Answer:
1
Explanation:
Answer:
c
Explanation:
because The excerpt is a sample works-cited list.
A typed list of citations titled Works cited, with W and C capitalized. There are 3 citations. The turnovers for the second and third citations set flush left. There is extra space between citations. The first words in each citation, from top to bottom, are Keegan, Keller, South. The third citation does not have an access date.
♡ ∩_∩
(„• ֊ •„)♡
┏━∪∪━━━━┓
♡ good luck 。 ♡
┗━━━━━━━┛
the concept of a human resource information system can be nested within the broader concept of which refers to internet-based information systems and technology that span across organizational levels. group of answer choices e-records e-queries e-forms e-hrm
A human resource information system is a subset of the larger idea of electronic records, electronic queries, and electronic forms.
What exactly is the idea behind human resource management?In order to develop and support people and guarantee a healthy work environment, human resource management is a strategic strategy. Although its duties vary between firms and sectors, they often cover hiring, pay and benefits, development, and employee relations.
What exactly does human resource management mean?It is a strategy used by organizations to make the most of their human resources for everyone's benefit, including the growth, development, and contentment of the individuals who work there.
To know more about information visit:-
https://brainly.com/question/14597358
#SPJ4
I WILL MAKE BRAINLIEST PLS HURRY
Give your own examples for how list and dictionary data structures could keep track of some common information you might need. Your examples should be different from the ones in the unit.
Examples
Lists:
- Keep track of how much water you drink per day
- Hours spent on studying per week
- The growth of a plant
Dictionaries:
- Keep track of overall grades for each subject
- Keep track of where money is mostly spent on
- Dates for upcoming assessments and tests
Hope these examples help :)
-goodLizard is right
--Please make him brainliest
[Thank you]
Identify the types of information that are necessary to communicate with emergency responders.
The following information are necessary to communicate with emergency responders:
The chemicals that are involved in an incident.Any other hazards present in the laboratory.How the incident occurred or happened.Who is an emergency responder?An emergency responder can be defined as an individual who has the requisite training, license and expertise to respond to an unexpected and dangerous situation.
The examples of emergency.Some examples of an unexpected and dangerous situation are:
FireEarthquakeFloodIn conclusion, the following information are necessary to communicate with emergency responders:
The chemicals that are involved in an incident.Any other hazards present in the laboratory.How the incident occurred or happened.Read more on emergency responders here: https://brainly.com/question/20721365
Match each role to the corresponding web development task.
Answer:
1. Art director: selecting color palettes.
2. Web project manager: creating budget spreadsheets.
3. Usability lead: researching target audiences.
4. Developer: coding.
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.
The various role performed during the web development process (task) includes;
1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.
2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.
3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.
4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.
1 – Como contar uma história com responsabilidade e ética, utilizando técnicas aprimoradas para elaborar uma narrativa atrativa e responsável?
Answer:
Explain each part of the story in appropriate manner.
Explanation:
In order to tell the story with responsibility and ethics and create an attractive and responsible narrative, we have to explain each paragraph of the story that gives more information about the story as it proceeds to the audience. The story must have actions and humor in order to increase the interest of the listeners as well as a good message to the audience. Avoid inappropriate words or language during storytelling because it makes bad impression on the reader's mind.
Graphing calculator how to turn off scientific notation.
Answer:
Check to see if there is a button labeled “mode”. If there is a button labeled mode push it, then select “NORMAL” instead of “SCI”. Check to see if there is a button labeled “mode”. If there is a button labeled mode push it, then select “NORMAL” instead of “SCI”.
sorry if it doesn't help
good luck!
Explanation:
NEXT
Internet and World Wide Web: Mastery Test
1
Select the correct answer
An instructor receives a text message on her phone. Next, she reads out the text to the whole claws. Which network component plays a similar
role by receiving a message and broadcasting it to all other computers connected to the component?
OA Switch
OB .
hub
OC bridge
OD
router
Reset
Wext
Answer:
hub is the correct answer
hope it is helpful to you
What type of a structure is the best way to iterate through the characters of a string?.
Answer:Using the character iterator is probably the only correct way to iterate over characters, because Unicode requires more space than a Java char provides. A Java char contains 16 bit and can hold Unicode characters up U+FFFF but Unicode specifies characters up to U+10FFFF.
