What is the best describes of a main purpose of a engineering

Answers

Answer 1

Answer: Engineering is the application of science and math to solve problems. Engineers figure out how things work and find practical uses for scientific discoveries.Aug 22, 2014

Explanation:


Related Questions

What are the steps for grouping worksheets in a workbook?
1. Click on the first worksheet's tab at the of the open workbook.
2. Then, select all the open tabs by holding down the key and select the last worksheet, OR select individual
sheets by holding the key and clicking the sheets you wish to group.
3. These actions automatically group the worksheets. Then, apply all formatting changes to the first worksheet, and it
will be applied to all in the group.

Answers

Answer:

1, bottom    2,shift,        3,Ctrl

Explanation:

i got it right.

Answer:

1) Bottom

2) Shift

3) Ctrl

Explanation:

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

Some studies show that 17% of American students don’t have access to a computer at home, and 18% of American students don’t have internet access. This is sometimes referred to as the “homework gap.” How do you think the homework gap will impact those students and ultimately the world?

Answers

The homework gap is likely to translate to lower literacy levels among those that are disadvantaged.

What is the homework gap?

The homework gap refers to the difficulties pupils have doing schoolwork when they do not have access to the internet at home, as opposed to those who do.

Homework is the time students spend outside of the classroom doing assigned assignments to practice, reinforce, or apply newly learned skills and information, as well as to master the abilities required for independent study.

Learn more about homework  at:

https://brainly.com/question/29612162

#SPJ1

explain the purpose of and legal requirements for different digital animations and effects products.

Answers

The purpose of different digital animations and effects products is to enhance the visual appeal and quality of digital media such as videos, games, and websites. The legal requirements for these products vary depending on the intended use and distribution of the media.


Explanation:
Digital animations and effects products can be used to create stunning visuals that capture the attention of audiences and add depth and dimension to digital media. These products range from simple graphics and animations to complex 3D models and special effects.

For commercial use of these products, there are legal requirements that must be followed to ensure that intellectual property rights are protected and that any necessary licenses are obtained. For example, if an animation or effect incorporates copyrighted material, such as music or images, permission from the copyright owner must be obtained. Additionally, if the media is intended for distribution or sale, the appropriate licenses and permissions must be obtained from the appropriate governing bodies.

In some cases, digital animations and effects products may also be subject to regulatory requirements, such as those related to safety or accessibility. For example, if an animation is intended for use in a medical setting, it may need to comply with certain safety regulations to ensure patient safety.

Overall, the purpose of digital animations and effects products is to create visually stunning and engaging digital media, while legal requirements ensure that these products are used responsibly and in compliance with intellectual property laws and other regulations.

To learn more about  intellectual property rights click here:

https://brainly.com/question/169200

#SPJ11

which character signifies the beginning of an escape sequence?

Answers

In computer programming, a character that signifies the beginning of an escape sequence is known as the escape character. The escape character signals that the next character or sequence of characters should be interpreted differently from the way it would normally be interpreted.

In most programming languages, the escape character is the backslash (\).For example, in the C programming language, the escape sequence "\n" represents a new line character. When the compiler encounters this sequence, it interprets it as a command to move the cursor to the beginning of the next line. Similarly, the escape sequence "\t" represents a tab character and "\b" represents a backspace character.Escape sequences are commonly used to represent special characters or control codes that would be difficult or impossible to represent in plain text. They are also used to represent characters that have special meaning in programming languages, such as quotation marks and backslashes.

Learn more about C programming language here,https://brainly.com/question/26535599

#SPJ11

The character that signifies the beginning of an escape sequence in computer programming is the backslash (\) character.

In computer programming, an escape sequence is a combination of characters that represents a special meaning when used within a string. It is typically used to include special characters or control characters in a string that would otherwise be difficult to represent directly.

The escape sequence begins with a backslash character (\) followed by a specific character or combination of characters. The backslash acts as an escape character, indicating that the following character(s) should be interpreted differently than their literal meaning.

For example, the escape sequence

represents a newline character, and \t represents a tab character. By using escape sequences, programmers can include special characters in their code without causing syntax errors or unintended behavior.

Learn more:

About character here:

https://brainly.com/question/13141964

#SPJ11

Write a program to find out the middle element in the array
using pointers.
SOLVE IN C

Answers

To find the middle element in an array using pointers in C, we can write a function that takes in a pointer to the first element of the array and the size of the array.

The function will then use pointer arithmetic to calculate the memory address of the middle element based on the size of each element in the array.

Here's the code:

#include <stdio.h>

int *middle(int *arr, int size) {

   // Calculate memory address of middle element

   int *mid = arr + (size / 2);

   

   return mid;

}

int main() {

   int arr[] = {1, 2, 3, 4, 5};

   int size = sizeof(arr) / sizeof(arr[0]);

   

   // Find middle element using pointer

   int *mid_ptr = middle(arr, size);

   int mid_val = *mid_ptr;

   

   printf("Middle element: %d", mid_val);

   

   return 0;

}

In this example, we've defined an array of integers and calculated its size using the sizeof operator. We then call the middle function and pass in a pointer to the first element of the array and its size.

Inside the middle function, we calculate the memory address of the middle element using pointer arithmetic. We add the integer division result of half the size of the array to the memory address of the first element. Since the pointer points to an integer, adding an integer value to it moves the pointer to point at a memory location that is equivalent to moving forward by that many elements.

Finally, we return a pointer to the middle element. In the main function, we assign this pointer to mid_ptr and extract the middle element value using the dereference operator *. We then print out the middle element value.

learn more about array here

https://brainly.com/question/13261246

#SPJ11

one of the major problems with the heartbleed bug in openssl software is that:

Answers

One of the major problems with the Heartbleed bug in OpenSSL software is that it allowed an attacker to access sensitive information from the memory of a vulnerable server.

Specifically, the Heartbleed bug allowed an attacker to exploit a flaw in the OpenSSL implementation of the Transport Layer Security (TLS) heartbeat extension, which is used to keep SSL/TLS connections alive.

The vulnerability allowed an attacker to send a specially crafted heartbeat request to a vulnerable server, which would then respond with a block of memory that could contain sensitive information such as private keys, login credentials, and other data. This information could be used by an attacker to compromise the security of the server and any systems or users that depend on it.

Another major problem with the Heartbleed bug was its widespread impact. OpenSSL is a widely used open-source software library that provides encryption and security for a variety of applications, including web servers, email servers, and virtual private networks (VPNs). The bug affected a large number of OpenSSL installations worldwide, potentially exposing sensitive information on a massive scale.

learn more about    software  here:

https://brainly.com/question/985406

#SPJ11

how do you display hyperlinks without an underline?

Answers

You can display hyperlinks without an underline by using the CSS "text-decoration: none" property. You can add this to the link's CSS selector

a {

  text-decoration: none;

}

What is Hyperlinks?
Hyperlinks are pieces of code that allow users to click on text or images, and be taken to a different webpage or document. They are often used to navigate between different webpages within a website, as well as to link to other websites. Hyperlinks can also be used to link to files such as PDFs, Word documents, or even images. Hyperlinks are created using HTML code, which is a type of programming language used to create websites.

To know more about Hyperlinks
https://brainly.com/question/23413848
#SPJ4

discuss why ergonomics is important?​

Answers

Answer: Ergonomics are important because when you're doing a job and your body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

match the following

match the following

Answers

Answer:

can't understand.... what's your question???!!

__________ are organizations of special interest groups that solicit contributions from donors and fund campaigns to help elect (or defeat) candidates based on their stances on specific issues. Group of answer choices

Answers

Answer:

The appropriate approach is "Political action committees".

Explanation:

Committees created among moneyed interests to donate to presidential campaigns that are inclined to endorse whose stance regarding controversial factors. Due to various established campaign finance laws, Campaign contributions or PACs have been permitted to make contributions that are far greater just like groups of people would.

as a function of n, what is the largest number of directed paths from s to t that g can have?

Answers

the number of paths from s to t is limited by the number of paths that can be constructed using all the vertices in the graph except for s and t.

This is equivalent to the number of subsets of size n-2, which is 2^(n-2). Thus, the largest number of directed paths from s to t that g can have is a function of n, and specifically, it is exponential in n.


- "n" represents the number of vertices in the directed graph G.
- "s" and "t" are two distinct vertices in graph G.
- A "directed path" is a sequence of vertices in which each pair of consecutive vertices is connected by a directed edge.

Now, let's find the largest number of directed paths from s to t as a function of n:

The largest number of directed paths from s to t in G will occur when there is a directed path from s to every other vertex in the graph and a directed path from each of those vertices to t.

In this case, there will be (n-2) vertices between s and t. For each of these intermediate vertices, there will be one directed path from s to the vertex and one directed path from the vertex to t.

Therefore, the largest number of directed paths from s to t as a function of n is:

f(n) = (n - 2)

This function represents the maximum number of directed paths from s to t in a directed graph G with n vertices.

to know more about subsets click here:

brainly.com/question/14932382

#SPJ11

What is built into an upright cabinet that stands alone?

Answers

That stands alone, often referred to as a standalone cabinet or a freestanding cabinet, can serve various purposes and may contain different features based on its intended use.

Here are some common elements that can be built into such a cabinet:

Shelves: Upright cabinets typically include adjustable or fixed shelves to provide storage space.

These shelves can be used to store various items such as books, dishes, clothing, or electronics.

Doors: Many standalone cabinets have one or more doors to conceal the contents and provide a neater appearance.

The doors may be solid or include glass panels for visibility.

Drawers: Some cabinets incorporate drawers, which are useful for storing smaller items such as cutlery, office supplies, or personal belongings.

Drawers may be located at the bottom or integrated into the cabinet's design.

Hanging rods: In cabinets designed for clothing storage, you may find hanging rods or rails for hanging garments such as shirts, jackets, or dresses.

Mirrors: Certain upright cabinets, particularly those intended for use in bedrooms or bathrooms, may feature built-in mirrors on the doors or as a separate section of the cabinet.

Locks: For security purposes, standalone cabinets may include locks or the option to install a lock, allowing you to safeguard valuable or sensitive items.

Lighting: Depending on the cabinet's purpose, it may have built-in lighting fixtures to illuminate the contents, making it easier to locate items.

Decorative elements: Upright cabinets often incorporate decorative elements such as carvings, moldings, or ornate handles to enhance their aesthetic appeal.

These features can vary greatly depending on the specific design and intended use of the upright cabinet, but they provide a general overview of what you might typically find.

For similar questions onstandalone cabinet

https://brainly.com/question/13907906

#SPJ11

A characteristic often associated with entrepreneurship is

Answers

Answer:

with small businesses

Explanation:

to make a lager profit

A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.

Answers

An Online collaboration or meeting is an online collaborative event that may include such features as, slideshows, and PowerPoint presentations.

What is an online collaborative?

Online collaboration is a term that connote the using the internet and online tools to work together.

This is done with the use of a computer system instead of sitting in a physical office space. Note that  online collaboration helps employees to work together from different locations and devices by the use of virtual work environments and also some shared online work spaces.

Learn more about  collaborative event from

https://brainly.com/question/514815

do earthquakes ever happen in Malaysia?​

Answers

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

Do earthquakes ever happen in Malaysia?

Yes, they do. And they are very frequent and high in intensity.

For instance, the Sabah earthquake in 2015.

On June 5, 2015, the region of Malaysia was hit by a strong earthquake, 6.0 of magnitude on the Ritcher scale. The telluric movement lasted 30 seconds and caused much destruction.

Experts and scientists confirm that this had been the strongest earthquake since the one presented in 1976.

if you are continuously working with the same range, then you may give a name to the range using _____ option in the data menu open office.
a define data.
b define range.
c define reference.
d define addres​

Answers

Answer : B. Define Range

If you are continuously working with the same range, then you may give a name to the range using define range option in the data menu open office. The correct option is b.

What is a range?

In computer programming, range refers to the interval that includes the upper and lower bounds of an array's variable values. The interval between data points is referred to as the range in statistics.

The domain of a function is the set of values that can be plugged into it. This set contains the x values in a function like f. (x).

A function's range is the collection of values that the feature can take. This is the set of values that the function returns after we enter an x value.

If you are constantly working with the same range, you can give it a name by selecting the define range option from the data menu in Open Office.

Thus, the correct option is b.

For more details regarding range, visit:

https://brainly.com/question/28135761

#SPJ6

CYBERSECURITY. ITS THE ONLY ONE I GOT STUCK ON PLS HELP.
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Answers

Answer:  How might these features enhance cybersecurity for Windows users:

1) Boot in safe mode - The safe mode only loads minimal and trusted drivers and services (excluding third-party options) thereby allowing isolation of potential issues, viruses, and trojan malware.

2) Boot from disk - The boot from disk option loads the operating system from a disk image, rather than loading it from the host system. This eliminates the loading of corrupted, infected, or altered boot loader files from a suspect system.

3) Start-up Utility - The startup utility provides the user with direct control over what applications, services, batch files, drivers, and scripts are run during the startup process. This can remove third-party bloatware or malware that can impact system performance or compromise cybersecurity for the user(s) data, access, identity, and applications.

Explanation:

All of these Windows tools enable different options for users to manage, troubleshoot, and protect their systems, data, identity, and applications from cybersecurity breaches, hackers, monitoring, and potential trojan malware. Used in together, they provide a comprehensive set of tools that can protect and disable cybersecurity threats and exploited vulnerabilities.

Please remember to vote this as Brainliest if I earn it!   :)

Which type of data is shown below?
apple, 0.85
banana, 0.90
peach, 1.50

multiple choice:
structured
unstructured
abstract
integer

THANK PLZ HELP

Which type of data is shown below? apple, 0.85 banana, 0.90 peach, 1.50multiple choice:structuredunstructured

Answers

Answer:

structured

Explanation:

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

Answers

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. The form of computing that the project will be using is grid computing.

In the field of computers, when multiple computing systems are used so that a single task can be achieved, then such a system is referred to as grid computing.

The main purpose of grip computing is to work on a joint task where each computer system is specialized in one way or the other in order to help in the joint or single goal. Hence, the correct option is grid computing.

Other options, such as mobile computing, are not correct as mobile computing is a wireless communication for the transmission of data.

Although a part of your question is missing, you might be referring to this question:

The software team of a company is working on a project. the project involves many computing systems working together on disjointed tasks towards a single goal. what form of computing would the project be using?

A. mobile computing

B. grid computing

C. cloud computing

D. green computing

To learn more about grid computing, click here:

https://brainly.com/question/14511163

#SPJ4

anaconda is an installation program that's used by fedora, rhel, and other distributions. which of the following does anaconda perform? (select three.

Answers

Identifies the computer's hardware, Creates a file system and Provides a user interface with guided installation steps does anaconda perform.

What a user interface means?

The user interface of a device is the point of interaction and communication between humans and computers. Desktop monitors, keyboards, mice, and other pointing devices may fall under this category. It also describes how a user interacts with a website or program.

The user interface is the point of interaction and communication between people and computers on a gadget, website, or app. Desktop graphics, keyboards, mice, and display screens are a few examples of this.

Thus, the options are written.

For more information about user interface, click here:

https://brainly.com/question/15704118

#SPJ1

Describe how to create a list with bullets

Answers

If on docs or a similar writing app, there should be a button with a block dot and lines that when clicked will allow you to make a bullet list
If on paper, just draw a black dot and write each point you want to make on a separate dot.

List three ideas for checking in with your progress and recognizing completion on your actions.

Answers

One idea for checking in with your progress and recognizing completion on your action is to set specific milestones or targets along the way and regularly evaluate your progress towards them.

How can you effectively track your progress and acknowledge completion of your action?

To effectively track your progress and acknowledge completion of your action, it is important to establish clear milestones or targets that can serve as checkpoints. Break down your overall goal into smaller, measurable objectives that can be achieved incrementally.

Regularly assess your progress by comparing your actual achievements against these milestones. This will provide you with a tangible way to track your advancement and ensure that you stay on track. Once you reach a milestone or successfully complete a specific objective, take the time to acknowledge and celebrate your achievement.

Read more about action check

brainly.com/question/30698367

#SPJ1

who has a working card

Answers

Answer:

Me

Hgqgwgwvqbqbqhquququ

Para que son importantes las tic [en la educacion?

Answers

Information and Communication Technologies (ICT) are very important tools in education. In this sense, ICT scan have a positive impact on teaching and student learning, as they allow the creation of new educational opportunities and experiences.

Below are some reasons why ICT is important in education:

Access to information: ICT sallow access to a wealth of information quickly and easily. Students can use the Internet to find educational resources, research materials and academic references to complement their training. Personalized learning: ICT sallow the creation of personalized and adaptive learning environments. Students can learn at their own pace and level, using digital tools that allow them to obtain immediate and personalized feedback on their performance. New ways of teaching: ICT allows the creation of new, more dynamic and interactive ways of teaching. Teachers can use digital tools such as videos, educational games, simulations and interactive activities to enrich students' learning experience. Fostering creativity and innovation: ICT can foster creativity and innovation in students, allowing them to create digital projects, multimedia presentations and other educational materials that allow them to express their ideas more effectively and visually.

In conclusion, Acts are very important tools in education. They allow access to a wealth of information, the creation of personalized learning environments, the use of new ways of teaching and the promotion of creativity and innovation. It is important that teachers and students take full advantage of It to improve the quality of education and prepare for the digital world in which we live.

Lear More About Communication technologies

https://brainly.com/question/17998215

#SPJ11

requirements for word processing in document language

Answers

Answer:

What are the things that you required to perform word processing?

1. Use Keyboard Shortcuts

2. Create and Manage Lists

3.Turn Off Automatic Numbered Lists

4.Find and Replace Text

5.Insert a Table

6.Format a Table

7.Insert a Chart

8.Interact With pictures

9.Track and Manage Changes

10.create and manage paragraph Styles

Y’all know any movie sites I can go on?

Answers

Answer:

Tinseltown

Explanation:

a town with 1800 homes was surveyed. of the 360 who answered the survey, 48 did not have computers at home. On the basis of the survey, estimate how many total homes do not have computers at home.


URGENT!!!!

Answers

Answer:

48

Explanation:

48 is the correct answer of that question

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.

Answers

You would install a(n) extension if you wanted to enable new capabilities in your web browser.

An extension is a software program that can be added to your web browser to enhance its functionality. It allows you to customize and add new features to your browser, such as ad blockers, password managers, or language translators. Extensions are usually available in the browser's app store or extension marketplace, where you can browse and install them with just a few clicks. Once installed, they integrate seamlessly into your browser, providing you with the desired functionality and improving your web browsing experience. Extensions are available for popular web browsers like Chrome, Firefox, and Safari, and they are a convenient way to personalize and enhance your browser according to your specific needs.

Know more about web browser here:

https://brainly.com/question/32655036

#SPJ11

When a specific garment, like the bell-bottom jean, comes into style and then disappears again it's called a ___________. (5 Letters)

Answers

When a specific garment, like the bell-bottom jean, comes into style and then disappears again it's called a fad. A fad is a temporary,

short-lived craze or trend that becomes very popular among a particular group of people within a brief period.

A fad can be a piece of clothing or a way of dressing, hairstyle, a dance, a toy, or even a word or phrase. However, after a while, it loses its popularity, and people move on to something else. Fads can be caused by various factors like media exposure, peer influence, and marketing.

