A time line may identify cause or effect of an event?
True or False?

Answers

Answer 1
true whenever you look at one it helps identify the cause/effect of an event

Related Questions

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

Here are a few elements of breaking news and a feature story. Match the elements of breaking news and a feature story with their correct images.

Here are a few elements of breaking news and a feature story. Match the elements of breaking news and

Answers

Breaking News:

➡️Highlights key events

➡️Answers some, but not necessarily all questions, such as when, where, who, why, and how.

Feature Story:

➡️ No urgency to be reported

➡️Adequate time for research

➡️Includes reviews and Q&A type interviews

➡️Summary lead is the most traditional form often used to create a script

Explanation:

Breaking news is known as a special report or news which reports something current and urgent. It usually interrupts a scheduled program or current news. It answers some questions on the news that just broke out.

Feature story is known to be a news that is non-fiction. It is also known to be a type of soft news. It includes Q&A interviews and reviews. It takes adequate time for research.

Breaking News

Highlights Key eventsIncludes Reviews and Q&A type interviewsAdequate time for research

Feature story

Answers some , but not necessarily all questions , such as when , where , who , why , and howNo urgency to be reportedSummary lead is the most traditional form often used to create a script.

match the following

match the following

Answers

Answer:

can't understand.... what's your question???!!

When she manages a software development project, candace uses a program called __________, because it supports a number of programming languages including c, c++, c#, and visual basic.

Answers

When she manages a software development project, candace uses a program called PLS, because it supports a number of programming languages including c, c++, c#, and visual basic.

Competitive Programming is undoubtedly one of the most important and well-liked components of a programmer's journey. However, it is highly advised for all programmers to take part in these coding competitions in order to improve their coding abilities and to be eligible for a variety of enticing prizes, awards, and job chances.

In the meantime, before entering the competitive programming scene, people frequently wonder: Which is the best programming language for competitive programming? It might be very challenging to identify the pertinent and valuable programming language because there are so many available!

To know more about programming click here:

https://brainly.com/question/11023419

#SPJ4

You can't export data from Access to Word. True False

Answers

False. Exporting data from Access to Word is a relatively simple process that can be done in just a few steps. By doing so, you can create documents, reports, and other written materials that include data from your database.

You can export data from Access to Word.Access and Word are part of the Microsoft Office suite of productivity applications. Although they are separate applications, they can be used together to perform a variety of tasks. Access is a database management application that can be used to create, store, and manage data, while Word is a word processing application that can be used to create documents, reports, and other written materials.

While it is true that Access and Word are different applications, they can be used together to perform a variety of tasks. For example, you can export data from Access to Word to create a report or other document that includes information from your database. This process is known as a mail merge.In order to export data from Access to Word, you will need to follow these steps:Open the database that contains the data you want to export.Select the table or query that contains the data you want to export.

Click on the "External Data" tab in the ribbon.Select the "Word" option from the "Export" group.In the "Export - Word Document" dialog box, select the options you want for your export, such as the file name, file format, and data to include.Click "OK" to export the data from Access to Word.

To know more about export data visit :

https://brainly.com/question/14337731

#SPJ11

which would be the most efficient way to store files on your computer?

Answers

Answer:

Best way to store all your files is a external storage device, like a hard drive or a usb stick, copy all your files to the device and keep it in a safe place.

Which web source citations are formatted according to MLA guidelines? Check all that apply.
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.
“Nelson Mandela Biography.” Bio.com. A&E Television Networks, n.d. Web. 28 Feb. 2014.
Hallengren, Anders. “Nelson Mandela and the Rainbow of Culture.” Nobel Prize. Nobel Media, n.d. Web. 1 Mar. 2014.
“Nelson Mandela, Champion of Freedom.” History. The History Channel. Web. 1 Mar. 2014.
“The Long Walk is Over.” The Economist. The Economist Newspaper, 5 Dec. 2013. Web. 1 Mar. 2014.

Answers

The citation that is formatted according to MLA guidelines is:
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.

What is Apartheid?
Apartheid was a system of institutional racial segregation and discrimination that was implemented in South Africa from 1948 to the early 1990s. It was a policy of the government that aimed to maintain white minority rule and power by segregating people of different races, and denying non-whites their basic rights and freedoms.

