Answer:
-be nice
-be respectfull
-dont bully
-if u see somthing say somethung
-dont use same password for everything
Explanation:
which one of the following is not considered a quantitative risk assessment technique?
Quantitative risk assessment is a method of assessing the risks associated with a particular project or activity. It involves the use of numerical values and statistical analysis to determine the probability and potential impact of various risks.
There are several quantitative risk assessment techniques that can be used to evaluate risk. These techniques include probabilistic risk assessment (PRA), fault tree analysis (FTA), event tree analysis (ETA), and Monte Carlo simulation.
Probabilistic risk assessment (PRA) is a technique that is used to quantify the probability and impact of potential risks. It involves the use of mathematical models to evaluate the likelihood of various scenarios and to estimate the potential consequences of those scenarios.Fault tree analysis (FTA) is another quantitative risk assessment technique that is used to identify the potential causes of a particular risk. FTA involves breaking down a complex system into smaller components and evaluating the potential failure modes of each component.
To know more about Quantitative risk assessment visit:
brainly.com/question/31565073
#SPJ11
How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to access than the library. They provide only information from reliable sources. They provide immediate access to information on the web. They take longer than using a card catalog but provide only expert sources.
Answer:
because it is easy to access not hard not all things from the internet are reliable they don't always have expert sources
Explanation:
Search engines like Google, Bing, and Yahoo! have revolutionized research.
The best answer choice for this is that "they provide immediate access to information on the web".
The other choices would be wrong because...
Answer choice A, would be incorrect due to the fact that using the search engines makes it easier to access information than a library as you do not need to walk around the library looking for a book to provide you the answers to your question.
Answer choice B, would be false since the web doesn't always provide only reliable information from creditable sources. In fact, quite a few of the sources on the web that come up, are not helpful or do not assist the user in answering their questions.
Answer choice D, would be wrong since using the search engine to find information is quicker than using a card catalog, and also it does not only provide expert sources since any source of information could pop up when the user searches for it.
People are not interested in what you do _____. I think, more and more, they're not even really interested necessarily in how you look on paper, like a
Incomplete question. However, I inferred you are referring to the best word that likely completes the blank space.
Answer:
or don't do;
Explanation:
So, this statement could rightly read;
"People are not interested in what you do or don't. I think, more and more, they're not even really interested necessarily in how you look on paper, like a...."
A____is the smallest unit of measurement used to describe computer processing and storage. Enter the answer in the box
Answer:
the smallest unit of measurement used for measuring data is a bit
How is an assembly converted to a binary code?
The process of converting an assembly to a binary code involves writing the assembly code in a text editor, using an assembler to translate it into machine code, and using a linker to create an executable file.
An assembly is converted to a binary code through a process called assembly language compiling or assembly language translation.
First, the assembly code is written in a text editor and saved with an .asm file extension. Next, an assembler, which is a type of software, is used to translate the assembly code into machine code, also known as binary code.
The assembler reads each line of the assembly code and converts it into the corresponding binary code, which is a series of 1s and 0s that can be understood by the computer's central processing unit (CPU). The resulting binary code is saved as an .obj file.
Finally, the .obj file is linked with other object files and libraries to create an executable file, which can be run on the computer. This linking process is done by a linker, another type of software.
Learn more about binary code here:
https://brainly.com/question/16612919
#SPJ11
pls help me with this question
What are important acronyms we use when we talk about the internet? this is for computer science.
Answer:
Lol
Brb
Btw
Gtg
Explanation:
I hope this helps
Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.
Answer:
Following are the letter to this question:
Explanation:
Dear Raju:
For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.
For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.
And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.
If you determine that option fits your needs, let me learn and I'll support you there.
Yours sincerely,
Dev
Can you please help me? I give you a brainlest
!
Which of the following is NOT a responsibility of an IT project manager?
A.
writing code
B.
managing the budget
C.
managing the schedule of the project
D.
assigning work to team members
Answer:
I think that The answer is A.
Explanation:
A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.
In the name, it says Manager.
This is how I know that.
The one that is not a responsibility of an IT project manager is writing code. The correct option is A.
What is IT project manager?The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.
One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.
Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.
Therefore, the correct option is A. writing code.
To learn more about IT project managers, refer to the link:
https://brainly.com/question/15404120
#SPJ2
Which of these is NOT a usual result of having friends at work?
increased job satisfaction
increased company loyalty
increased motivation
increased absences
Which of these purchases is most likely to be paid for with a credit card
A. Soda
B. Lotto ticket
C. Parking fee
D. Plane ticket
Answer:
plane ticket?
