when activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be

Answers

Answer 1

When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be automated.

What is Automation?

Automation is the use of technology, specifically computers and software, to perform tasks that were previously performed by humans. It involves the creation of systems and processes that can operate independently and without direct human intervention. The main goal of automation is to increase efficiency, reduce errors, and save time. Automation can be applied to a wide range of industries, including manufacturing, finance, healthcare, and many others.

When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be automated.

Automation refers to the process of using technology to perform tasks and operations that were previously done manually by people. This involves the use of software programs and algorithms that follow a set of instructions to perform specific functions. Automation aims to improve efficiency, accuracy, and speed of work processes, and can be applied in various industries such as manufacturing, finance, and healthcare.

Learn more about Automation click here:

https://brainly.com/question/346238

#SPJ4


Related Questions

The Data Link Later of the OSI Model is comprised of two sublayers. What are they?

Answers

The Data Link Layer of the OSI Model is indeed comprised of two sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer. The LLC sublayer handles the flow and error control of data between devices, while the MAC sublayer handles the addressing and transmission of data over the physical medium.

The Data Link Layer is the second layer of the OSI model. It is responsible for providing error-free transmission of data over the physical layer, which is the first layer. The Data Link Layer is divided into two sublayers: LLC (Logical Link Control) sublayer: This sublayer is responsible for providing a reliable logical link between two devices. It performs functions such as flow control, error checking and recovery, and framing. It also ensures that data is transmitted in the correct sequence. MAC (Media Access Control) sublayer: This sublayer is responsible for controlling how devices access the physical network. It is responsible for ensuring that only one device can transmit at a time and that collisions are avoided. The MAC sublayer also provides addressing and identification of devices on the network. Together, these two sublayers ensure that data is transmitted reliably and efficiently over the network. They work together to ensure that the data is transmitted in the correct sequence, without errors, and to the correct destination.

Learn more about media here-

https://brainly.com/question/31359859

#SPJ11

Who wrote Hamlet?

Brainliest for the right answer​

Answers

Answer:

William Shakespeare wrote hamlet

Explanation:

it’s wroten by a William Shekespeare

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

What is a step by step procedure written to carry out a task?

What is a step by step procedure written to carry out a task?

Answers

Answer:

A. Algorithm

Explanation:

A computer uses algorithm (a well-defined procedure ) to solve a problem.

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. On average, 7 days elapse between the time the checks are deposited in the local bank and the time the funds become collected funds (and available for disbursements) at the concentration bank. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. Depository transfer checks cost $0.50 (including postage), and wire transfers.cost $19. Assume there are 250 working days per year. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. Assume that there are 365 days per year. Determine the net (pretax) benefit to Peterson of using wire transfers if annual sales are $61m. Round your answer to the nearest dollar. Enter your answer in whole dollars. For example, an answer of $1.20 million should be entered as 1,200,000 not 1.20. Don't forget the negative sign if it is negative.
Hint: There are six centers so multiply by the wire transfer cost by six.
Hint: Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer.

Answers

Peterson Electronics should use wire transfers because it reduces elapsed time by 5 days.

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. The net pretax benefit to Peterson of using wire transfers is $154, 000 per annum. Wire transfers are expensive compared to depository transfer checks which cost $0.50 (including postage). But it will reduce the elapsed time by five days. Therefore, it is more efficient. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. There are 250 working days in a year. Therefore, there will be 250/365 days of collection.  The annual sales of Peterson are $61 million. Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer. A wire transfer cost $19. There are six centers so the wire transfer cost is multiplied by six.

Therefore, the net pretax benefit to Peterson of using wire transfers is $154, 000 per annum.

To know more about elapsed time visit:

brainly.com/question/16277579

#SPJ11

What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending sequence?
(a) 65, 34, 28, 68, 52, 21

Answers

Answer:

21,28,34,52,65,68

Explanation:

Following are the Python program to Bubble sort the given array value.