This citation follows the basic MLA format for citing a web source. It includes the following elements:

Author's name: Karimi, Faith.Title of the article: "Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies."Name of the website: CNN.Name of the publisher: Turner Broadcasting.Date of publication: 5 Dec. 2013.Medium of publication: Web.Date of access: 1 Mar. 2014.

None of the other citations are formatted according to MLA guidelines because they either have missing or incorrect elements. For example, the citation for "Nelson Mandela Biography" does not include the date of publication, and the citation for "Nelson Mandela and the Rainbow of Culture" does not include the name of the publisher. The citation for "Nelson Mandela, Champion of Freedom" does not include the date of publication or the name of the publisher. The citation for "The Long Walk is Over" includes the date of publication, but it does not include the name of the publisher, and the title is not italicized.

To know more about citation visit:
https://brainly.com/question/29885383
#SPJ1

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

hannes complains that his computer is always giving error messages, the file names and folder names are garbled, and there is an odd noise coming from his computer tower. which hardware device do you suspect is causing the problem?​

Answers

Answer:

It could be the hard disk drive (HDD)

Question 15(Multiple Choice Worth 6 points)
(03.02 MC)
Which of the actions below becomes part of your digital identity?
O Meeting a friend at a juice shop
Attending your school's prom
Borrowing a neighbor's blender
Responding to an email

Answers

Answer:

Responding to an email

Explanation:

I did the assignment. The other ones you do not use any technology, while you do when responding to an email.

The one that is becoming a part of digital identity is responding to a mail. The correct option is D.

What is digital identity?

A digital identity is the body of information that exists online about an individual, organization, or electronic device. Individuals or their devices can be identified using unique identifiers and usage patterns.

Your Digital Identity allows you to prove who you are online for work, education, and personal purposes, and you can use it again and again.

Before any of your details are shared with the service you want to access, you will be asked to give consent each time you use your Digital Identity.

Thus, the correct option is D.

For more details regarding digital identity, visit:

https://brainly.com/question/26077914

#SPJ1

The involvement of the United States in the ______ and ______ resulted in _______ .

Answers

The involvement of the United States in the Iraq and Kuwait conflict resulted in Persian Gulf War.

What is the Persian Gulf War?

The Persian Gulf War can be defined as an international conflict that was led by the United States of America alongside the forces of the United Nations (UN) against the larger state of Iraq, in response to her invasion and annexation of the smaller country of Kuwait.

In this context, we can infer and logically deduce that the involvement of the United States in the Iraq and Kuwait conflict resulted in Persian Gulf War.

Read more on Persian Gulf War here: https://brainly.com/question/1105731

#SPJ1

in order to remove a slide from a presentation you should

Answers

Answer:

Right Click on the slide and press delete or the undo button if adding a slide was the last thing you did.

Explanation:

Have a splendiferous day!

Hope this helps!

___ networking services make it easy for friends and family to share updates and special events with each other.\

Answers

Answer:

Social

Explanation:

Social networking services make it easy for friends and family to share updates and special events with each other.

Have a nice day!

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

30 points! Help me out, please! I need help with this!

30 points! Help me out, please! I need help with this!

Answers

Answer:

Both are touchscreen.

Tablets are seen more as an entertainment device (tv, games, etc.).

Phones are smaller, and used more for everything; you can take phones anywhere you go, whereas tablets are more difficult to transport.

Which of the following types of malware is the MOST difficult to reverse engineer?
A. Logic bomb.
B. Trojan.
C. Armored virus.
D. Ransomware.

Answers

The type of malware that is the MOST difficult to reverse engineer is option C. Armored virus.

What is the malware?

Armored viruses are made to be hard to understand and study.  They use different ways to make their code hard to understand, so it's difficult for people who study it. Some common ways that armored viruses spread are: Anti-debugging Techniques: Armored viruses employ anti-debugging tricks to hinder the reverse engineering process

Therefore, one can say that Encryption means that viruses are protected with a code that is hard to understand unless you have the key to unlock it.

Learn more about  malware  from

https://brainly.com/question/399317

#SPJ1

This type of software works with end users, application software and computer hardware to handle the majority of technical details.A Application softwareB Utility softwareC System softwareD All the above

Answers

The majority of technical specifics are handled by system software, which collaborates with end users, application software, and computer hardware.

