, 118 neutrons, 50 electrons 68 protons, 68 neutrons, 50 e When reading a timeline in history, which tool are you using?sequencetimelinecompare/contrastproblem solution What did Athens do that contributed to the start of the war with the Persians? A)Refused to pay tribute to the Persian King. D)Sought to convert the Persians to the worship of Greek gods. C)Supported Sparta in their rebellion against the Persians. B)Supported the Ionian city-states' rebellion against Persia. 12. Which of the following is false about a Mortgage Loan Originator (MLO) license or endorsement? a. Mortgage Loan Originator (MLO) requirements are determined under the Mortgage Loan Originator NMLS/SAFE Act. b. Any California-licensed real estate salesperson or California- licensed real estate broker is legally entitled to perform mortgage origination/real property lending services to the public. c. Before a California-licensed real estate salesperson or California- licensed real estate broker performs mortgage origination/real property lending services to the public, that salesperson or broker also must obtain a Mortgage Loan Originator (MLO) license or endorsement. d. A person acting as an MLO in California without a proper MLO license or MLO endorsement is guilty of a crime punishable by six (6) months in prison, plus a fine of up to $20,000. Identify the prepositional phrase (or phrases) in the following sentence. (If there are multiple phrases, select multiple answers.)The 6th graders squealed with delight when candy began falling from the sky.Select one or more:a.from the skyb.The 6th gradersc.began fallingd.with delight in part I and II of the lab, what happened to the electrons of each element to produce the different colors of light?