Program:

def sort(l):#defining the a method sort that takes list value in parameter

   for n in range(len(l)-1, 0, -1):#defining a loop that counts list value and performs the swapping

       for i in range(n):#defining another loop that counts range of list

           if l[i] > l[i + 1]:#defining if block that check list number value

               l[i], l[i + 1] = l[i + 1], l[i]#performing the swapping

l=[ 65, 34, 28, 68, 52, 21]#defining a list l that holds integer value

print("Unsorted list: ")#print message

print(l)#print list value

sort(l)#calling the sort method

print("Sorted Array: ")#print message

print(l)#print sorted list value

Output:

Please find the attached file.

Program Explanation:

Defining the method "sort" that takes list value "l" as a parameter, and defines a loop that counts list values and performs the swapping.Inside the loop, another loop is defined that counts the range of the list and uses a conditional statement.In this case, it uses an if block that checks the list number value and performs the swapping.Outside the method, a list "l" that holds integer values is used, and the print method that calls and prints its value.

Find out more about the sorting here:

brainly.com/question/18568184

What would be the state of the following list after each of the first four passes in a Bubble sort, sorting

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

Answers

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into the operating system's memory. Peripherals are external devices that are connected to the computer to enhance its functionality. Examples of peripherals include printers, scanners, keyboards, and mice.

Device drivers are software programs that allow the operating system to communicate with the peripherals connected to the computer. They enable the computer to recognize the peripheral and understand its capabilities. Without the device driver, the peripheral may not function correctly, or the computer may not recognize it at all.

When a computer starts up, the operating system reads the information from the computer's BIOS and loads the necessary device drivers into memory. This process allows the operating system to communicate with the connected peripherals and ensure that they function correctly.

In conclusion, device drivers for all connected peripherals are loaded into the operating system's memory each time a computer starts up. This ensures that the computer can communicate with and make use of the external devices that are connected to it.
Hi! When a computer starts up, the device drivers for all its connected peripherals are loaded into the computer's memory, specifically RAM (Random Access Memory).

To give you an overview, peripherals are external devices connected to a computer, such as keyboards, mice, printers, and USB drives. Device drivers are software programs that enable the computer's operating system to communicate with and control these peripherals effectively.

When the computer is powered on, it undergoes a startup process called "booting." During this process, the BIOS (Basic Input/Output System) performs hardware checks and loads the operating system into RAM. Afterward, the operating system locates and loads the necessary device drivers for all connected peripherals, storing them in RAM as well. This ensures that the computer can interact with and manage the peripherals, allowing you to use them efficiently.

To know more about booting visit:

https://brainly.com/question/14356249

#SPJ11

computed radiography utilizes ____ for latent image formation.

Answers

Computed radiography utilizes photostimulable phosphor plates for latent image formation. Photostimulable phosphor (PSP) technology is used in computed radiography (CR) imaging, which is a form of digital radiography that uses plates coated with PSP crystals to record X-ray energy and create digital images.

The CR imaging process can be broken down into the following stages:Exposure: An X-ray beam is directed toward a phosphor plate that is coated with photostimulable phosphors. When X-rays pass through the body and interact with the phosphor plate, the energy is stored by the phosphor plate in the form of trapped electrons.

Reading: The plate is placed into a special scanner that uses a laser beam to excite the trapped electrons in the photostimulable phosphors. This releases light energy from the plate, which is collected by a photomultiplier tube and transformed into an electronic signal.

Processing: The electronic signal is sent to a computer, which processes the information and creates a digital image that can be viewed on a monitor. The digital image can be manipulated and enhanced using various software tools.

#SPJ11

Learn more about "digital radiography" https://brainly.com/question/7324706

You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network needed? (multiple choice)



How many employees are using each computer?

How many hours do employees work?

How many computers will be networked?

What is the salary scale of networked employees?

What type of work is done at networked computers?

How are business documents shared?

Answers

The factors will be considered are How many employees are using each computer?, How many computers will be networked?. The correct options are A and C.

What is network and why is it important?

Computers, servers, mainframes, network devices, peripherals, and other linked devices form a network that enables data sharing. The Internet, which connects millions of people worldwide, is an illustration of a network.

Simply put, networking entails establishing relationships with other business people. Always consider the benefits to both sides when networking.

A better reputation, higher visibility, a stronger support network, improved business growth, and more meaningful connections are a few benefits of networking.

