IS EVERYONE ASLEEP!!!!
where the smart people at
PLEASEEEEE HELPPPPPP
you can use the [nav] element to contain the major navigational blocks on the page, as well as links to such things as
a. privacy policy, terms, and conditions.
b. [div] elements
c. header and footer information
d. [article] and [section] elements
Answer:
a. privacy policy, terms, and conditions
Explanation:
The nav element usually includes links to other pages within the website. Common content that is found within a webpage footer includes copyright information, contact information, and page links
4. Are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable.
A. Management
B. Quality
C. SOP
D. SWI
Answer:
SWI
Explanation:
SWI (Standardized Work Instructions) are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable
How should you best communicate
this information to Keisha?
(Select all that apply.)
Answer:
if you use keyword in your search you will have a better chance of what you are finding.
Explanation:
PYTHON!
Build a simple restaurant program by serving this menu to the customer:
1. Muffin of the Day
2. Bagel and Cream Cheese
3. Granola, Fruit, and Yogurt
4. Steel Cut Oat with Fruits
5. exit.
===========================================================
requirements:
1. Create 4 classes for each course.
2. Each course will be having ingredients as their Attribute of class. example: Muffin - egg,oil,sugar.
3. First function of the course's menu is printing the steps of making the course by putting it into
functions. (you will just need "print statement" at least).
4. Second function of the course's menu is printing "Dish is served".
5. (you can add more functions for more points of the program).
6. Show the menu to the customer as long as they don't choose menu number 5.
7. When the customer choose a course, build the object and call all the functions that you built.
The efficiency, effectiveness, clarity, completeness and neatness of the program will be assessed.
Answer:
hi Po konbanwa sayo I'm pilipino I'm live in philippines
list any three positive impact of a computer
Answer:
1.People are using computer to perform different tasks quickly. l takes less time to solve problems
2.People are using the computer for paying bills, online businesses and other purposes
3.It also uses in media .Media runs through the internet to passes information from one person to another person
How does a modem communicate with a server in the same continent (without underwater cables)?
Answer:
A modem is typically used to send digital data over a phone line. The sending modem modulates the data into a signal that is compatible with the phone line, and the receiving modem demodulates the signal back into digital data. Wireless modems convert digital data into radio signals and back.
ASAP
The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?
- The Great Depression
- World War I
- World War II
- the popularity of television
The first to answer correctly gets a crown and 5 stars. Please help.
Answer:
The Great Depression and The popularity of television and the event was The Great Animation Strike
Explanation:
which one of the following is not considered a quantitative risk assessment technique?
Quantitative risk assessment is a method of assessing the risks associated with a particular project or activity. It involves the use of numerical values and statistical analysis to determine the probability and potential impact of various risks.
There are several quantitative risk assessment techniques that can be used to evaluate risk. These techniques include probabilistic risk assessment (PRA), fault tree analysis (FTA), event tree analysis (ETA), and Monte Carlo simulation.
Probabilistic risk assessment (PRA) is a technique that is used to quantify the probability and impact of potential risks. It involves the use of mathematical models to evaluate the likelihood of various scenarios and to estimate the potential consequences of those scenarios.Fault tree analysis (FTA) is another quantitative risk assessment technique that is used to identify the potential causes of a particular risk. FTA involves breaking down a complex system into smaller components and evaluating the potential failure modes of each component.
To know more about Quantitative risk assessment visit:
brainly.com/question/31565073
#SPJ11
Firewalls help protect against ________ and ________.
Firewalls help protect against unauthorized access and attacks.
Firewalls are a network security system that controls network traffic based on a set of predefined security rules. It examines all incoming and outgoing network traffic and then makes decisions based on the security rules in place. It prevents unauthorized access to your network.
Firewalls are a critical component of network security, especially if you operate a business or handle sensitive personal data. Firewalls help protect against unauthorized access, attacks, and network breaches. In addition to filtering traffic, firewalls can also be configured to block specific types of traffic, such as email or web traffic that contains known vulnerabilities. By blocking these types of traffic, firewalls can help prevent cybercriminals from gaining access to your network or exploiting weaknesses in your software or hardware.
Learn more about firewalls:
brainly.com/question/25798879
#SPJ11
When the keyword void is used in the Main() method header, it indicates that the Main() method is empty. True or false?
The given statement "When the keyword void is used in the Main() method header, it indicates that the Main() method is empty" is false.
In C#, void is a keyword used to indicate that a function or method should not return a value when called. As a result, it may be thought of as the opposite of the return keyword, which is used to return a value from a function or method.A void keyword is used when a method does not return any value. The void keyword specifies that a method returns nothing when it is called. It means that the method does not produce any output when it is called.Therefore, when the keyword void is used in the Main() method header, it indicates that the Main() method will not return a value. But it doesn't signify that the Main() method is empty. It may still have code in it that will be executed. So, the given statement is False.
To learn more about keyword void visit: https://brainly.com/question/31109875
#SPJ11
help please hurrry asap I WILL MARK BRAINLEST
Adam has decided to add a table in a Word doc to organize the information better.
Where will he find this option?
1 Insert tab, Illustrations group
2 Insert tab, Symbols group
3 Insert tab, Tables group
4 Design tab, Page Layout group
Answer:
4) design tab, Page layout group
Explanation:
Answer:
3 insert tab, tables group
GFCI devices must trip between __ and __ to reduce harmful shocks.
A. 2 and 4 amps
C. 5 and 8 milliamps
to reduce harmful shocks.
B. 4 and 6 milliamps
D. None of the above
and
Answer:
option b)4 and 6 milliamps is the answer
Please please please help I beg I'll give brainiest. :(
A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable
Answer:
A) toggle switch B) Push to Make switch C) Monostable
Explanation:
toggle because it needs to go off when the timer ends and not when u press a button
Push to make because you turn the timer off manually
Monostable because it needs to go off once not repeatedly
What is the purpose of a network device?
To allow the computer to store information or programs.
To allow the user to give data or information to the computer.
O
To allow computers to connect and communicate with other computers.
To allow the computer to display or communicate the result of a
computation
Answer:
c
Explanation:
:)
cloud kicks has decided to delete a custom field. what will happen to the data in the field when it is deleted?
When a custom field is deleted in a system like Cloud Kicks, the exact outcome for the data in that field depends on how the system is designed and implemented. However, in general, here are a few possible scenarios:
Data loss: If the system simply removes the field without taking any measures to preserve the data, then the data in that field will be permanently lost. This means that any information stored exclusively in the deleted field will no longer be accessible or recoverable.Data migration: In some cases, the system might offer the option to migrate the data from the deleted field to another existing field or a new custom field. This would ensure that the data is preserved and available in a different location within the system.Data archiving: Another possibility is that the system automatically archives the data from the deleted field before removing it. Archiving involves storing the data in a separate location or backup for future reference or retrieval if needed.It's important to note that the specific behavior and consequences of deleting a custom field will depend on the implementation choices made by the Cloud Kicks system developers and administrators. It is recommended to consult the system's documentation or contact their support team for accurate information about the consequences of deleting a custom field in their specific implementation.
for similar questions on cloud kicks.
https://brainly.com/question/32817809
#SPJ8
what are the disadvantageous of emails
Answer:
it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.
Need internet connection.without it can't use.
it can be hacked.and also lack the personal touch..
Answer:
they can cause misunderstandings and people read with diffrent
moods
Explanation:
Taylor, Catherine, and Naomi all made
inventions that improved people's
. They all protected.
their inventions by getting a
Taylor, Catherine, and Naomie all invented things that helped people's health.They all protected their inventions by getting a solution.
What do you mean by an invention?
A unique or novel device, method, composition, idea, or process is defined as an invention. An invention can be an enhancement to a machine, product, or process that increases efficiency or reduces costs. It is possible to patent an idea if it is distinct enough, either as a stand-alone invention or as a significant improvement over the work of others. If granted, a patent grants the inventor a proprietary interest in the patent for a set period of time, which can be licenced for monetary gain.
To learn more about invention
https://brainly.com/question/17931211
#SPJ13
please can someone help me with this?
Explanation:
there fore 36:4 = m¤
46:6
20:16
#von5
How do you fix Excel ran out of resources while attempting to calculate one or more formulas as a result these formulas Cannot be evaluated?
This issue usually occurs when there are too many formulas in the workbook.
What is workbook?A workbook is a collection of spreadsheets, worksheets, and other documents that are used to organize, store, and analyze data. Workbooks are often used in businesses, educational institutions, and other organizations to keep track of financial information, employee records, and other types of data.
To fix this issue, try removing some of the formulas or splitting the workbook into multiple sheets.
To remove formulas, select the cells with formulas, and then press the Delete key. This will remove the formulas and the cells will be blank.
To split the workbook into multiple sheets, first create a new sheet by pressing the Insert tab and selecting the Insert Sheet option. Then, copy the formulas from the original sheet to the new sheet.
Finally, make sure to save the workbook after making the changes. This should resolve the issue of Excel running out of resources.
To learn more about workbook
https://brainly.com/question/27960083
#SPJ1
how we use boolen search techniques report an improvement?
The use of Boolean search queries can assure more accurate media monitoring results. It’s especially useful in eliminating extraneous results. Some PR and marketing folks may cringe when they hear they should use “Boolean,” thinking it’s some sort of geeky computer solution that’s beyond their skills. It’s not. The art of constructing Boolean search queries is actually quite easy to learn and master. Mainstream search engines like Go0gle and Blng as well as social media monitoring services such as CyberAlert permit Boolean searches.
Write a program with a recursive method called recurexpon (base, exponent) that when invoked returns the answer of the base raised to the power of the exponent. Example - recurexpon (5,3) would equal 5*5*5. Remember, you must write the method, do not just use a library function. Assume the exponent must be greater than or equal to 1 and send an error message should the exponent not meet this criteria. Display the answer to the screen.
Here is a program in Python that implements the recursive method 'recurexpon' to calculate the power of a base to an exponent.
What is Python?
Python is a high-level, interpreted, and general-purpose programming language.Python is known for its readability and ease of use, making it a popular choice for beginners and experienced developers alike. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming. Python is widely used for a variety of applications, such as web development, scientific computing, data analysis, artificial intelligence, and more.
Here is a program in Python that implements the recursive method recurexpon to calculate the power of a base to an exponent:
def recurexpon(base, exponent):
if exponent < 1:
return "Error: Exponent must be greater than or equal to 1."
if exponent == 1:
return base
return base * recurexpon(base, exponent - 1)
base = 5
exponent = 3
result = recurexpon(base, exponent)
print("Result:", result)
This program checks if the exponent is less than 1 and returns an error message if it is. If the exponent is equal to 1, it returns the base. If the exponent is greater than 1, it invokes the recurexpon method again with exponent - 1 and multiplies the result by the base. The result is printed to the screen.
Learn more about Python click here:
https://brainly.com/question/30204005
#SPJ4
The user is told to guess a number between one and 10.
Which responses from the user could cause the program to halt with an error statement? Choose two options.
two
2.5
12
-3
0
Answer:
0 and -3
Explanation:
These two options do not fall within 1 and 10.
Answer:
2.5 and two
are the answers
Allow Lungi to enter the number of blankets he wishes to distribute on a given day
To allow Lungi to enter the number of blankets he wishes to distribute on a given day, you can create a form or a spreadsheet that allows him to input the desired quantity.
Allow Lungi to enter the number of blankets he wishes to distribute on a given day:To allow Lungi to enter the number of blankets he wishes to distribute on a given day, you can use the following steps:
1. Prompt Lungi for input by asking how many blankets he wants to distribute. You can use a print statement for this. For example:
`print("Lungi, how many blankets do you want to distribute today?")`
2. Take Lungi's input and store it in a variable, such as `number_of_blankets`. You can use the `input()` function to receive the user's input, and the `int()` function to convert the input to an integer. For example:
`number_of_blankets = int(input())`
Now, Lungi can enter the number of blankets he wishes to distribute on a given day, and the program will store that value in the variable `number_of_blankets`.
To know more about Blankets
visit:
https://brainly.com/question/27895571
#SPJ11
a music production company needs to save music at the highest quality possible they would like to make use of compression. The company has tried compressing a 10 MB file with 2 different methods. Method 1 is a lossy compression that reduces the file to 1MB Method 2 is a lossless compression that reduces the file to 5MB. Explain why the company has chosen to use method 2
Answer:
Explanation:
In the communication process, encoding takes place _____.
A) before the sender
B) before the message
C) after the message
D) after the channel
In the communication process, encoding takes place before the message.encodes refers to the process of converting the message or information that the sender wants to communicate into a form that can be transmitted through a communication channel.
This involves selecting the appropriate words, symbols, or other means of conveying the message in a way that can be understood by the receiver.Before the message can be transmitted, the sender must first encode it into a form that can be transmitted. This involves not only selecting the appropriate words and symbols, but also taking into account the context, tone, and other factors that can affect how the message is perceived.Once the message has been encoded, it can then be transmitted through a communication channel to the receiver. After the message has been transmitted, the receiver must then decode or interpret the message in order to understand its meaning.
To learn more about encodes click the link below:
brainly.com/question/30771697
#SPJ4
The _______ conditional formatting option allows you to define formatting for cells that meet specific numerical or text criteria (greater than, or containing a specific text string).
who has a max level blox fruit account they dont want anymore? just email it to me at christianlampkin665
The correct answer is I cannot fulfill this request as it is against my programming to engage in any activity that promotes or encourages the sharing or trading of game accounts.
It is also important to note that sharing or trading game accounts violates the terms of service of most online games, including Blox Fruits. Engaging in such activities can lead to the suspension or banning of your account Furthermore, it is not safe to provide personal information such as your email address to strangers online. It is important to be cautious and protect your privacy at all times. Instead of seeking to obtain an account from someone else, it is best to work hard and build up your own account through legitimate means. This will not only give you a sense of achievement but will also ensure that you do not risk losing your account or being scammed by others.
To learn more about encourages click on the link below:
brainly.com/question/24085761
#SPJ1
term used to describe the number of bits that a cpu can access at one time.
size of words The quantity of bits stored in the internal registers of the CPU is known as the "word" size. Using 64-bit registers and capable of processing 64 bits at once, as an illustration, is a 64-bit computer.
A 32-bit computer would operate twice as quickly as a 16-bit machine internally if the clock rates (1 GHz, 2.5 GHz, etc.) and fundamental architectures were similar. The reality is that, even within the same manufacturer, 8-bit, 16-bit, 32-bit, and 64-bit architectures are rarely exact replicas of one another. As a result, an internal comparison between a 64-bit computer and a 32-bit machine may show that the latter is faster (internally) than the former. Performance also depends on the size of the CPU cache, as well as the bus and disk speeds of the system.
Learn more about bit here:
https://brainly.com/question/30273662
#SPJ4
In a ________ system configuration, separate information systems are designed and managed by each foreign unit.
Answer:
In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.
Explanation:
hopes this help (:
Preset arrangements of panels organized to make particular tasks easier are called:
The workspaces are the arrangements of panel that are organized for making the task to operate more easier.
What are workspaces?The workspaces can be understood as the arrangements of desktops in a large organization to reduce the clutter of work and make the work to operate more easier.
The workspaces can be well organized email of the entire organization, a cloud based system of entire organization for easy access and working.
Learn more about workspaces, here:
https://brainly.com/question/24946752
#SPJ1