Explanation:
National Security requires that missile defense technology to be able to detect incoming projectiles or missiles. To make the defense successful, multiple radar screens are required. Suppose that three independent screens are to be operated and the probability that any one screen will detect an incoming missile is 0.8. Obviously, if no screens detect an incoming projectile, the system is unworthy and must be improved. i. What is the probability that an incoming missile will not be detected by any of the three screens? ii. What is the probability that the missile will be detected by only one screen? iii. What is the probability that it will be detected by at least two out of three screens? (b) Consider (a). Suppose it is important that the overall system be as near perfect as possible. Assuming the quality of the screens is as indicated in (a), i. (Determine Sample Size n ) How many are needed to insure that the probability that the missile gets through undetected is 0.0001 ? ii. (Determine p ) Suppose it is decided to stay with only 3 screens and attempt to improve the screen detection ability. What must be the individual screen effectiveness (i.e., probability of detection), in order to achieve the effectiveness required from (b)(i)?
Probability: i. 0.8%, ii. 9.6%, iii. 89.6%. Sample size: 1595. Individual screen effectiveness: at least 0.999966.
To calculate the probability that an incoming missile will not be detected by any of the three screens, we can use the complement rule. The probability of not detecting an incoming missile on any given screen is 1 - 0.8 = 0.2. Since the screens are independent, the probability that none of the screens will detect the missile is calculated by multiplying the individual probabilities together:
P(not detected on any screen) = 0.2 * 0.2 * 0.2 = 0.008
Therefore, the probability that an incoming missile will not be detected by any of the three screens is 0.008 or 0.8%.
To calculate the probability that the missile will be detected by only one screen, we need to consider all possible combinations where exactly one screen detects the missile. Since there are three screens and each screen has a 0.8 probability of detection, the probability of exactly one screen detecting the missile can be calculated as:
P(detected by one screen) = (0.8 * 0.2 * 0.2) + (0.2 * 0.8 * 0.2) + (0.2 * 0.2 * 0.8) = 0.096
Therefore, the probability that the missile will be detected by only one screen is 0.096 or 9.6%.
To calculate the probability that the missile will be detected by at least two out of three screens, we need to consider all combinations where two or three screens detect the missile. This can be calculated as:
P(detected by at least two screens) = 1 - P(not detected on any screen) - P(detected by one screen)
= 1 - 0.008 - 0.096
= 0.896
Therefore, the probability that the missile will be detected by at least two out of three screens is 0.896 or 89.6%.
(b) To determine the sample size (n) needed to ensure that the probability of the missile getting through undetected is 0.0001, we need to calculate the complement of this probability. The complement of 0.0001 is 1 - 0.0001 = 0.9999. This is the probability that the missile will be detected. Since each screen has a detection probability of 0.8, the probability of all screens detecting the missile can be calculated as:
P(all screens detect) = 0.8 * 0.8 * 0.8 = 0.512
We can set up the equation:
\(\sqrt{x}\) ≥ 0.9999
Solving for n, we can take the logarithm of both sides:
n * log(0.512) ≥ log(0.9999)
n ≥ log(0.9999) / log(0.512)
Using a calculator, we find that n ≥ 1594.55. Therefore, a sample size of 1595 is needed to ensure that the probability of the missile getting through undetected is 0.0001.
If it is decided to stay with only 3 screens and attempt to improve the screen detection ability, we need to find the individual screen effectiveness (p) required to achieve the desired overall effectiveness. In this case, the overall effectiveness is 1 - 0.0001 = 0.9999. Using the same equation as before, we can solve for p:
p * p * p ≥ 0.9999
\(\sqrt{x}\) ≥ 0.9999
Taking the cube root of both sides, we find:
p ≥ \(\sqrt{x}\)
Using a calculator, we find that p ≥ 0.999966. Therefore, each screen must have an individual effectiveness (probability of detection) of at least 0.999966 to achieve the desired overall effectiveness.
learn more about Missile Defense.
brainly.com/question/10199352
#SPJ11
The bullet points above describe _____.
A.) network topologies
B.) access privileges
C.) modems
D.) firewalls
Answer:
B
Explanation:
what do you think about when you enter school
Answer:
i think my day is about to start and i'm going to get the chance to finally talk to my best friends on D!$C0rD, and then i think about how my parents are rUDe for not letting me talk to my friends. :/
Not again
Or
I’m going to end my life today
I don’t like school
assume we have a language that contains the following valid token names: identifier, int literal, float literal, character literal, string, equal sign, plus op, minus op, div op, mult op, semicolon for the following statement in the language, write out the lexemes (in order from top to bottom) and each lexeme's matching token. there may be more positions in the table than there are lexemes / tokens. leave any extraneous positions in the table blank (do not put anything, even spaces, in the field). myvar
The given statement in the language is "myvar". The lexemes and their matching tokens for this statement are as follows:
| Lexeme | Token |
| myvar | identifier |
There are no other lexemes or tokens in this statement, so the rest of the positions in the table can be left blank.