To complete tasks, distributed computing makes advantage of computing resources across a network.

How many workers are using each computer will be one of the criteria taken into account. , How many machines will be connected to a network?

Thus, A and C are the correct options.

For more details regarding network, visit:

https://brainly.com/question/15088389

#SPJ5

Proportional spacing replaced what other kind of spacing? question 2 options: parallel spacing monospacing one-to-one spacing fixed spacing

Answers

According to the statement, Proportional spacing replaced monospacing.

Describe monospacing.

A monospaced font is one in which each letter and character takes up the same amount of horizontal space. It is also known as a fixed-pitch, fixed-width, or non-proportional font. Variable-width fonts, in contrast, feature letters and spacing that are all the same width.

Monospace fonts have their uses.

Practicality: On all screen sizes, monospaced typefaces are exceptionally simple to read. This means that your clients can quickly and easily locate what they're looking for on any device, greatly enhancing the user experience. Your users may become clients more frequently as a result.

To know more about monospace visit :

https://brainly.com/question/17824852

#SPJ4

you have a small home network connected to the internet using an rg-6 cable. you need to move the router, but you can't find anymore rg-6 cabling. which cable type could you use instead? answer rg-59 cat 3 rg-58 cat 5e

Answers

Instead of using RG-6 cable for small home networks connected to the internet, we utilize RG-59 type cable.

How far can coaxial cable travel before losing signal?

Coaxial cable can be deployed over longer distances than twisted-pair cable.For instance, Ethernet can cover a distance of around 100 meters (328 feet) with twisted-pair wiring. Using coaxial wire increases the distance to 500m (1640.4 feet).

How can I set up a coaxial wire on my computer so I can access the internet?

Coaxial cables should have one end connected to the cable wall outlet and the other to the Cable In/RF IN port on the modem's back. Your computer should be linked to one end of the Ethernet cable, and the Ethernet outlet on the modem's back should be attached to the other.

To know more about internet visit:-

https://brainly.com/question/13308791

#SPJ1

a specific statement about what a program should accomplish and is directly measurable is called a(n):

Answers

A specific statement about what a program should accomplish and is directly measurable is called a program objective.

Program objectives are clear and measurable goals that outline the desired outcomes or results of a program. They provide a framework for program planning, implementation, and evaluation. A well-defined program objective should be specific, measurable, attainable, relevant, and time-bound (SMART). The specificity of a program objective means that it is clear and precise, leaving no room for ambiguity. Measurability refers to the ability to quantitatively or qualitatively assess the achievement of the objective. This allows for objective evaluation and monitoring of progress. By being directly measurable, program objectives provide a basis for assessing the effectiveness and success of the program. Program objectives serve as benchmarks against which program performance can be evaluated. They help guide decision-making, resource allocation, and program improvement efforts. By setting specific and measurable objectives, organizations can track their progress, identify areas for improvement, and demonstrate the impact of their programs.

Learn more about [program objectives] here:

https://brainly.com/question/31741790

#SPJ11

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

The multiprocessor system which consists of a set of processors that share a common main memory and are under the integrated control of an operating system is a _________ . Select one: a. cluster b. functionally specialized processor c. loosely coupled or distributed multiprocessor d. tightly coupled multiprocessor

Answers

Answer:

D

Explanation:

Tightly coupled multiprocessor

A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ________.

Answers

Answer:

I think is technologies

What will you see after on the next line?

>>> round(3.9)

Answers

Answer:

Explanation:

Program PascalABC:

begin

   WriteLn ( round(3.9));

 end.

 

Result:  4

Answer:7

Explanation:

i did it

4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk. ​

Answers

Answer:

a) Special-purpose computer

b)

c)microcomputers

d) hybrid computer

e) digital computer

f) laptop computers

g) desktop computers.

Please mark me as brainlist :)

A computer program is tested by 3 independent tests. When there is an error, these tests will discover it with probabilities 0.2,0.3, and 0.5, respectively. Suppose that the program contains an error. What is the probability that it will be found by at least one test?

Answers

The probability that the error in the computer program will be found by at least one test can be calculated as 0.8.

