Answer:
bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn
Choose the correct term to complete the sentence.
For most operating systems, the _______ function returns the number of seconds after January 1, 1970, 0:00 UTC.
O localtime()
O time()
O epoch()
Answer:
time() or time.time()
Explanation:
The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:
>>> time.time()
1652747529.0429285
For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,
What is the time() function?In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.
The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.
Therefore, the correct option is B.
Learn more about time() function here:
https://brainly.com/question/12174888
#SPJ2
Create a pseudo code for calculate the sum of squares of given input of numbers
Put a "0" in sum_of_squares. Calculate the square of each input integer, then add it to sum_of_squares. Sum_of_squares's final number should be printed.
What is pseudo-code made of?Pseudocode is a loosely defined type of programming description that is unrestricted by underlying technology or strict programming language syntax. It is used to draught a programme's initial draught or outline.
How is a number entered into pseudocode?The pseudocode expression INPUT() can be used to request human input. Like DISPLAY(), it functions exactly like a procedure but doesn't need any inputs. Instead, the evaluation of the INPUT() expression will merely produce the user-supplied input value.
To know more about sum_of_squares. visit:
https://brainly.com/question/2516345
#SPJ9
A network engineer in his office situated in Beijing China was trying to connect a server in
Singapore. He could not connect. Then he tried to connect to a server in his another office branch
in Beijing but also he could not connect to that server. What hardware is causing this problem?
Pinpoint and define that hardware device.
Answer:
"Ethernet LAN" causing the given issue. A further explanation is given below.
Explanation:
Ethernet technology should be used throughout the LAN design. The LAN infrastructure could be calculated in advance while using a router and perhaps a secure internet link Network switch, as well as your computer can indeed be attached to something like the LAN. LAN spreads throughout a local community and therefore could be connected to server machines within the same long separation, so limited that this only encompasses the department as well as property around which the LAN was already constructed.you want to ensure that a query recordset is read-only and cannot modify the underlying data tables it references. How can you do that?
To guarantee that a query's recordset cannot make any changes to the original data tables, the "read-only" attribute can be assigned to the query.
What is the effective method?An effective method to accomplish this is to utilize the "SELECT" statement along with the "FOR READ ONLY" condition. The instruction signifies to the database engine that the query's sole purpose is to retrieve data and not alter it.
The SQL Code
SELECT column1, column2, ...
FROM table1
WHERE condition
FOR READ ONLY;
Read more about SQL here:
https://brainly.com/question/25694408
#SPJ1
A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)
A. Vishing
B. Whaling
C. Spear phishing
D. Pharming
E. War dialing
F. Hoaxing
Answer: Spear phishing; Pharming
Explanation:
Based on the information given in the question, the security concerns that need to be identified and mitigated are spear phishing and pharming.
Spear phishing is the fraudulent practice whereby emails are sent from a trusted sender in which people are targeted to give out some confidential information.
Pharming is a cyberattack whereby the traffic of a website is redirected to another fake site. This is typically done when the host file on the computer of the victim has been changed.
Algorithm:
Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.
We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.
We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.
The algorithm should be O(nlogn)
My ideas so far:
1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.
Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.
Your help would be much appreciated!
To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.
Here's the algorithm:Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.
Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.
Initialize an empty min-heap to store the machine capacities.
Iterate through the sorted jobs in descending order of priority:
Pop the smallest capacity machine from the min-heap.
If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.
Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.
Add the capacity of the inefficiently paired machine back to the min-heap.
Return the total sum of priorities for inefficiently paired jobs.
This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.
Read more about algorithm here:
https://brainly.com/question/13902805
#SPJ1
Should one own a smart home device
What are some security issues that one can find bothersome with these types of devices?
Yes, one can have or should one own a smart home device
Some security issues that one can find bothersome with these types of devices are:
Privacy concernsVulnerabilities to hackingLack of updatesWhat are the security issues?Smart home tools offer usefulness and can help create growth easier, but they further create freedom risks that should be deliberate.
Some freedom issues so that find bothersome accompanying smart home tools contain:
Lastly, in terms of Privacy concerns: Smart home ploys may accumulate individual dossier, such as custom patterns and choices, that could be joint accompanying after second-party parties for point or direct at a goal buildup or added purposes.
Learn more about security issues from
https://brainly.com/question/29477357
#SPJ1
In this lab, 172.30.0.0 represents the __________ network and 10.20.1.0 represents the _________ network.
Answer:
Private, public
Explanation:
In this lab, 172.30.0.0 represents the private network and 10.20.1.0 represents the public network.
Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which one of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps?
For a network backbone requiring fiber-optic connections with a maximum transmission speed of 8 Gbps, Monica should use a transceiver that supports the appropriate fiber-optic standard and can handle the desired speed.
In this case, a suitable transceiver option would be the 8G Fiber Channel transceiver.
The 8G Fiber Channel transceiver is specifically designed for high-speed data transmission over fiber-optic networks.
It operates at a data rate of 8 gigabits per second (Gbps), which aligns with the maximum transmission speed requirement mentioned in the scenario.
Fiber Channel transceivers are commonly used in storage area networks (SANs) and other high-performance network environments.
When selecting a transceiver, it is crucial to ensure compatibility with the switches being used and the type of fiber-optic cable employed.
Monica should confirm that the switches she is working with support the 8G Fiber Channel standard and have the necessary interface slots or ports for these transceivers.
For more questions on fiber-optic
https://brainly.com/question/14298989
#SPJ8
How do you think productivity software like Microsoft Office might be useful in the healthcare field?
Microsoft Office offers several applications that are widely used in the healthcare field. Here are some of the common uses of Microsoft Office in healthcare:
Microsoft Word: It is extensively used in healthcare for creating and formatting documents such as patient reports, medical records, and referral letters.Microsoft Excel: It is used for data analysis, tracking patient records, managing inventory, financial calculations, and creating charts or graphs for a visual representation of data.Microsoft PowerPoint: PowerPoint is commonly used in healthcare for creating presentations, training materials, educational content, and reports.Learn more about Microsoft Office, here:
https://brainly.com/question/15131211
#SPJ1
pls pls pls pls pls pls pls pls plks
Answer:
Want to begin introduction?.......
Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.
A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:
Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.
From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.
Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.
The query design grid should look like this:
Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:
Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:
The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.
Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.
The final output should look like this:
Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
For more such questions on query, click on:
https://brainly.com/question/30622425
#SPJ8
Can some one help me right a 3 paragraph sentace on iPhone and androids specs it has too be 7 sentaces each paragraph
Answer:
iPhone
The iPhone has come a long way since its first model, the iPhone 3G. Now, the current iPhone 11 Pro Max comes with a 6.5-inch Super Retina XDR OLED display, a triple-camera system, and up to 512GB of storage. It has a powerful A13 Bionic chip with a neural engine and is powered by a 3,969 mAh battery. With its dual-SIM support and 5G capability, the iPhone is a great choice for those who want the latest and greatest in mobile technology.
Android
Android phones come in a wide range of specs and sizes, so there’s something for everyone. The current top-of-the-line Android phone is the Samsung Galaxy S20 Ultra 5G, which boasts a 6.9-inch Dynamic AMOLED display, a triple-camera system, and up to 512GB of storage. It has a Qualcomm Snapdragon 865 processor and is powered by a 5,000 mAh battery. With its dual-SIM support and 5G capability, the Android phone offers a great mix of performance and features.
Comparison
When it comes to specs, the iPhone and Android phones offer a comparable experience. Both come with powerful processors and large displays, as well as dual-SIM support and 5G capability. The main differences are in design and the camera systems. The iPhone has a unique design and a triple-camera system, while Android phones come in a variety of shapes and sizes, and often feature four or more cameras. The choice ultimately comes down to personal preference.
Ensure the file named Furniture.java is open.
The file includes variable declarations and output statements. Read them carefully before you proceed to the next step.
Design the logic and write the Java code that will use assignment statements to:
Calculate the profit (profit) as the retail price minus the wholesale price
Calculate the sale price (salePrice) as 25 percent deducted from the retail price
Calculate the sale profit (saleProfit) as the sale price minus the wholesale price.
Execute the program by clicking Run. Your output should be as follows:
Item Name: TV Stand
Retail Price: $325
Wholesale Price: $200
Profit: $125
Sale Price: $243.75
Sale Profit: $43.75
91011121314151617181920212223242526272829303132678345
double profit;
double saleProfit;
// Write your assignment statements here.
Logic:
profit=retailPrice-wholesalePrice
salePrice=retailPrice-(retailPrice*25)/100;
saleProfit=salePrice-wholesalePrice;
can someone write this how the code would be written i think i have it correct but i am getting and error when i run the code
Using the knowledge in computational language in JAVA it is possible to write a code that calculate the sale profit (saleProfit) as the sale price minus the wholesale price.
Writting the code:public class Furniture
{
public static void main(String args[])
{
String itemName = "TV Stand";
double retailPrice = 325.00;
double wholesalePrice = 200.00;
double salePrice;
double profit;
double saleProfit;
// Write your assignment statements here.
profit = retailPrice - wholesalePrice;
salePrice = retailPrice * (1 - 0.25);
saleProfit = salePrice - wholesalePrice;
System.out.println("Item Name: " + itemName);
System.out.println("Retail Price: $" + retailPrice);
System.out.println("Wholesale Price: $" + wholesalePrice);
System.out.println("Profit: $" + profit);
System.out.println("Sale Price: $" + salePrice);
System.out.println("Sale Profit: $" + saleProfit);
System.exit(0);
System.exit(0);
}
}
See mroe about JAVA at brainly.com/question/12975450
#SPJ1
Assume ptr is a pointer to an int and holds the address 11000. On a system with 4-byte integers, what address will be in ptr after the following statement?
ptr += 2;
The variable ptr int *ptr = nw int is given an address by the following sentence. incorrect is int ptr; This will result in an error since the data type must first be written.
Any attribute, number, or sum that can be gauged or counted is referred to be a variable. A variable is often referred to as a data item. A few examples of factors are age, gender, company income and expenses, country of birth, capital expenditures, class grades, eye color, and vehicle kind. Its value may vary between data units in a population and change over time, hence it is regarded as a variable. A variable is any element of a mathematical problem or experiment that has the ability to change. Variables are commonly identified by a single letter. The letters x, y, and z are frequently used to denote variables.
Learn more about Variables here:
https://brainly.com/question/29608275
#SPJ4
An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average
python
Answer:
# put the numbers array here
average=sum(numbers)/35 # find average
count=0 #declare count
for i in numbers: #loop through list for each value
if i > average: #if the list number is greater than average
count+=1 #increment the count
print(count) #print count
Help bad at this subject. brainliest if correct.
Which type of loop can be simple or compound?
A. for loops or do...while loops
B. While loops or for loops
C. while loops or do...while loops
D. controlled loops only
Odyssey ware 2023
Answer:
C programming has three types of loops.
for loop
while loop
do...while loop
In the previous tutorial, we learned about for loop. In this tutorial, we will learn about while and do..while loop.
while loop
The syntax of the while loop is:
while (testExpression) {
// the body of the loop
}
How while loop works?
The while loop evaluates the testExpression inside the parentheses ().
If testExpression is true, statements inside the body of while loop are executed. Then, testExpression is evaluated again.
The process goes on until testExpression is evaluated to false.
If testExpression is false, the loop terminates (ends).
To learn more about test expressions (when testExpression is evaluated to true and false), check out relational and logical operators.
Flowchart of while loop
flowchart of while loop in C programming
Working of while loop
Example 1: while loop
// Print numbers from 1 to 5
#include <stdio.h>
int main() {
int i = 1;
while (i <= 5) {
printf("%d\n", i);
++i;
}
return 0;
}
Run Code
Output
1
2
3
4
5
Here, we have initialized i to 1.
When i = 1, the test expression i <= 5 is true. Hence, the body of the while loop is executed. This prints 1 on the screen and the value of i is increased to 2.
Now, i = 2, the test expression i <= 5 is again true. The body of the while loop is executed again. This prints 2 on the screen and the value of i is increased to 3.
This process goes on until i becomes 6. Then, the test expression i <= 5 will be false and the loop terminates.
do...while loop
The do..while loop is similar to the while loop with one important difference. The body of do...while loop is executed at least once. Only then, the test expression is evaluated.
The syntax of the do...while loop is:
do {
// the body of the loop
}
while (testExpression);
How do...while loop works?
The body of do...while loop is executed once. Only then, the testExpression is evaluated.
If testExpression is true, the body of the loop is executed again and testExpression is evaluated once more.
This process goes on until testExpression becomes false.
If testExpression is false, the loop ends.
Flowchart of do...while Loop
do while loop flowchart in C programming
Working of do...while loop
Example 2: do...while loop
// Program to add numbers until the user enters zero
#include <stdio.h>
int main() {
double number, sum = 0;
// the body of the loop is executed at least once
do {
printf("Enter a number: ");
scanf("%lf", &number);
sum += number;
}
while(number != 0.0);
printf("Sum = %.2lf",sum);
return 0;
}
Run Code
Output
Enter a number: 1.5
Enter a number: 2.4
Enter a number: -3.4
Enter a number: 4.2
Enter a number: 0
Sum = 4.70
Here, we have used a do...while loop to prompt the user to enter a number. The loop works as long as the input number is not 0.
The do...while loop executes at least once i.e. the first iteration runs without checking the condition. The condition is checked only after the first iteration has been executed.
do {
printf("Enter a number: ");
scanf("%lf", &number);
sum += number;
}
while(number != 0.0);
So, if the first input is a non-zero number, that number is added to the sum variable and the loop continues to the next iteration. This process is repeated until the user enters 0.
But if the first input is 0, there will be no second iteration of the loop and sum becomes 0.0.
Outside the loop, we print the value of sum.
Explanation:
What is the keyboard shortcut for opening the Help Pane?
Ctrl+H
F9
F1
Shift+A
Answer:
In windows, the keyboard shortcut for opening the Help Pane is F1
How do you increase the number of tries by one?
tries.add(1)
tries = tries + 1
tries = 1
Answer:
tries = tries + 1
Explanation:
This is a universal way to increment your variable. In some languages, the following notation also works:
tries++;
tries += 1;
Again, it depends upon the language you are using. Each language has it's own syntax.
Dante wants to calculate the currently monthly subtotals for the sales of golf balls in his store. Which of the following will he select as X in the series of clicks to do so: Cell in the range > Data > X > Subtotal > OK?
A. Outline
B. Data Tools
C. Sort & Filter
D. Connections
Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab reports. Which process would best help the students locate the chart tools options?
Since Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab reports. the process that would best help the students locate the chart tools options is Excel ribbon
What is the Excel software?Mr. Cooper's students can be able to customize the Excel ribbon by the act of adding the "Chart Tools" tab to the file.
Therefore, To do this, he needs to follow these steps:
Click Excel as well as click on "File"Click "Options" from the menu.In the Excel Options window, Select on "Customize Ribbon" on the left-hand side.Below the "Customize the Ribbon" section on the right, click the checkbox next to "Chart Tools."Select "OK" to save the alterations.Learn more about Excel software from
https://brainly.com/question/1538272
#SPJ1
Describe the impact of a company’s culture on its success in a customer-focused business environment. Discuss why each is important.
The influence of a corporation's culture cannot be underestimated when it comes to achieving success in a customer-centric commercial landscape.
The values, beliefs, norms, and behaviors that constitute a company's culture have a major impact on how its employees engage with customers and prioritize their requirements.
Having a customer-centric mindset means cultivating a culture that places a strong emphasis on satisfying and prioritizing customers' needs and desires, resulting in employees who are aware of the critical role customer satisfaction plays in ensuring success.
Learn more about company’s culture from
https://brainly.com/question/16049983
#SPJ1
Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "Project XYZ" for all relevant emails related to this project. Which of the following emails should he save in this folder instead of deleting or moving it to another folder? O A. Schedule Update for Project XYZ B. Time and Location for May 20 Meeting for Project XYZ C. Update: New Time and Location for May 20 Meeting for Project XYZ D. New Project EFG to Launch Next Week
A. Schedule Update for Project XYZ
Answer:
Schedule Update for Project XYZ
Explanation:
What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.
Answer:
a warning notice will alert the users that the presentation is in use
Explanation:
I did it on edge
Answer:
D; A warning notice will alert the users that the presentation is in use.
Explanation:
Edge
Write a class encapsulating the concept of an investment, assuming
that the investment has the following attributes: the name of the
investor, the amount of the investment, and the static interest rate at
which the investment will be compounded. Include a default
constructor, an overloaded constructor, the accessors and mutators,
and methods, toString() and equals(). Also include a method returning
the future value of the investment depending on how many years
(parameter to this method) we hold it before selling it, which can be
calculated using the formula:
Future value = investment(1 + interest rate )year
We will assume that the interest rate is compounded annually. Write a
client class to test all the methods in your class and print out the tuture
value of and investment for 5, 10, and 20 years.
A class encapsulating the concept of an investment, assuming that the investment has the following attributes is given below:
The Programimport java.util.Scanner;
/**
This program compares CD /Investment plans input by the year
broken down by the requirements below:
This program creates a table of compound interest investment growth over time
Broken down by: a) year b) balance at end of year
Finance formula of A= P(1+ r/n)^n*t is used:
A = Future Value | P = Initial Investment
r = annual interest rate |n = times interest is compounded/year
t = years invested
*/
public class InvestmentTableFirstTest
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String bestBankName = "";
double bestGrowth = 0;
boolean done = false;
while(!done)
{
System.out.print("Plan name (one word, Q to quit): ");
String bankName = in.next();
if (bankName.equals("Q"))
{
done = true;
}
else
{
System.out.print("Please enter your principal investment: ");
final double PRINCIPAL_INVESTMENT = in.nextDouble();
System.out.print("Please enter the annual interest rate: ");
double iRate = in.nextDouble();
System.out.print("Please enter number of times interest is compounded per year: ");
final double INCREMENT = in.nextDouble();
System.out.print("Enter number of years: ");
int nyears = in.nextInt();
iRate = iRate/100; System.out.println("iRate:" + iRate);
//Print the table of balances for each year
for (int year = 1; year <= nyears; year++)
{
double MULTIPLIER = INCREMENT * year;
System.out.println("Multiplier: " + MULTIPLIER); // I've included this print statement to show that the multiplier changes with each passing year
double interest = 1 + (iRate/INCREMENT);
double balance = PRINCIPAL_INVESTMENT;
double growth = balance * Math.pow(interest, MULTIPLIER);
growth = growth - PRINCIPAL_INVESTMENT;
balance = balance + growth;
System.out.printf("Year: %2d Interest Earned: $%.2f\t Ending Balance: $%.2f\n", year, growth, balance);
if (bestBankName.equals("") || bestGrowth > growth) // || bestBankName > growth
{
bestBankName = bankName; // bestBankName = bankName
bestGrowth = growth; // mostGrow = growth
}
System.out.println("Earning with this option: " + growth);
}
}
}
System.out.println("Best Growth: " + bestBankName);
System.out.println("Amount Earned: " + bestGrowth);
}
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola
Answer:
b. the HIV infection.
Explanation:
Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.
STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.
HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.
Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.
The Electronics Communications Privacy Act allows the government to have access to....?
The Electronic Communications Privacy Act allows the government to have access to a treasure trove of information regarding who you are, where you go, and what you do.
What is Electronic Communications Privacy Act?Electronic Communications Privacy Act may be defined as a law that determines it is unlawful to wipe or apprehend communication, over wires.
This access to government is accumulated by cell phone providers, search engine operators, social networking sites, and other websites each and every day.
All such network providers track all major activities of individuals through the mode of electronic gadgets.
Therefore, it is well described above.
To learn more about The Electronics Communications Privacy Act, refer to the link:
https://brainly.com/question/14142485
#SPJ1
What is example of scope three carbon emission
Answer:
driving gasoline fueled
vehicle
Dennis is looking at payroll data. He adds “2*” to the criteria field. Which values would stay in the records after the query is run?
20,535
12,252
28,645
22,897
32,785
15,222
Since Dennis is looking at payroll data. He adds “2*” to the criteria field. The values that would stay in the records after the query is run are options A, C and D:
20,53528,64522,897How does a query run?A series of instructions called a query can be used to manipulate data. To carry out these procedures, you run a query. A query can generate, copy, delete, or modify data in addition to producing results that can be sorted, aggregated, or filtered.
In the command editor, type the SQL command you want to execute. To run the command, press Ctrl+Enter and then click Run. Advice: To run a specific statement, pick it and click the Run button.
Since He enter the command 2, All figures that start with 2 will run. Hence the options selected are correct.
Learn more about query from
https://brainly.com/question/25694408
#SPJ1
Who are appropriate people to receive feedback from when working on a project?
photoshop i think
hope it helps