what is the first question you should ask yourself when analyzing an advertisement

Answers

Answer 1
How your presentation is gonna be

Related Questions

1

Select the correct answer from each drop-down menu.

What three Innovations have led to huge advancements in machine learning?

The three Innovations are the ability to

then to

and produce

Reset

Next

Answers

The three Innovations that have led to huge advancements in machine learning are the ability to process large amounts of data, then to use algorithms to analyze and learn from that data, and produce accurate predictions or recommendations.

The ability to process large amounts of data is critical for machine learning algorithms to work effectively. With the availability of big data, machine learning algorithms can learn from a vast amount of data and improve their predictions. Then, algorithms use statistical techniques to analyze and learn from the data, identifying patterns and relationships. Finally, the algorithms can produce accurate predictions or recommendations based on the learned patterns and relationships. These three innovations have led to significant advancements in various fields, including healthcare, finance, and transportation.

The first innovation, collecting and storing large amounts of data, is crucial because machine learning models rely on vast quantities of data to learn and make accurate predictions. The second innovation, developing and refining complex algorithms, allows machine learning models to identify patterns and relationships within the data effectively. Finally, the third innovation, utilizing powerful computational resources, enables machine learning models to process large amounts of data and complex algorithms efficiently, leading to faster and more accurate results.

To know more about algorithms visit:

https://brainly.com/question/31936515

#SPJ11

plz hurry i'm timed Which type of essay presents one side of an argument to convince readers to support it?

a descriptive essay
an expository essay
a narrative essay
a persuasive essay

Answers

Answer:

persuasive

Explanation:

Persuasive essay

Hope this helps

jessica has pinned her favorite applications as icons on her desktop .she always clicks on these icons to work them .which user interface is she using here?

Answers

Answer:

Graphical User Interface

Explanation:

import java.util.Scanner;

public class PigLatin {
public static void main(String args[]) {
Scanner console =new Scanner(System.in);
System.out.println("Please enter a word");
String phrase=console.nextLine();

System.out.println(eachWord(phrase));
}

public static String eachWord(String phrase) {
String help[]=phrase.split(" ");

for(int i=0; i
if (help[i].charAt(0) == 'a'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'e'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'i'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'o'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'u'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'A'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'E'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'I'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'O'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'U'){
return help[i] + "-ay";
}
else {
return help[i].substring(1)+"-"+help[i].charAt(0)+"ay";
}

}
return "aoujbfgaiubsgasdfasd";
}

I need help with this Pig Latin Program. I want to split the string so each word can run through the method eachWord. I don't know how to revamp this!

Answers

Answer:b

Explanation:

I took quiz

Answer:

uuuuuuuuuuhhm

Explanation:

CODE!

the ____, located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Answers

The ribbon located near the top of the window, is the control center in excel as well as most other 2019 office applications.

Omitted options are  A.Title bar B.Ribbon C.Status bar D.Menu

The Microsoft Excel ribbon like other 2019 office applications is located at the the top of the window and consists of  row of tabs and icons.

This helps a user to easily locate, understand and use commands in order to complete a task.  

The ribbon in Excel is made

tabsgroupsdialog launchers command button

The excel ribbon can also be customized for individual needs.

See here: https://brainly.com/question/23647530

Help PLEASE ILL MARK as brainlest

Help PLEASE ILL MARK as brainlest

Answers

Answer:

computer animation (3d)

System software is usually divided into two categories: operating systems and ____ programs.

Answers

Answer:

Utility

Explanation:

what is the plan to make optimum usage of available spaces?

Answers

Answer:

dergragmentation or share to speed up procceces

HELP!! I keep getting an EOFError on line 6 while trying to run my code in python.

my code-

line 1: num = int(input("Enter a number: "))

line 2: c=0

line 3: sum=0

line 4: while (num<100):

line 5: sum=sum+num

line 6: num = int(input("Enter a number: "))

line 7: c=c+1

line 8: print("Sum: " +str(sum))

line 9: print("Numbers Entered: "+str(c))

Answers

I'm almost certain you were getting an EOF error because you were asking for too much input. My code works for me. Best of luck.