Let's calculate the probability of the error not being found by any of the tests. Since the tests are independent, we can multiply the probabilities of each test not finding the error:

The probability of error not being found by Test 1 = 1 - 0.2 = 0.8

The probability of error not being found by Test 2 = 1 - 0.3 = 0.7

The probability of error not being found by Test 3 = 1 - 0.5 = 0.5

Now, we calculate the probability of the error not being found by any of the tests:

Probability of error not being found by any test = Probability of error not being found by Test 1 × Probability of error not being found by Test 2 × Probability of error not being found by Test 3

= 0.8 × 0.7 × 0.5 = 0.28

Finally, we can determine the probability of the error being found by at least one test:

Probability of error is found by at least one test = 1 - Probability of error not being found by any test

= 1 - 0.28 = 0.72

Therefore, the probability that the error will be found by at least one test is 0.72 or 72%.

Learn more about probability here:

https://brainly.com/question/31828911

#SPJ11

You learned in class how to use a named pipe (aka FIFO) and the netcat
(nc) program to turn mdb-lookup-cs3157 into a network server.
mkfifo mypipe
cat mypipe | nc -l some_port_num | /some_path/mdb-lookup-cs3157 > mypipe
Write a shell script that executes the pipeline.
- The name of the script is "mdb-lookup-server-nc.sh"
- A shell script starts with the following line (the '#' is the 1st
character without any leading space):
#!/bin/sh
And the line must be the VERY FIRST LINE in the script.
- You must make the file executable using "chmod" command.
- The script takes one parameter, port number, on which nc will
listen.
- The script should create a named pipe named mypipe-, where
indicates the process ID of the shell running the script. The
named pipe should be removed at the end of the script.
- See section 3.4 in the Bash Reference Manual
(http://www.gnu.org/software/bash/manual/bashref.html) for how to
refer to the arguments and the process ID from your script.
- Because the named pipe gets removed only at the end of the script, if you
quit out of the script by hitting Ctrl-C while it's running, the FIFO will
not get removed. This is ok. You can manually clean up the FIFOs in the
directory. If this annoys you, you can optionally add the following lines
to your script after the first line:
on_ctrl_c() {
echo "Ignoring Ctrl-C"
}
# Call on_ctrl_c() when the interrupt signal is received.
# The interrupt signal is sent when you press Ctrl-C.
trap on_ctrl_c INT

Answers

The script takes one parameter, which is the port number on which nc will listen. The script should create a named pipe named mypipe-, where indicates the process ID of the shell running the script. The named pipe should be removed at the end of the script. The script starts by defining an interrupt handler that ignores Ctrl-C.

To create a shell script called "mdb-lookup-server-nc.sh" that executes the pipeline with the given specifications, follow these steps:

1. Open a text editor and add the following lines of code to create the shell script:

```bash
#!/bin/sh

on_ctrl_c() {
   echo "Ignoring Ctrl-C"
}

# Call on_ctrl_c() when the interrupt signal is received.
# The interrupt signal is sent when you press Ctrl-C.
trap on_ctrl_c INT

port_number="$1"
pipe_name="mypipe-$$"

mkfifo "$pipe_name"
cat "$pipe_name" | nc -l "$port_number" | /some_path/mdb-lookup-cs3157 > "$pipe_name"

rm "$pipe_name"
```

2. Save the file as "mdb-lookup-server-nc.sh".

3. Open a terminal and navigate to the directory where the script is saved.

4. Make the file executable using the "chmod" command:
```bash
chmod +x mdb-lookup-server-nc.sh
```

Now you can run the script with the specified port number as its argument:

```bash
./mdb-lookup-server-nc.sh some_port_num
```
It then checks the number of arguments passed to the script. If there is not exactly one argument, the script prints an error message and exits.The script then sets the b variable to the first argument, creates a FIFO with a unique name, and starts the pipeline. When the pipeline exits, the script removes the FIFO.This script will create a named pipe called "mypipe-", execute the pipeline with netcat listening on the given port number, and remove the named pipe at the end. Additionally, it will ignore the interrupt signal (Ctrl-C) while running.

