The photo shows a student conducting an experiment.

Which best describes the work the student is doing?

1. She is following an experiment in a digital library.
2. She is speaking with a doctor in a digital telehealth call.
3. She is speaking with other students in a digital classroom.
4. She is making observations in a digital laboratory.

The Photo Shows A Student Conducting An Experiment.Which Best Describes The Work The Student Is Doing?1.

Answers

Answer 1

Answer:

the answer is D, she is making observations in a digital laboratory.

Explanation:

I took the quiz and got 100%

Answer 2

Answer:

D-  She is making observations in a digital laboratory.

Explanation:

Just trust, Edge 2021


Related Questions

Your new apartment is too small for your stuff.

(A.) WHAT DO YOU WANT TO DO?
RENT A STORAGE UNIT ($45)

(B.) HAVE A YARD SALE

(C.) ASK A FRIEND TO STORE IT


ps my BALANCE is only $240

Answers

Answer:

B, it would be good to get rid of some stuff also your getting extra cash .

B, yard sale you get extra money

PLEASE HELP ME Write a 150-word paragraph about five of the zaniest and/or most novel ways you’ve found online that people earn incomes. Keep in mind that the sites should not be corporate sites. We are looking for unique niches. Have fun. We think you will be surprised when you see what people are willing to pay for online.

Answers

playing games. on some apps, you can win money for platings

Answer: Disney and video games winning ratings can produced a vast amount of money, making into a job, that anyone could create for example becoming an actor or becoming a gamer.

we could go over the amount of time disney and other companies spent.

What are all the names of different Mechanical Watch, Sundial Watch, Pocket Watch,Digital Watch, Electric Watch, Smart Watch and the Computer? What im trying to say is different type of watches that are above for example different type of tyota cars camry, century and etc

Answers

Answer:

mechanical watch: Grand Seiko T0 Constant-Force Tourbillon caliber

sundial watch: police

pocket watch: tissot savonnette pocket watch

digital watch: casio g shock ga100

electric watch: timex m40

smart watch: apple watch 7

computer: mac book air 2021

Explanation:

mark me brainliest if it helped

Mechanical watches: Omega Speedmaster, Rolex Submariner

Sundial watches: ‍♀️

Pocket watches: Bulova, Tissot, Longines

Digital watch: Bran prestige, Timex expedition WS4

Electric watch: ☝️

Smart watch: apple?

Computer: Mac Book, Windows 10

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

Type your response in the box. Imagine you purchased a new computer and you plan to install one operating system and a few application software. A known person offered you some installation CD's, but you found out that the software in the CD's were not purchased but were illegally copled. Would you use them/Install on your computer? State reasons for the actions you would take.​

Answers

Answer:

Yes

Explanation:

As long as they were legally copied

The answer is no, you could get in trouble for fraudulent actions for installing illegality obtained items. Not only that, you could get a virus from the person who copied the disk

Putting the word int into your code will create a string variable.
True
False

Answers

Answer:

False

Explanation:

int is for Integer variables not string

True666666666666666666666

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!

Answers

Answer:

computer system normally stores characters using the ASCII code. Each character is stored using eight bits of information, giving a total number of 256 different characters (2**8 = 256).

Explanation:

Not sure but I think the answer that answered first is correct

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

If you want the words “My puppy is a poodle” to appear in the output box, what Python code should you use?

A.
create “My puppy is a poodle”

B.
execute (“My puppy is a poodle”)

C.
print(“My puppy is a poodle”)

D.
print “My puppy is a poodle”

Answers

Answer:

i think it is B hope it helps

The answer is B execute (“ My Puppy is a poodle”)

Are they going to make season two of Midori Days

Answers

Answer: Probably not
Explanation-

Why is it recommended to develop a study plan? A. It tells you when your teacher is planning on giving the test. B. It helps you organize what you will study and when you will study to ensure you have enough time. C. It provides all of the information that your teacher will put on the test. D. It tells your Learning Coach when to help you study for your test.

Answers

Answer:

B. It helps you organize what you will study and when you will study to ensure you have enough time.

The answer is B- It helps you organize what you will study and when you will study to ensure you have enough time.

(20 points and correct answer gets BRAINLIEST!!!!!)
Which characteristic is common among children who have older parents?

lower birth weight
higher social skills
greater average height
less access to preschool

Answers

Answer:

B.

Explanation:

Answer:  not much access in school

Explanation:

if your parents are older you can't get much access into preschool because of it

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number without a decimal?

float()
int()
print()
string()

Answers

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

B is the answer lol yeah I had that some answer

Please help!!!
Which text structure uses point-by-point and block organization?

cause and effect
problem and solution
chronological order
order of importance

Answers

Answer:

B

Explanation:

Problem and solution text structure use point-by-point and block organization. Thus, option B is correct.

What is a text structure?

Text structures describe the way a particular writing is being written. Students may concentrate on important ideas and interconnections, anticipate what will happen next, and keep track of their knowledge as they read by recognizing the fundamental structure of texts.

An essay in which two themes are compared and contrasted is known as a comparative and Problem or solution. The goal approach and the block methodology are the two most typical formats or patterns used in these kinds of essays to provide information.

The problem and the solution could be regarding the organization and how they are going to solve it. there can be various alternatives that will be present and will help in forming a structure.

Therefore, option B is the correct option.

Learn more about text structure, here:

https://brainly.com/question/29790223

#SPJ6

what plugs into this?

Answers

Into what ????????????

Huh plugs into what ?

Ideally, how often should you back up the data on your computer?

once an hour
once a day
once a month
once a year

Answers

Answer:

Once a day

Just took the quiz

Once a month is the best option as it helps a lot

fr33 bra1nliest!!!!!!!!!1

Answers

Answer:

Thanks!

Explanation:

Happy Thanksgiving!

Hello! How is everyone?

Hi! Does anyone know how long it takes for a S o u n d C l o u d import to finish importing to a video-making website (Flixier to be exact) It'll be much appreciated if you answer this! I'll mark brainliest!

Answers

Answer:

It takes me around 20 to even an hour but its always different depending on the length

Explanation:

Answer:

It can take 5-7 business days

Explanation:

Hope this helps

Play the Scratch Game Chase HQ, Pay special attention to the animation, sounds, and colors used. Then answer the following questions in word processing document:
What kinds of sounds were used? How did the sounds affect the feel of the game?


How did the colors affect the mood and feel of the game?


What kinds of animation principles were used?

Answers

Answer:

Please mark me brainiest. It took a lot of time to compile this answer.

What kinds of sounds were used? How did the sounds affect the feel of the game?

Many sound effects were used, such as the screeching of the tyres, the sudden acceleration and the crashing or bumping of the car. The sound affects made the game feel more realistic

How did the colors affect the mood and feel of the game?

The main color used in the game is blue, which dominates the background and the color of the player's car. Blue is often associated with calmness and serenity, which is an interesting contrast to the high-intensity action of the game.

Red is also used prominently in ChaseHQ, which is often associated with danger, urgency, and excitement. In the game, red is used to indicate the presence of criminals and other hazards that the player must avoid or confront.

Overall, the color palette of ChaseHQ is intended to create a sense of high-speed action and excitement, while also providing a clear visual contrast between the player's car and the other elements in the game. The use of blue and red also helps to create a sense of urgency and danger, which is a key element of the game's gameplay and story.

What kinds of animation principles were used?

Chase HQ used a variety of animation principles to create movement and visual effects in its projects. Some of the key animation principles used in Scratch include:

Squash and Stretch: This principle involves stretching an object in one direction and compressing it in another to give the impression of weight and movement.

Timing: The timing of an animation can greatly affect its impact. In Scratch, users can control the timing of their animations by adjusting the duration and speed of individual blocks.

Anticipation: This principle involves adding a small movement in the opposite direction of the intended action to help build anticipation and create a more dynamic animation.

Follow-Through and Overlapping Action: These principles involve creating secondary movements that follow the main action of the animation, helping to create a more natural flow of movement.

Arcs: This principle involves using curved paths of motion to create more organic and appealing movement.

Overall, Scratch provides a range of tools and features that allow users to incorporate these animation principles and create engaging and dynamic projects.

Explanation:

Answer: Please mark me brainiest. It took a lot of time to compile this answer.

What kinds of sounds were used? How did the sounds affect the feel of the game?

Many sound effects were used, such as the screeching of the tyres, the sudden acceleration and the crashing or bumping of the car. The sound affects made the game feel more realistic

How did the colors affect the mood and feel of the game?

The main color used in the game is blue, which dominates the background and the color of the player's car. Blue is often associated with calmness and serenity, which is an interesting contrast to the high-intensity action of the game.

1.What are some examples of cyber crime?
2. What is a computer virus?
3. What are some ways a computer can get a virus?
4. What are some things you can do to be safe on the internet?

Answers

Answer: 1.Illegal Gambling. The Internet Skill Game Licensing and Control Act was introduced in Congress in 2008.

2. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

3.Malicious online ads, also known as Malvertising, is just another way your computer can get a virus without any realization or traceable evidence.

4.Secure Your Network. Many of our computers connect to our files, printers, or the Internet via a Wi-Fi connection.

Explanation:

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

If you spam im deleting your question sorry!
Jackson is learning how to use Scratch and would like his code to repeat an action 10 times. Which menu would allow Jackson to accomplish this task? (5 points) Motion Control Events Variables

Answers

Answer:

He can use the "Repeat" block under the "Control" menu to execute a set of blocks a specified number of times.

Explanation:

Jackson can use the "Control" menu in Scratch to repeat an action a certain number of times. Specifically, he can use the "Repeat" block under the "Control" menu to execute a set of blocks a specified number of times. To repeat an action 10 times, he can drag the "Repeat" block onto the workspace and change the default value of 10 to the desired value of 10. Then he can place the set of blocks that he wants to repeat inside the "Repeat" block.

Used repeat block

Because I said so

It works.

To add a new kind of information into the database you need to add a new table
true or false?

Answers

Answer:

true

Explanation:

Trueeeeee :)... sorry i didn’t come here in time
To add a new kind of information into the database you need to add a new tabletrue or false?

Write the importance of software in computer . In 6 points ​

Answers

Answer:

Software is a set of instructions, data or programs used to operate computers and execute important tasks but can also help you work more efficiently.

Uses of Software

Uses of Software in Office.Uses of Software in Business.Uses of Software for Play Game.Uses of Software in Shop.Uses of Software for Entertainment.

Explanation:

I think most important software in computer is terminal because it can control any part to computer and can do things we cannot de with other apps

can someone describe how sampling is used to capture audio on a computer?
please make it easy I am struggling. Im in 7th.

Answers

Answer: Sampling is a method of converting an analogue audio signal into a digital signal.

Explanation:

While sampling a sound wave, the computer takes measurements of this sound wave at a regular interval called sampling interval. Each measurement is then saved as a number in binary format.

What the person said above me

:A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
What does the view layer for this app contain?
What does the controller layer do for this app?

Answers

Answer:

it has blue & red on each side

Explanation:

What is the purpose of the PC troubleshooting process? Select two answers. BRAINLIEST to who gets it right

What is the purpose of the PC troubleshooting process? Select two answers. BRAINLIEST to who gets it

Answers

Answer:

identify...

solve...

Explanation:

Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system.

Answer:

Identify Problems and Fix Broken Components

Explanation:

"Critical troubleshooting will automatically fix things like corrupt settings that keep critical services from running, make adjustments to work with your hardware, or make other specific changes required for Windows to operate with the hardware, apps, and settings you've selected." Cited from Microsoft Support's Website

hi i choose brainlyest 4 free

Answers

Answer:

bet

Explanation:

Okay :........... thats cool
Other Questions
Which of the following statements are true? Which expressions are polynomials?Select each correct answer. Where do the electrons that enter the electron transport chain come from? Please help! I cant get this wrong!! Early Mesopotamian society was a form of....A. CommunismB. Capitalism C. Socialism Read the following excerpt from Banneker's letter (Refer to your literature textbookpage 50 for context)."That I now confess to you, that I am not under that state of tyrannical thralldom,and inhuman captivity to which many of my brethren are doomed, but that I haveabundantly tasted of the fruition of those blessings, which proceed from that freeand unequalled liberty with which you are favored;" (p. 50)Which of the following terms in the above quote have a negative connotation ortone?Tyrannical thralldomInhuman captivityUnequaled libertyDoomedA, B & D Read the argument excerpt owning a saltwater aquarium is a popular hobby.the exotic beauty of fish for these miniature habitats attracts many people to the pastime.one unusual addition is the lion fish a particularly striking species with red and white stripes flows fins and a series of long spines down its back what purpose does the author use of straw man serve In the story The Raven how would you describe the atmosphere of the chamber after the raven enters? what changes? why? What type of selection is most likely responsible for splitting a population into separate species within the same habitat! A. disruptive selection B. directional selection C. stabilizing selection D. artificial selection What atmospheric constituent is responsible for the blue color of uranus and neptune?. If X has a uniform distribution U(0, 1), find the pdf of Y = e^(x). It is clear that history tends to be written by people that, as much as they may wish to, are influenced by their own personal biases, interests, and the extent of the knowledge they have. In the case of European historians in the 18th and 19th centuries (in fact, well into the 20th century), the concept of the rise of the West is ubiquitous. What explains this phenomenon, particularly when taking into consideration that Europe was not a unified entity, but a series of independent states that saw one another with suspicion if we want to be kind, or with hostility if we want to be more honest. What would give them the impression that European civilization was superior? Before anyone mentions anything related to the Industrial Revolution, IR started only in the late 1700s and took about 100 years to become widespread. As well, if anyone wants to tackle the theory of evolution (survival of the fittest and so on), please remember that Darwins The Origin of the Species was published only in 1859, and was not accepted widely until much, much later. what observations can you make if the string are released in the trolley Chloe is 5 feet 4 inches tall. There are 2.54 centimeters in 1 inch. What is Chloe's height in centimeters? (12 inches = 1 foot) cities are growing particularly rapidly in asia and africa mainly because of Wims, Incorporated, has current assets of $3,200, net fixed assets of $19,500, current liabilities of $2,700, and long-term debt of $6,900. a. What is the value of the shareholders' equity account for this firm? Shareholders' equity b. How much is net working capital? Net working capital 27 If x and y are positive integers x/y=2, and (x^2+y^2)=z, which of the following cannot equal z? The temperature of a room is 10C. A heated object needs 20 minutes to reduce its temperature from 80C to 50C. Assuming that the temperature of the room is constant and the rate of the cooling of the body is proportional to the difference between the temperature of the heated object and the room temperature. (a) Evaluate the time taken for the heated object to cool down to 30C. Find the temperature of the object after 50 minutes. (b) HELP PLEASE! DUE TONIGHT!What is the magnitude of the electric field strength at a point 2.2cm to the left of the middle charge? (let kc=8.987755e9 N*m^2/C^2 2. the strongest relationships of a leader communicating purpose were for employees feeling that kpmg is a great place to work and feeling a sense of pride in working there. why do you think these were the most related to purpose? a sheet of bcc iron 2.2 mm thick was exposed to a carburizing atomosphere on one side and a decarburizing atmosphere on the other side at 725 c. after having reached steady state, teh iron was quickly cooled to room temperature. the carbon concentrations at teh two surfaces were determined to be 0.011 and 0.0073 wt%. calculate the diffusion coefficient if the diffusion flux is 1.4 * 10^-8