In conclusion, fads are temporary trends or crazes that are popular for a short period and then disappear, making way for a new trend to emerge.

To know more about specific visit:

https://brainly.com/question/27900839

#SPJ11

Other Questions
What are the vertex and range of the function? A recommended dose of medicine A is 125MG for a 150LB person, What would be the correct dose for a 142LB person? The appropriate medication dose for this patient is _______MG Dust that is heated to 30 K will emit a blackbody spectrum that peaks ata. 1 m.b. 30 m.c. 50 m.d. 100 m.e. 500 m. according to the contingency model, a relationship-oriented leadership style works best in___situations. Activity#2Directions: Solve the following problems. Show your complete solutions. 1. The diagonals of a Kite have lengths of 12 and 15 cm. Find the area of a Kite. 2. Given parallelogram ABCD, angle A and angle B measures (x+30) and (3x-90) respectively. Determine the measure of each angle. 3. One lateral face of the roof of the school building is trapezoid in shape. One of the bases of this trapezoid is 6 m longer than the other base. Findthe length of the two bases if the median measures 19 m. 4. Given Isosceles Trapezoid CLUB, if m HELP METHIS IS SPANISH !!! Stesichorus wrote that Helios: a. crossed Ocean in a gold cup b. fell to earth c. rode his chariot from west to east d. battled the Titans The three broad goals of the HCAHPS survey include (1) to collect consistent data on patients' per- spectives of their care that allow for comparison between hospitals, (2) to publicly report survey data in order to incentivize hospitals to improve their quality of care, and (3) to enhance accountability for care provided. A department director was complaining about the time that it takes to review and ana- lyze the results of the HCAHPS survey, and the value to the organization. Construct a defense for how and why the organization can benefit from participating in the HCAHPS survey and what the organi- zation can learn from the results of the survey. 5. A healthcare organization is receiving complaints from patients about taste and temperature of the food provided to them. This issue is also being reflected in their survey data. The healthcare organiza- tion wants to address this issue. How would the healthcare organization resolve this issue? true or false: the advertising budget should remain the same throughout the course of the product life cycle. What can you say about the series an in each of the following cases? (a) lim. 72 = 5 absolutely convergent conditionally convergent divergent cannot be determined (b) lim 0:2 = 0.5 absolutely convergent conditionally convergent divergent cannot be determined na absolutely convergent conditionally convergent divergent cannot be determined Why did President Wilson want the United States to provide leadership at the end of World War I? He wanted to ensure economic stability in the nations affected by the war. He believed the United States would be able to protect world peace. He felt the United States was in a position to dominate international waters. He thought the United States could avoid future world conflicts by asserting its dominance. Which substance melts first salty ocean water or sodium chloride? during which new product development stage are most ideas eliminated? 4. PLEASE HELP!!!!!!You have a cup with 17 coins inside. The total inside the cup is $5.50. Determine how many half dollars and quarters are inside the cup. Use a system of equations. Be sure to define the variables and show all work. Is Each of the girls speak correctly proper English What is the relationship between survivorship curves and reproductive strategies? the nurse just received an arterial blood gas (abg) report that shows a borderline high pco2 on a client who had chest surgery. what should be the priority nursing intervention? When looking at an aqueous solution of a weak acid, a lower pH corresponds to:a) a higher concentration of hydroniumb) a lower concentration of hydroniumc) a higher concentration of hydroxided) a more dilute solution How many inches are in 71.12 cm, show your work! A factory manufactures two products x and y on which the profits earned per unit are birr 5 and birr 6 respectively. each product is processed on two machines; m1 and m2. product x requires one minute processing time on m1 and two minutes on m2 while y requires one minute on m1 and one minute on m2. machine m1 is available for not more than 8 hours while machine m2 is available for not more than 10 hours in during any working day. required: 1.formulate the linear programming model for this problem. 2.solve the formulated problem using simplex method