Learn more about FIFO: https://brainly.com/question/12948242

#SPJ11

When Java source code is compiled, each individual class is put into its own output file named after the class and using the ______ extension

Answers

Answer:

.class

Explanation:

3. How are you able to create photographs differently than 100 years ago?

Answers

Answer:

it willbe black and white

Explanation:

Answer:

Yes, of course!

Explanation:

Digital Cameras can create photographs very different than 100 years ago, which means the answer is yes.

Rachel is the network administrator for a network that runs Microsoft Windows Server 2016. Rachel is responsible for managing and maintaining all DHCP servers in the organization. She needs to create a test lab that represents the current production environment. The lab network needs to be completely isolated from the rest of the production network. Rachel needs to recreate the current production DHCP server configuration in the test lab as quickly as possible. What should she do?

Answers

Answer:

Back up the current DHCP database and restore it to the DHCP in the test lab.

Explanation:

Who is the prince of math?

Answers

Answer:

Johann Carl Friedrich Gauss

Explanation:

Johann Carl Friedrich Gauss

People who make money investing in the stock market.....
A) get certain tax breaks.
B) should sell quickly to avoid taxes.
C) have to pay a fee to keep a stock.
D) must pay taxes on profits.
The answer is D ^^^

Answers

I think its D hope that helped

Answer:

D must pay taxes on profits.

Explanation:

use the method of example 9.5.10 to answer the following questions. (a) how many 17-bit strings contain exactly eight 1's? the number of 17-bit strings that contain exactly eight 1's equals the number of ways to choose the positions for the 1's in the string, namely, . (b) how many 17-bit strings contain at least fourteen 1's? (c) how many 17-bit strings contain at least one 1? (d) how many 17-bit strings contain at most one 1?

Answers

1) The total number of 17-bit strings that contain exactly eight 1's is 23, 310.

2) Total number of 17-bit strings that contain at least fourteen 1's are: 834

3) The number of 17-bit strings containing at least one 1 is 131, 071.

4) The number of 17-bit strings that contain at most one 1 is: 18.

What are bit strings?

Bit strings are useful for representing sets and manipulating binary data. In right to left order, the elements of a bit string are numbered from zero to the number of bits in the string less one (the rightmost bit is numbered zero).

A bit-string constant is represented by a quoted string of zeros and ones followed by the letter B. A one-length bit string is a boolean value having the values '0'B and '1'B, which represent false and true, respectively.

The calculation is processed using the math idea of Combination.

1) Total Strings = ¹⁷C₈

= 17!/(8! * 9!)

= 24, 310

2) Total Strings is given as:

¹⁷C₁₄ +  ¹⁷C₁₅ +  ¹⁷C₁₆ +  ¹⁷C₁₇

= 680 + 136 + 17 + 1

= 834

c) Total strings in this case is given as:

2¹⁷ -  ¹⁷C₀

=    2¹⁷ - 1

= 131, 071

d) Total Strings =  ¹⁷C₀ + ¹⁷C₁

= 1 + 17

= 18

Learn more about Bit Strings:
https://brainly.com/question/14229889
#SPJ1

In the five-layer hierarchy of apple's operating systems, mac os x/macos, which layer is most complex?

Answers

In the five-layer hierarchy of Apple's operating systems, Mac OS X / macOS, the layer that is most complex is the application layer.

Each layer in the five-layer hierarchy of Apple's operating systems is unique and important.

The five layers are as follows:

Physical layer: This layer includes the physical components of the computer, such as hardware and firmware.

Kernel layer: This layer is responsible for interacting with the hardware and provides a secure interface for applications.

Driver layer: This layer provides the interface between the kernel and hardware.

Application layer: This layer is responsible for running applications and provides a graphical user interface (GUI) for the user.

Interface layer: This layer manages the user's interactions with the operating system and provides the user with an experience that is both intuitive and user-friendly.

The application layer is the most complex layer in the hierarchy since it must interact with the lower layers to provide users with the most useful and powerful features .