System software is a set of instructions created to control the hardware, software, and tools of a computer, including its memory, processors, and peripherals. In addition, system software, which is frequently included with an operating system on a computer, offers a platform for executing application software. Systems software comes in a variety of flavors, including Windows, Linux, Macintosh X, BSD, and others. The distinctive qualities of each form of system software are different. Ubuntu, for instance, is made for GNU/Linux applications, whereas Windows XP is made for Microsoft goods.

Know more about System Software here:

https://brainly.com/question/12908197

#SPJ4

Which statement allows more than one condition in an If statement? O Else O While O Elif If-then ​

Answers

Answer:

C. Elif

Explanation:

:)

Answer:

Eilf 100000%

Explanation:

which of the following is true of bitlocker drive encryption? group of answer choices to use bitlocker drive encryption, a hard drive cannot be divided into partitions. efs and bitlocker drive encryption use the same method to secure the encryption key. when you use bitlocker drive encryption, an entire volume is encrypted. it uses asymmetric encryption to secure data.

Answers

BitLocker Drive Encryption is a Microsoft Windows-based encryption feature that offers encryption for the entire volume to prevent unauthorized access to data. It is compatible with the Windows Vista and later operating systems and uses symmetric encryption with 128-bit and 256-bit keys.

One of the following is true of BitLocker Drive Encryption: When you use BitLocker Drive Encryption, an entire volume is encrypted. You must encrypt the entire volume rather than a specific partition.To secure the encryption key, EFS and BitLocker Drive Encryption use different methods. EFS uses public key encryption, while BitLocker Drive Encryption uses a hardware-based key protection technology to secure the encryption key.

BitLocker Drive Encryption does not use asymmetric encryption to secure data. Instead, it uses symmetric encryption, which is more efficient and faster. The encryption key used to encrypt the data is generated randomly, and the key is not stored on the disk. Instead, the key is stored on a Trusted Platform Module (TPM) chip or a USB key.

To know more about unauthorized access visit:

https://brainly.com/question/30871386

#SPJ11

write a program that takes as input the values 27.2, 35.6, 41.2. compute the average of the three values.

Answers

The program takes three input values (27.2, 35.6, 41.2) and computes their average. The program is written in python as shown in the following section.

To calculate the average, we need to sum up the three values and divide the sum by the total count of values. In this case, the sum of 27.2, 35.6, and 41.2 is 104. After dividing the sum by 3 (the total count of values), we obtain the average of approximately 34.67.

The python program is given below:

# Program to compute the average of three given values

# Input values

value1 = 27.2

value2 = 35.6

value3 = 41.2

# Calculate the sum of the values

sum_values = value1 + value2 + value3

# Calculate the average by dividing the sum by the total count of values

average = sum_values / 3

# Print the average

print("The average of the three values is:", average)

Also find the attached output of the running program.

You can learn more about Python programming at

https://brainly.com/question/13130839

#SPJ11.

write a program that takes as input the values 27.2, 35.6, 41.2. compute the average of the three values.

2) Some graphics have usage restrictions on them. What are some copyright laws out there that affect usage of images, graphics, and photos?

(I don’t really understand what they’re asking, any help is appreciated!)

Answers

Explanation:

Ok what is Copyright The copy of something without using credit

Describe few features of microcomputers also called Pcs.​

Answers

Answer:

Small size and low cost

2. One user

Easy to use

Low computing power

Commonly used for personal application

Explanation:

What is the first thing to check for with any general connection problem?
A. See if you have the most updated browser.
B. Update your operating system.
C. Run anti-spyware programs.
D. Check the power source of all relevant devices.
SUBMIT

Answers

Answer:

D-check the power source of all relevant devices

Before school, Kyle could not find his cell phone. Kyle tells his mom that he's already looked everywhere. Mom knows that Kyle sometimes looks at his phone in bed before falling asleep. She decides to look under his bed and finds the phone. What decision-making method did Kyle's mom most likely use?

Answers

Answer:

deductive decision-making strategy

Explanation:

In this scenario, it seems that Kyle's mom is most likely using a deductive decision-making strategy. This is when the individual goes through the process of reasoning from one or more statements (premises) in order to reach a logical conclusion. Which in this case Kyle's mom knew that Kyle sometimes sleeps with his phone next to him and that it there is space where it can fall. Using these two premises she deduced that the phone is most likely under the bed.

Answer:

Intuitive

Explanation:

By the way I am not sure this is just what I put and it doesn't tell me the correct answers.

list out the application of the computer and explain it?(and as the answer for this question as image) ​

Answers

Answer:

There are several applications of the computer; some of these applications are:

Word processorsGraphics applicationsWeb browsersGamingMedia playersAlarms and tasks schedulersEtc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

My explanation could not be submitted; so, I added it as an attachment.

Project: Programming a Math Algorithm
Writing a program to calculate a person's BMI is an example of using a math algorithm. In the BMI case, you used a formula to find a person's BMI and assigned the result to a category. Your program handled possible errors. This man needs to be concerned about his potential errors.

the BMI scale
(Imagery supplied by bearsky23/iStock via Getty)

In this unit, you learned how to manipulate numbers and strings, acquire input from the user, perform data manipulations for various types, and make decisions. You displayed the results for the user. You are able to plan and write programs, using the input-process-output model. You can test the results. In this project, you will plan and write a program to solve a math algorithm. Unlike the man in the picture, you will identify possible errors and handle them in your program.
Choosing Your Math Algorithm
Think of a math question that takes several steps to solve. It should not be a math question already programmed in the unit. Some examples are below, or you might think of your own ideas. The question should require input from the user, process the information, and display the results. You can choose your own algorithm. It does not need to be one of these.
Find the surface area of a cylinder.
Find the surface area of a pyramid.
Find the hypotenuse of a right triangle.
Your Task
Write a pseudocode plan for your program.
Write the code for your program.
Test your program. Run it at least three times with different inputs.
Save your program as a different type of text file, such as .docx.

Answers

A person's mass (weight) and height are used to calculate their body mass index (BMI), also known as the Quetelet index. The body mass index (BMI) is calculated by dividing the square of the body height by the body weight, and it is always reported in kilograms per square meter (kg/m2).

How can I figure out my BMI?

Simple math is used to determine a person's body mass index using their height and weight. BMI is calculated as follows: kg = weight in kilograms/m2, where m2 equals height in meters squared. Overweight is defined as a BMI of 25.0 or higher, while a healthy range is 18.5 to 24.9.

The equation is:

BMI is calculated   = mass or weight in kilograms / height in meters.

Examples:

Input : height(in meter): 1.79832

weight(in Kg): 70

Output : The BMI is 21.64532402096181, so Healthy.

Explanation : 70/(1.79832 ×1.79832)

Input : height(in meter): 1.58496

weight(in Kg): 85

Output : The BMI is 33.836256857260594 so Suffering from Obesity

Explanation : 70/(1.58496×1.58496).

To Learn more About body mass index, Refer:

https://brainly.com/question/2064513

#SPJ1

Suppose an AI scientist designed a robot to ring an alarm for food. If the clock strikes 1, the robot displays a message “Time for lunch.” It displays such messages at breakfast and dinnertime, too. What kind of agent is the robot?
A. model-based reflex agent
B. goal-based agent
C. utility-based agent
D. simple reflex agent

Answers

Answer:

It is utility based

Explanation:

i have no experience on this but all i looked up was: what is a utility based agent? what it told me was that they pay attention to their enviroment, so C makes sense :)

Answer:

Simple reflex

Explanation:

It is simply reacting to the time, and giving a reflexive response to certain times.

Need the answer ASAP!!!

Type the correct answer in the box. Spell all words correctly.
What does the type of documentation depend on?

Apart from the documents required in SDLC phases, there is also other documentation (or variations in documentation) depending upon the nature, type, and_________of the software.

Answers

Answer:

creation

Explanation:

i am not sure about this one but u will get a 5 for trying

how long does khan academy ap computer science take

Answers

Usually tests take around 30 minutes depending on how fast you work

you can change the view of a pivottable report depending on what you want to analyze. True or False

Answers

True. You can change the view of a pivottable report depending on what you want to analyze. Pivottable reports allow users to rearrange and summarize data in various ways, enabling them to analyze it from different perspectives.

Users can modify the fields displayed in the report, adjust the layout, apply filters, and sort and group data to customize the view and gain insights into specific aspects of the data. Therefore, pivottable reports are a powerful tool for data analysis and can be customized to meet various business needs. You can change the view of a PivotTable report depending on what you want to analyze. PivotTables are designed to allow you to easily rearrange data, filter information, and create different views for better understanding and analysis. You can change row and column fields, apply filters, and use slicers to modify the view as per your needs. This flexibility enables you to quickly analyze data from multiple perspectives and make informed decisions.

Know more about pivottable report here:

https://brainly.com/question/30208425

#SPJ11

Other Questions
Critically discuss innovative entrepreneurship as a business opportunity for young entrepreneurs WILL MARK BRAINLIESTOn a coordinate plane, a line goes through (negative 8, negative 4) and (8, negative 4). A point is at (2, 6). What is the equation of the line that is perpendicular to the given line and passes through the point (2, 6)? x = 2 x = 6 y = 2 y = 6 which equation is equivalent to -19+6x-5=3x Which sentence contains a pronoun with an unclear antecedent?Several beach-goers got caught in the rip tide when they went swimming.The puppy and kitten played together while they ate.Perry dropped his cheese and apple on the floor but then ate it.The pilot said he would alert the crew when it was time to land. Exercise 2 Rewrite the sentences below by inverting the order of the subjects and predicates. Down the road trotted a rider less pony. who is most likely to have general information about financial aid at many different institutes of higher ewhich type of loan has a higher borrowing limit, a subsidized or unsubsidized loan?ducation? Find the equation of the line shown 2+2-43+128 REPOSTING THE PICTURE FROM MY LAST QUESTION What is the difference between the height and slant heightof this pyramid?Height (h)Slant height (L): 10.5010.0Answer using complete sentences.LSLS Recycling and Waste Have you looked in your garbage? Did you know you throw away many things that can be saved? You can help cut down garbage and help the environment. If we did simple things, we could lower landfills. If we reused glass, we could lower landfills by almost 10%. We cant throw things away anymore. It must be managed. It may not affect us for a good twenty years, but it will affect our children and our children's children. There are still many advantages to waste management. Today, more and more people like companies who invest in "green products". These companies take out phosphates, bleaches, and have made their paper out of recycled papers. At home, families, are saving things, like leftovers, and making sandwiches for the next day. Some card companies even make Christmas cards out of recycled paper. They do this because it takes 20 trees to make a ton of cards. Small businesses are doing Christmas tree pickups. They use the trees again. This helps to stop erosion in stream beds. Some use the trees as fertilizer. People are starting to see a problem. We are beginning to deal with it. We can make the world a cleaner place for future generations.1How is this passage organized? A. problem and solution B. chronological order C. compare and contrast D. description What were the goals of the British and French after the war? All of the following people, except____contributed toinnovations that led to the creation of the Dutch East IndiaCompany.A) FibonacciB) Johannes GutenbergC) Luca PacioliD) Carl Gauss Find the set of solutions for each of the absolute value inequalities: |2-5m/2| true or false? the fewer the number of products or brands, the greater the likelihood the wholesaler is the channel commander. WILL GIVE BRAINLIST TO THE PERSON WHO DOES THE BEST EXPLANATION!! I need to TURN IT IN TODAY PLEASE HELP!!If you DONT KNOW please do NOT ANSWER because you will automatically loose points. From what I mean is the monitor will mark you to the point where you will LOOSE POINTS for the consequences. MATH CHALLENGE:If the quotient of 8/13 and 2 is subtracted from the product of 7/4 and 8/21 what is the difference? 2 1/4 4 1/5 the anser can not be improper BrainliestPatrick wants to rent a canoe and has a $15 coupon to use at Cool Canoes. The fee for canoe rental is $20.00 per hour. Which equation represents the total cost of renting a canoe, where c is the cost of renting a canoe and h is the number of hours it is rented?h = 15 20cc = 20h 15h = 20c + 15c = 15h + 20 Did the firms recognize any acquired contingencies for its acquisition? If it did, how were they measured? If not, why not? Under what circumstances should a firm recognize an asset acquired or a liability assumed in a business combination that arises from a contingency? what is the longest river in europe and russias most important waterway?