A lexeme is a basic unit of meaning in a language, while a token is the representation of a lexeme in a programming language. In the given statement, the lexeme is "myvar", which is represented by the token "identifier". An identifier is used to represent a variable name in most programming languages, and in this case, "myvar" is the name of a variable. Since there are no other lexemes or tokens in this statement, the remaining positions in the table are left blank.
Learn more about lexeme:
https://brainly.com/question/28046688
#SPJ11
Describe at least five ways in which information technology can
help students studying subjects other than computing.
Answer:
It can help with; learning how to work things out in other subjects, help children gain access to help with subjects. It can help with studying for a test for any subject. Computers can help with maths because you have access to a calculator and finally. Computers can help with geography as you have access to maps.
Explanation:
What statement best describes operating systems?
O It's possible for modern computers to function without operating systems.
O Most operating systems are free or very inexpensive.
Operating systems are managed by the computer's microprocessor (CPU).
O Operating systems manage the computer's random access memory (RAM).
Answer: D) Operating Systems manage the computer's random access memory (RAM)
Explanation:
It's not A because all modern computers use some form of an Operating System.
It's not B because some Operating Systems can cost hundreds of dollars.
While C has some truth to it, it's reversed. Operating Systems are there to manage and allocate system resources, and D is the better choice.
The statement that best describes operating systems is D. Operating systems manage the computer's random access memory (RAM).
Operating systems simply means the software which supports the basic functions of a computer like scheduling tasks and the control of peripherals.
An operating system is a system software that helps in managing computer hardware and software resources. It's vital in managing the computer's random access memory.
Read related link on:
https://brainly.com/question/18978060
in python i wrote a function where if the user inputs a certain word the function repeats over again, since the function aaks for the word the end of the function, therotically the function can repeat infinte times. Now my question is, how can i find out how many times the function was repeated. i need to know how many times the function repeated in order to do a percentage calculation, can someone tell me, how i can find how many times the function was repeated ?
Beth earned a bachelor’s degree and has worked as a systems analyst for three years. Which of the following has Beth acquired?
a. knowledge
b. data
c. experience
d. information
Answer:
Experience
Explanation:
Since they mention she has worked for 3 years, it is hinting that she has experience. if this is not it than it could be a.
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and instead fall back to an older and less secure mode. What type of attack is this
Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.
What is downgrade security attack?A downgrade attack is known to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.
Note also that the Downgrading of a given protocol version is said to be a key element of a type of a man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.
Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack
Learn more about Downgrade attack from
https://brainly.com/question/24304791
#SPJ1
Computer has brought radical change in every field
Answer:
Yes it has brought change in every field
Explanation:
pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.
The given statement of copyrighted work is false.
What do you mean by copyright?
A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.
When you use someone's copyrighted work in something you are selling, you must get their permission first.
To learn more about copyright
https://brainly.com/question/357686
#SPJ13
Which type of interest rate can be adjusted due to changes in the market?
A. Compound interest rate
B. Fixed interest rate
C. Annual percentage rate
D. Variable interest rate
Answer: fixed intrest rate
Thats your answer hope it helps.
which is true of a web-based systems development environment?
The true statement of a web-based systems development environment is web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
A web-based systems development environment (WSDE) is a combination of tools, technologies, and architecture used to develop web-based applications or systems. WSDE aids in the development, testing, and deployment of web-based applications or systems.
WSDE uses technologies like HTML, CSS, JavaScript, and PHP for front-end development, server-side programming languages like PHP, Python, Ruby, and Java for back-end development, and a combination of tools and software like Git, Jenkins, and Docker for version control, continuous integration, and deployment.
In a web-based systems development environment, the application relies more on server-side processing and resources, reducing the dependency on individual desktop computing power.
Learn more about web-based systems development at https://brainly.com/question/30628089
#SPJ11
LightZone Inc., a manufacturer of LED lamps, uses a software to create programmed instructions for its automated equipment to ensure that its products are made as efficiently as possible. In this scenario, LightZone most likely uses _____ to program the automated equipment.
Computer aided manufacturing (CAM) is commonly known as a software tool/program. In the scenario stated, LightZone most likely uses computer-aided manufacturing software to program the automated equipment.
Computer aided manufacturing (CAM) software is simply known a s a computer program that makes use of numerical control (NC) so as to make a well thorough instructions which are called the G-code.This codes are known to drive CNC machines. CAM software often narrow the machining process and automates actions such as drilling and cutting. It therefore create high-quality manufacturing.
Learn more from
https://brainly.com/question/13918120
50 POINTS!!!!!!!!!!!
Give at least two examples of how the transport layer is used.
Answer:
The transport layer is responsible for delivering data to the appropriate application process on the host computers. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
Explanation:
Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
Answer:
1. The transport layer is responsible for delivering data to the appropriate application process on the host computers. and 2. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
-CC
Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message
Really appreciate the help.
#Swap this value by your name. Mine is Hamza :)
my_name = "Hamza"
#Get input from user.
inp = input("What's your name?: ")
#Print the length of his/her name.
print("The length of your name is",len(inp),"characters.")
#Check if the input matches with my name?
#Using lower() method due to the case insensitive. Much important!!
if(inp.lower()==my_name.lower()):
print("My name is",my_name,"too! Nice to meet you then.")
The base 10 number 18 is equal to which base 16 number?
10
12
14
16
Answer:
1 2 base 16
Explanation:
To convert to base 16 you divide the number with 16. 18/16=1 remainder 2;1 divide by 16 is =1
From bottom to top :1 2
.............. 1010111 needs to be transferred w.ith odd parity and the answer is
A. 01010111
B.11010111
C.10101110
D.10101111
Answer:
A. 01010111
Explanation:
This is because in odd parity, the number on the far left (the 8th number) would always be a 0
how has technology impacted the individual and the society
Answer:It affects the life of people and changes the way of their learning, thinking, and communication.
Explanation: mark me as the brainly-est to get the best answers
To make a profit the price of the items sold in the furniture store are marked up by 80 %after marking up the prices each item is put on the sale of 10%design algorithm to convert find the selling price of the items sold in the furniture store.
Answer:
The algorithm is as follows:
1. Start
2. Display "Input Item Price: "
3. Input Price
4. Markup = Price + 80% * Price
5. Selling_Price = 10% * Markup
6. Display "The Selling Price is "+Selling_Price
7. Stop
Explanation:
This signals the beginning of the algorithm
1. Start
This is a prompt that asks for the price of the item
2. Display "Input Item Price: "
This gets the price of the item
3. Input Price
This calculates the Markup (80% of the inputted price)
4. Markup = Price + 80% * Price
This calculates the selling price (10% of the markup)
5. Selling_Price = 10% * Markup
This prints the selling price
6. Display "The Selling Price is "+Selling_Price
This signals the end of the algorithm
7. Stop
Could someone please help me with on how to ask the user to enter two integer numbers, then between the two numbers inclusive, use a while loop to print the square of each number on the same line deprecated by a space?
I can send an example if needed
(And in edhesive please)
In python 3:
number1 = int(input("Enter a number: "))
number2 = int(input("Enter a number: "))
x = number1
while x in range(number1, number2+1):
print(x**2, end=" ")
x += 1
I think this is what you're looking for. Best of luck.
Review the items below to make sure that your Python project file is complete. After you have finished reviewing your turtle_says_hello.py assignment, upload it to your instructor.
1. Make sure your turtle_says_hello.py program does these things, in this order:
Shows correct syntax in the drawL() function definition. The first 20 lines of the program should match the example code.
Code defines the drawL() function with the correct syntax and includes the required documentation string. The function takes a turtle object 't' as an argument, and draws an L shape using turtle graphics.
Define the term syntax.
In computer programming, syntax refers to the set of rules that dictate the correct structure and format of code written in a particular programming language. These rules define how instructions and expressions must be written in order to be recognized and executed by the computer.
Syntax encompasses a wide range of elements, including keywords, operators, punctuation, identifiers, and data types, among others. It specifies how these elements can be combined to form valid statements and expressions, and how they must be separated and formatted within the code.
To ensure that your turtle_says_hello.py program meets the requirement of having correct syntax in the drawL() function definition, you can use the following code as an example:
import turtle
def drawL(t):
"""
Draws an L shape using turtle graphics.
t: Turtle object
"""
t.forward(100)
t.left(90)
t.forward(50)
t.right(90)
t.forward(100)
To ensure that your turtle_says_hello.py program is complete and correct.
1. Make sure that your program runs without errors. You can do this by running your program and verifying that it executes as expected.
2. Check that your program follows the instructions provided in the assignment. Your program should start by importing the turtle module, creating a turtle object, and define the drawL() function.
3. Verify that your drawL() function works as expected. The function should draw an "L" shape using turtle graphics. You can test this by calling the function and verifying that it draws the expected shape.
4. Ensure that your program ends by calling the turtle.done() function. This will keep the turtle window open until you manually close it.
5. Make sure that your code is properly formatted and indented. This will make it easier for others to read and understand your code.
6. Finally, ensure that your program meets any other requirements specified in the assignment. This might include things like adding comments or following a specific naming convention.
Therefore, Once you have verified that your program meets all of these requirements, you can upload it to your instructor for review.
To learn more about syntax click here
https://brainly.com/question/18362095
#SPJ1