HELP!! I keep getting an EOFError on line 6 while trying to run my code in python.my code-line 1: num

why are pirated software considered a threat?​

Answers

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

What are the disadvantages of using pirated software?

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

https://brainly.com/question/3615098

#SPJ1

What is the action of extracting data fragments and then reassembling them in order to recover a file?.

Answers

The method of recreating files by scanning the raw bytes of a disk and reassembling them is known as file carving.

The action of extracting data fragments and then reassembling them in order to recover a file is known as "file carving".

What is file carving?

File carving is a process that is used to recover files that have been damaged or corrupted, or that have been split into multiple fragments. It involves identifying the fragments of the file, extracting them, and then reassembling them in the correct order to reconstruct the original file.

There are a number of tools and techniques that can be used for file carving, depending on the nature of the damage or fragmentation. Some common methods include using specialized recovery software, using a hex editor to manually extract and reassemble the data, or using forensic tools to analyze and reconstruct the file.

File carving can be a complex and time-consuming process, and the success of the recovery often depends on the severity of the damage and the availability of intact fragments of the file. However, with the right tools and techniques, it is often possible to recover at least some of the data from a damaged or fragmented file.

To learn more about file carving click here:

https://brainly.com/question/29570501

#SPJ12

DogRunner.java
/*
* Activity 1.2.4
*/
public class DogRunner
{
public static void main(String[] args)
{

}
}
public class Dog
{
public Dog(String name)
{
System.out.println("Hi! I am a dog. My name is " + name + ".");
}

public void sit()
{
System.out.println("OK! I am sitting.");
}

public void speak()
{
System.out.println("arf arf!");
}

public void walk(int num)
{
System.out.println("I love to walk for " + num + " minutes.");
}

public void walk(int num, String park)
{
System.out.println("I love to walk for " + num + " minutes and go to " + park + "!");
}

public void eat(String food)
{
System.out.println("I eat " + food + ".");
}

public void eat(String food, int num)
{
System.out.println("I eat " + food + " " + num + " times a day.");
}

public void eat(String food, double amount, int num)
{
System.out.println("I eat " + amount + " cups of " + food + " " + num + " times a day.");
}

public void setAge(int years)
{
System.out.println("I am " + years + " years old.");
}

public void setAge(int years, int months)
{
System.out.println("I am " + years + " years and " + months + " months old.");
}
public void setAge(double years)
{
System.out.println("I am " + years + " years old.");
}

public void play(String toy)
{
System.out.println("Oh boy! I get to play with my " + toy + "!");
}

}

Answers

Overriding only I’m pretty surehave a good day

help pls I will mark brainliest the top answer i need it rn
Nonsense = REPORT
Answer the question 3-5 sentences.
"Why is recycling very important and beneficial to you and your community?"​

help pls I will mark brainliest the top answer i need it rnNonsense = REPORT Answer the question 3-5

Answers

Answer:

to reduce outbreak of diseases

Explanation:

materials recycled, funds earned from it are used developmental projects in my community

Check all that apply to Raster Graphics
in photoshop

only use certain colors
infinitely scalable
made from pixels
based on math
limited scalability

Answers

Answer: made from pixels, limited scalability

Explanation:

everything in PS is made up of pixels and you can see this if you zoom in too much or scale up too much, it will look like Mario 64. It is not like a vector based program, wich uses math to calulate lines so you can scale it indefinetly and it will remain crisp.

A well-known production is making a documentary film titled “The Dwindling Population of Grizzly Bears in the United States.” Which objective is most likely the primary objective for making the film? A. getting recognition B. telling a story C. spreading awareness D. earning profits

Answers

Answer:

C. spreading awareness

Explanation:

According to the given question, the most likely primary objective of a well-known production company making a documentary film titled “The Dwindling Population of Grizzly Bears in the United States" is to generate and spread awareness of the possible extinction of the grizzly bears in America.

With their production, they would expose the dangers facing the grizzly bears and also educate the general public so they could save the grizzly bears.

What were two weaknesses of the First New Deal?

A. It failed to end massive unemployment.
B. It created a huge national deficit.
C. It created tension within labor unions.
D. It failed to properly regulate the banks.
E. It caused people to distrust the banks.

Answers

Answer:B. It created a huge national deficit.

Explanation:

B.The New Deal failed because Roosevelt created uncertainty through experimentation, protectionism, regulation, and raising taxes.

The New Deal failed because the NRA, by fixing prices, damaged American business. Folsom explains that the traditional free market system, where businesses compete and innovate to sell products of varying price and quality to choosy customers was overthrown

D. It failed to properly regulate the banks.

.The next day, Roosevelt declared a four-day bank holiday to stop people from withdrawing their money from shaky banks. On March 9, Congress passed Roosevelt’s Emergency Banking Act, which reorganized the banks and closed the ones that were insolvent.

The Great Depression: Causes and Early Events: Mastery Test

-

Hope this helps :)

What were two weaknesses of the First New Deal?A. It failed to end massive unemployment.B. It created

Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication 3.vlan 4.security 5.storage 6.server

Answers

An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.

Implementation of an organisation

The implementation of an organisation can be carried out using the following features:

Email services: Email address can be assigned to different employees of the organisation.

LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.

VLAN: This is known as Virtual Local Area Network which is created between two LAN's.

Security: This is set up by a company to guide their data from theft.

Storage: This is used by the organisation to store their data.

Server: This is a device that provides internet services to another computer in an organisation.

Learn more about LAN here:

https://brainly.com/question/26956118

#SPJ4

true or false A client is a computer that responds to requests from other computers.​

Answers

Answer:

it's answer is option A )true


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of

Answers

Answer:

Responsibility

Explanation:

hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?

Answers

The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.

A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).

Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.

To know more about SSTP click here:

https://brainly.com/question/4674025

#SPJ4

Which of the following are external events? (Select three answers.) Which of the following are external events? (Select three answers.)

A) Special dinner and slide show for the company's investors

B) An employee picnic

C) An anniversary sale with discounted prices for all customers

D )A live music concert at a music store

E) An out-of-town retreat for the company's sales team
F) A department store fashion show

Answers

Answer:

* C - An anniversary sale with discounted prices for all customers.

* D - A live music concert at a music store.

* F - A department store fashion show.

Explanation:

External events are events for people outside the company, such as customers, potential customers, and the public.

Answer:

c,d,f

Explanation:

Sadik Inc.'s bonds currently sell for $1,375 and have a par value of $1,000. They pay a $120 annual coupon once a year and have a 15-year maturity, but they can be called in 7 years from today at $1,125. What is their yield to call (YTC)

Answers

The yield to call (YTC) for Sadik Inc.'s bonds (YTC) is 8.27%.

How to calculate the Yield to call

To calculate the Yield to call (YTC) of Sadik Inc.'s bonds, we ought to decide the rate of return on the off chance that the bonds are called in 7 a long time.

The bond's current cost is $1,375, which is higher than its standard esteem of $1,000. The yearly coupon installment is $120, and the call cost over 7 a long time is $1,125. The remaining term for development is 15 years.

Utilizing the YTC equation, we are able to calculate the yield:

YTC = (Yearly coupon + (Call cost - Current cost) / Remaining a long time) / ((Call cost + Current cost) / 2)

YTC = (120 + (1,125 - 1,375) / 15) / ((1,125 + 1,375) / 2)

Disentangling the condition:

YTC = (120 - 250 / 15) / (2,500 / 2)

YTC = (120 - 16.67) / 1,250

YTC = 103.33 / 1,250

YTC ≈ 0.0827 or 8.27%

Hence, the yield to call (YTC) for Sadik Inc.'s bonds is roughly 8.27%.

Learn more about yield to call here:

https://brainly.com/question/457082

#SPJ4

What are three advantages of using desktop software on a desktop computer
rather than mobile software on a smartphone or tablet?
A. It is extremely portable and easy to transport.
B. Using a mouse allows more precision when selecting objects on
the screen.
C. It is easier to type in text quickly using a keyboard.
D. It offers more features, and the interface fits well on a bigger
screen.

Answers

Answer:

A. It offers more features, and the interface fits well on a bigger screen.

B. Using a mouse allows more precision when selecting objects on the screen.

C. It is easier to type in text quickly using a keyboard.

1. Se citește un număr natural n de la tastatură. Să se afișeze un mesaj corespunzător dacă
numărul este par sau impar.
int main()
{ int n;
cout<<:dati n=”;
cin>>n;
if (n%2==0)
cout<<”numar par”;
else
cout<<”nuar impar”;
} (ma puteti ajuta va rog?)

Answers

Answer:

Directions: Write the word "TRUE” if the statement is true and write "FALSE” if the statement

is false. Write your answer on your answer sheet.

1. Always follow the routine “clean up while in use and clean up before keeping it”.

2. Manufacturer's instructions for operation and maintenance should be followed.

3. Employers have some control over potential hazards.

4. Before the vacuum cleaner becomes overloaded, throw dust bags after each use.

5. For the equipment with wheels, clean and check wheel-driven gears.

6. For proper storage/safekeeping of hand tools and equipment, surfaces of cutting tools

should be displayed for easy used and reach.

7. Only qualified people should carry out the maintenance and they should also keep

records of their inspections.

8. Check-up equipment irregularly to prevent serious breakdown.

9. Place guards on machinery to protect fingers and limbs.

10. Store electrical equipment outdoors.

How many colours can be represented with a 4 bit colour depth? (7-9) *
2
4
16
256

Answers

It should only be 16 colours? From what I remember.

Answer: 16 colors can be represented.

Hope this helps:)

a group of interconnected computing devices capable of sending or receiving data

Answers

A network is a group of devices connected that can send and receive data.

What do they mean by data?

Content that has been changed into a format that computers can transport or sort is referred to as data in general. Data are pieces of information that have been converted to digital form for usage with computers and other modern communication tools. It is allowed to use both the single and plural versions of the study problem of data.

What are examples and data for it?

Text, observations, photos, drawings, numbers, graphs, and symbol are a few examples of data. Data may include precise prices, weights, names, addresses, ages, temperatures, events, or ranges, for instance. Data is a fundamental type of information; it is meaningless and unhelpful on its own.

To know more about Data visit :

https://brainly.com/question/11941925

#SPJ4

Recurrance relations
Compute the closest upper bound on the asymptotic running time of the following recurrance:
a) T(n) 3T(n/2) + 3 n^2
b) T(n) 2T(n/2) + 32n

Answers

a) The closest upper bound on the asymptotic running time of the recurrence T(n) = 3T(n/2) + 3n^2 is O(n^log2(3)).

b) The closest upper bound on the asymptotic running time of the recurrence T(n) = 2T(n/2) + 32n is O(\(nlogn\)).

a) To find the closest upper bound on the asymptotic running time of the recurrence T(n) = 3T(n/2) + 3n^2, we can use the Master Theorem.

Comparing the recurrence to the standard form T(n) = aT(n/b) + f(n), we have a = 3, b = 2, and f(n) = 3n^2. Since f(n) = O(n^c) with c = 2, which is less than log_b(a) = log_2(3), we can apply Case 1 of the Master Theorem. Therefore, the closest upper bound on the running time is O(\(n^{log_b\)(a)) = O(\(n^{log\)2(3)).

b) For the recurrence T(n) = 2T(n/2) + 32n, we again use the Master Theorem. In this case, a = 2, b = 2, and f(n) = 32n. The value of f(n) = O(\(n^c\)) with c = 1, which matches \(log_b\)(a) = log_2(2) = 1. According to Case 2 of the Master Theorem, the closest upper bound on the running time is O(\(nlogn\)).

Learn more about Asymptotic.

brainly.com/question/32038756

#SPJ11

The ideal hash function:

A. Should be unfeasible to find two inputs that map to the same output
B. Should be unfeasible to learn anything about the input from the output
C. Basically we don’t want people to figure out what was said
D. All the above

Answers

I believe the answer is A
Hope this helps

The command show ip protocol is used on a router to do which of the following?
a. Display the routing protocol that can run on the router
b. Display the IP address of the routers running an IP protocol
c. Display the routing protocol running on the router
d. None of these answers are correct

Answers

The command "show ip protocol" is used on a router to display the routing protocol running on the router. This command provides information about the active routing protocol and its configuration settings. Therefore, the correct answer is option (c): "Display the routing protocol running on the router."

When executed, the "show ip protocol" command retrieves and presents details about the routing protocol that is currently running on the router. This information includes the protocol type, administrative distance, network addresses being advertised, timers, and other relevant parameters. By examining this output, network administrators can verify the routing protocol in use, ensure proper configuration, and troubleshoot any potential issues related to routing protocol operation. In summary, the primary purpose of the "show ip protocol" command is to provide visibility into the routing protocol running on a router.

Learn more about routing protocol here: brainly.com/question/31678369

#SPJ11

Other Questions
At 30 degrees C, 90 grams of NaNO3 is dissolved in 100grams of water. Is this solution SATURATED,UNSATURATED, BOTH, or NEITHER Visible light waves do not diffract as well as radio waves because? List the types of inhibitors that affect enzyme activity, comparing and contrasting the mechanisms of inhibition.LO #5 (Set 4) Exercise provides a healthy outlet for feelings which helps improve what kind of health 1. Output represents the final products from the production process anddistributed to the customers. Outline and discuss 2 of the major limitations of using the measures of per capital GDP and life expectancy to evaluate the changes in the welfare in the Australian economy. Explain one alternate measure of welfare in the Australian economy. Find the output for the graphy = 12x - 8when the input value is 2.y = [?] 3. What is the purpose of using sensors in an industrial system? Explain the difference between the information derived by sensors and that provided by indication devices. in the case of a manufacturing company, which of the following is an example of a value-creation process?A) Product designingB) Human resource servicesC) Public relationsD) Legal services In 2018, an Action Comics No. 1, featuring the first appearance of Superman, was sold at auction for $573,600. The comic book was originally sold in 1938 for $.10. What was the annual increase in the value of this comic book? (Do not round intermediate calculations and enter your anwer as a percent rounded to 2 decimal places, e.g., 32.16.) (c) Knowing that the length of a side of the unit cell (the silicon lattice constant) is 5.43 A,Si atomic weight is 28.1, and the Avogdaro's number is 6.021023 atoms/mole, find the silicon density in g/cm3. An adult client is admitted with dehydration. which nursing assessment data identify that the client is at risk for falling? taking into account which direction the meter points, what is being reduced and what is being oxidized in the zinc and copper galvanic cell? Which of the following hormones increases the heart rate in response to stress? a. Glutamate b. Epinephrine c. Testosterone d. Insulin In the text, benjamin franklin petitions the senate and the house of representatives of the united states to abolish slavery. in the context of this text, how do people create change? do you think it has become easier or more difficult over time to participate in social activism? cite evidence from this text, your own experience, and other literature, art, or history in your answer. This shows a number line. Which point is located at 90 ? Does the point (1, 9) satisfy the equation y = 3x 6? How many cubes of edge 4cm, each can be cut out from cuboid whose length, breadth and height are 20 cm, 18 cm and 16 cm respectively. BSB and account numbers and good health and wellness and is called Mariaprepara para una boda.1me2Os3se4Te