Explanation:
upon compiling the data, the researcher identifies a problem due to the fact that neither data source uses a unique id number for each student. which of the following best describes the problem caused by the lack of unique id numbers? responses students who have the same name may be confused with each other. students who have the same name may be confused with each other. students who have the same grade point average may be confused with each other. students who have the same grade point average may be confused with each other. students who have the same grade level may be confused with each other. students who have the same grade level may be confused with each other. students who have the same number of absences may be confused with each other.
Students who have the same name may be confused with each other is the best statement that best describes the problem that happened due to the fact that neither data source uses a unique id number for each student.
Define data source.
The term given to the connection established from a server to a database is Data Source. When constructing a database query, the name is frequently utilized. There is no requirement that the database filename and the data source name match.
A DSN of the school may be configured for a database file with the name friends.mdb, for instance. In a nutshell, a data source is the place, physical or digital, where the relevant data is kept in a data table, data object, or other storage type.
To learn more about data source, use the link given
https://brainly.com/question/19410005
#SPJ1
You are creating a program for the school's
upcoming theater production. You would like to
include a picture of the cast on the cover of the
program. Which of the following factors do you
need to consider? Choose all that apply.
•image compression
•image file format
•image resolution
•image scalability
Answer:
Image file format
Image resolution
Image scalability
Explanation:
Answer:
Image File Format
Image resolution
Image Scalability
The next answer is BMP !
Explanation:
1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
our document.
d clipboard.
Answer:
Margin is the correct answer to the given question .
Explanation:
The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .
Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document
Firstly click on the page layout options .After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need Finally click on ok to finish them .Do you think people need the product that these businesses offer? Why?
Answer:
Depends
Explanation:
It depends on what items you're talking about, essentials are definitely a must and if they're a waste, maybe not. It all depends on the buyer honestly since you never know what it could be used for.
also what products were you aiming to talk about?
If you were to go back in time, what games might you find kids playing at the local arcade? List and describe at least two games.
Answer:
Pac-Man Battle Royale, Space Invaders Frenzy
Explanation: Pac-man Battle Royal, came out in 2011 not that long ago. Space Invaders Frenzy came out in 1978. That came out A WAY long time ago.
Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo?
Beatrice owns the photo because only holders of a Creative Commons license can own works online.
Arman owns the photo because he was the original creator and did not license the work.
Arman owns the photo because it was granted a Creative Commons license by another person online.
Both own the photo because creating a copy makes it her intellectual property.
Answer:
Arman owns the photo because he was the original creator and did not license the work.
Explanation:
Fill in the blank with the correct response.
One way Go.ogle makes money is to charge a person for using certain
_______.
Answer:
Go.ogle Apps
Explanation:
Mail checks for received email when you click the ____ button on the Apps bar.
When you receive an email in your inbox, it's important to check it to determine its relevance, urgency, and importance.
What are Email Checks?Email checks may include reading the email thoroughly to understand its contents, checking any attachments or links included in the email, responding to the email if necessary, marking it as read or unread, archiving or deleting the email, and taking any necessary actions based on the content of the email.
The process of email checks can help you manage your inbox effectively and stay on top of important communications.
Read more about mails here:
https://brainly.com/question/30551604
#SPJ1
According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.
The Chargaff's rule state that in DNA, equality often exist in quantity between the bases A and T and between the bases G and C. According to Chargaff's data, adenine must pair with thymine and guanine must pair with cytosine.
Chargaff's gave rules for the pairing of bases. The rule is made up of base pairs in the DNA double helix.He stated that there is a relation of A with T. The Pyrimidine Thymine (T) will always pairs with the Purine Adenine (A)
and also there is a relation of C with G and thus the Purine Guanine (G) always pair with the Pyrimidine Cytosine (C)
Erwin Chargaff was an Austrian-American biochemist. He lived from 1905-2002. It was at Columbia University that he discovered this rule.
Learn more from
https://brainly.com/question/22955213
Standard web design is:
Question 4 options:
Single media
Bi-media
Multimedia
Media free
Answer: Multimedia
Explanation:
I just took the test
Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases
During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.
The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.
Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.
Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.