To know more about complex visit :

https://brainly.com/question/31836111

#SPJ11

You are an expert at working with computers and you are considering setting up a software development company when you graduate from Southwestern University in May. You anticipate that in order to do this, you will need $100,000 of computer hardware in May. This hardware can be depreciated in a straight-line method over five years to a salvage value of zero. In addition to the hardware, you will need to rent office space for the amount of $50,000 per year and hire five software specialists at a cost of $75,000 per year for each specialist (assume you do not hire the specialists or need the office space until year 1). You expect your marketing and selling costs to be $100,000 per year in order to make the public aware of your new software (which also begin in year 1). Based on initial surveys, you expect to sell your software at $100 per unit and sell 6,000 units in the first year, and those sales will increase 10% per year for the remaining four years after that. Your costs are estimated to be at $20 per unit and you will need to maintain a level of working capital equal to 10% of the annual revenues for that year (assume that this working capital investment is made at the beginning of the year). Assume your tax rate would be 35% and your opportunity cost of capital is 10%.

Answers

The list of the financial metrics for the software development company over the five-year period are:

Net Income (before taxes)TaxesNet Income (after taxes)Operating Cash FlowFree Cash FlowDiscounted Cash Flow (DCF)

What is the cost of the  software development?

Starting amount of money put into a project or business.

Yearly expenses

The cost of renting an office space is $50,000.The total amount of money paid to 5 software specialists is $375,000- which means each specialist earns $75,000.The amount spent on advertising and selling: $100,000.Sales and revenue means the amount of money a business earns from selling its products or services.

Learn more about  software development from

brainly.com/question/30029004

#SPJ1

i was scripting for my game design clas and i was just creating a story based game. its not really a question but could you guys (meaning fellow users) give it a go? not done yet tho..

file:///C:/Users/Gamer_x9/Downloads/A%20New%20Beginning.html

its not an adobe link that pulls another tab dw i would never

Answers

Answer: sure thing

Explanation:

70s music or russian music

Answers

Explanation:

BB cgbfyhcthcfgvxdrgjyfddg

Don’t listen to any

+10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.
Messages can still be blocked at the server level.
Messages cannot be blocked at the network firewall.
Most obvious spam messages will still reach the client computer.

Answers

Answer:

its D. most obvious spam messages will still reach the clients computer.

Explanation:

i got a 100 on the test on edge 2020.

Answer: D. Most obvious spam messages will still reach the client computer.

Explanation:

Other Questions
What is an equation of the line that passes through the points (2, -5)(2,5) and (5, -2)(5,2)? Help i will give brannliest answer many presidents in american history have faced constitutional questions related to their powers, policies, or conduct. presidents ronald reagan, bill clinton, and george w. bush all faced such constitutional issues during their administrations. describe . a grindstone with a mass of 50 kg and radius 0.8 m maintains a constant rotation rate of 4.0 rev/s by a motor while a knife is pressed against the edge with a force of 5.0 n. the coefficient of kinetic friction between the grindstone and the blade is 0.8. what is the power provided by the motor to keep the grindstone at the constant rotation rate? Pythagorean TheoremAs part of Fort Yargo State Park's Geocachingspectacular, Kylee, Constance, Zoe go on a GPStreasure hunt. They start at the welcome center andwalk 250 feet due north. They then turn and walk 100feet due east. They turn again and walk 150 feet duesouth to the first geocache.How far are Kylee, Constance, and Zoe from thewelcome center?ANSWER ASAP Check the adequacy of a 10-ft- (3-m)-span cantilever beam, assuming a concrete strength of f c =4ksi (30 MPa) and a steel yield strength of f y =60ksi(400MPa ) are used. The dimensions of the beam section are b=10in.(250 mm),d=20in.(500 mm),d =2.5in.(60 mm),A s = six no. 7 bars (620 mm), A s = twono. 5 bars (215 mm). The dead load on the beam, excluding its own weight, is equal to 2 K/ft (30kN/m), and the live load equals 1.25 K/ft(20kN/m ). any ellipse drawn that connects the poles and is used to measure angular distance east and west is the definition of Pleaseeeee HELPPPP THIS IS TIMED ALSO,A book slides along a table and comes to a stop. Explain, in detail, all the forces acting on the book. what element uses the following quantum numbers: n=2 l=1 ml=-1 ms=1/2n=3, l=2 ml=-1, ms=-1/2 after applying the aed to an adult patient in cardiac arrest, you analyze her cardiac rhythm and receive a shock advised message. emergency medical responders, who arrived at the scene before you, tell you that bystander cpr was not in progress upon their arrival. you should: The Theme of Wealth is explored in The Great Gatsby through:A.) Gatsby's race to become rich so that he can impress Daisy.B.) Myrtle is having an affair with Tom and Daisy is having an affair with Gatsby.C.) Gatsby is trying to recapture his time spent with Daisy before he went to fight in the war. D.) Nick Carraway graduated from Yale. why is the answer to this question? Can someone help me please I dont get this (due today) Describe how attraction and romantic love might be related. For example, does attraction always lead to love? If not, what factors of attraction might lead to feelings of love? Simplify the following expression: \( \frac{\sin (-t+2 \pi) \sec (t+3 \pi)}{1+\tan ^{2}(t+7 \pi)} \). a) \( \cot (t) \) b) \( \sin (t) \cos (t) \) c) \( -\sin (t) \cos (t) \) d) \( -\tan (t) \) e) \( Selecting an Allocation Base and Analyzing Manufacturing Overhead [LO 2-3, 2-5] Amberjack Company is trying to decide on an aliocation base to use to assign manufacturing overhead to jobs. The company has always used direct labor hours to assign manufacturing overhead to products, but it is trying to decide whether it should use a different allocation base such as direct labor dollars or machine hours. Actual and estimated data for manufacturing overhead, direct labor cost, direct labor hours, and machine hours for the most recen fiscal year are summarized here: Required: 1. Based on the compary's current allocation base (direct labor hours), compute the following: o. Predetermined overhead rate. (Round your answer to 2 decimal places.) b. Applied manufacturing overhead. (Round your intermediate calculotions to 2 decimal places and final answer to the nearest. whole dollor amount) c. Over-or underapplied manufacturing overhead. (Round your intermediate colculations to 2 decimal piaces and final answer to the nearest whole dollar amount.) 2. If the company had used direct labor dollars (instead of direct labor hours) as its allocation base, compute the following: 0. Predetermined overhead rate (Round your onswer to 2 decimol ploces, L.e. 3.63\%) b. Applied manufacturing overhead, (Round your intermediate calculotions to 2 decimal ploces and final answer to the nearest whole dollor amount.) c. Over-or underapplied manufacturing overhead. (Round your intermediote calculations to 2 decimal ploces and final answer to the nearest whole dollar amount.) 3. If the company had used machine hours (instead of direct labor hours) as its allocation base, compute the following o. Predetermined overhead rate. (Round your onswer to 2 decimol places.) b. Applied manufacturing overhead (Round your intermediate calculations to 2 decimal ploces and final answer to the nearest. whole dollar amount.) c. Over. or underapplied manufactuting overhead. (Round your intermediate calculations to 2 decimal places and final answer to the neorest whole dollor omount) 4. Based on last year's data alone, which allocation base would have provided the most accurate measure for applying manufacturing overthead costs to production? please do A 1-4 and B 1-2its due when i get to skoo Which of the following is an example of a hydrogen bondA bond between H of one water molecule and the o of another water molecule The bond between two hydrogen atoms Which equation shows the point-slope form of the line that passes through (3, 2) and has a slope of y plus StartFraction one-half EndFraction equals 3 left-parenthesis x minus 2 right-parenthesis.?y + 2 =y plus 2 equals StartFraction one-third EndFraction left-parenthesis x plus 3 right-parenthesis.(x + 3)y 2 = y minus 2 equals StartFraction one-third EndFraction left-parenthesis x minus 3 right-parenthesis.(x 3)y + 3 = y plus 3 equals StartFraction one-third EndFraction left-parenthesis x plus 2 right-parenthesis.(x + 2)y 3 = y plus StartFraction one-half EndFraction equals 2 left-parenthesis x minus 3 right-parenthesis.(x 2) In reaction to the 1906 riots, who believed that women were being protected?African American leaderswhite leadersforeign reportersthe federal government 13. Write the slope- intercept form of the line described in the followingParallel to Y=5x-3and passing through (0,-5)