For more questions on V-model
https://brainly.com/question/16298186
#SPJ11
Perform binary calculation: 110111 +101011) X 11
Answer:
10000110110
Explanation:
\(110111 +\\101011\)
______
1100010
1100010 × 2 is the same as \(1100010+\\1100010\) = 11000100
11000100 × 2 is the same as \(11000100+\\11000100\) = 110001000
110001000 × 2 is the same as \(110001000+\\110001000\\\) = 1100010000
\(1100010000\\11000100\\1100010+\\\)
_______
10000110110
Which of the following options are different characteristics of the diamond model?(Choose all that apply)
Capacity
Capabilities
Victim
Adversary
Therefore, the correct options that are different characteristics of the Diamond Model are: Adversary, Victim. Capacity is not a characteristic typically associated with the Diamond Model.
The Diamond Model is a framework used for analyzing and understanding cyber threats. The characteristics associated with the Diamond Model include:
Adversary: This refers to the individual, group, or entity responsible for carrying out a cyber attack or threat. They are the threat actor.
Victim: The victim represents the entity or system that is being targeted or attacked by the adversary.
Capabilities: Capabilities refer to the specific tools, techniques, and resources that the adversary possesses and can utilize during the attack.
Learn more about Capabilities here:
https://brainly.com/question/29675437
#SPJ11
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails". The program below simulates randomly
flipping that coin many times,
var heads -
var tails - ;
var rolls - 100;
for(var i=0; i
if(randonlumber(0,1) - )
heads
} else
tails
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
O A. tails has a value of O and heads has a value of 100
B. tails has a value of 100 and heads has a value of O
0 C.tails has a value of 20 and heads has a value of 20
O D. tails has a value of 50 and heads has a value of 50
Answer: tails has a value of 20 and heads has a value of 20
Explanation: Both Values have to add up to 100 for it to work. You cant have a 60% chance of a side that doesn't exist on a coin.
The combination that is not possible is (b) tails has a value of 20 and heads has a value of 20
The first and the second line of the program initializes heads and tails to 0.
The third line of the program initializes roll to 100
This means that at the end of the program, the combined value of heads and tails variables must add up to 100.
The above highlight is true for options (a), (b) and (d), because
\(0 + 100 = 100\)
\(100 + 0 = 100\)
\(50 + 50 = 100\)
However, this is not true for the third option because
\(20 + 20 \ne 100\)
Hence, the combination that is not possible is (c)
Read more about similar programs at:
https://brainly.com/question/18430675
which of the following is not a valid statement? a. online analytical processing is a set of tools that work together to provide an advanced data analysis environment for retrieving, processing, and modeling data from the data warehouse. b. the data warehouse is a specialized database that stores data in a format optimized for decision support. c. production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making. d. a database that is designed primarily to support a company's day-to-day operations is classified as an operational database.
C. Production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making.
What is databases?A database is a collection of information that is organized for easy access and manipulation. It typically contains data organized in a table, which is a two-dimensional structure with columns and rows. The columns represent the various elements of data, while the rows represent each individual record. Databases can be used to store and retrieve information quickly and securely. They are used in almost every industry and are essential for businesses to keep track of customer information, inventory, and more.
This statement is not valid because production databases are not used exclusively for tactical or strategic decision making. They are used to store the data that is used for day-to-day operations.
To learn more about databases
https://brainly.com/question/518894
#SPJ4
A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters
The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
What are binary sequences?A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros.
The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.
See options below
4
6
7
8
Learn more about bits from
https://brainly.com/question/19667078
For the following Python code to work, what must be added to the title column in the CREATE TABLE statement for the Course table:
The following Python code needs to be added to the title column in the CREATE TABLE statement for the Course table: NULL is the main answer and explanation is provided below.
The code provided is incomplete, but it is evident that the CREATE TABLE statement is being used to create a table named "Course. A column named "title" is being generated with some specifications. The code doesn't mention what should be done with this column, i.e. what data type it should have or what constraints it should follow.
NULL must be added to the title column in the create table statement for the Course table. In the absence of a value, NULL represents the lack of a value. NULL is not the same as zero, a blank field, or a field containing spaces, according to SQL conventions. Rather, NULL indicates the lack of a value. In a CREATE TABLE statement, a column may be marked as NULL or NOT NULL.
To know more about python code visit:
https://brainly.com/question/33331724
#SPJ11
How Much did a case of soda (any kind your choice ) cost in 2004?
PLS HELP!!!!!!
Answer:
2004 88 cents for 2 cans
Explanation: