Answer:
B. files that you have permission to share
D. works that a Creative Commons license says you can use
Answer: B and D
Explanation: got it right on gunity
Games were first created as a way to just have fun; they had no real connection to life.
True
False
Answer:
true
Explanation:
size = input("Enter your shoe size: ") size = int(size) if size > 12: print(str(size) + " is too high.") elif size < 6: print(str(size) + " is too low.") else: print(str(size) + " is in stock.") What is the output from running the above code if the user enters ten?
Answer:
It will print that the shoe size is in stock when the user prints 10, too high when the user enters 12, and anything less than 6 would be too low. It's a python program describing how basic input data is interpreted.
A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.
Which of the following would be the best decision for this band?
A) Plan a small concert tour through the United States with limited performances in key cities.
B) Use a crowdfunding source to raise money for an international tour.
C) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.
D) Use social media to publicize a national tour and set up media interviews with key entertainment news publications.
A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.
Which of the following would be the best decision for this band? \\
-----------------------------------------------------------------------------------------------------
Correct Answer:
B) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.
Explanation:
I got the answer correct on EDG2020.
Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"
Which reclusive writer announced two new novels to be published this fall, ending a 16-year hiatus?.
Harper Lee is the reclusive writer who announced two new novels to be published this fall, ending a 16-year hiatus.Harper Lee is an American novelist known for her critically acclaimed and Pulitzer Prize-winning novel To Kill a Mockingbird (1960).
She was born on April 28, 1926, in Monroeville, Alabama, and she died on February 19, 2016. Lee, who was known for her private nature and reclusive lifestyle, announced in February 2015 that a second novel, Go Set a Watchman, would be published in July 2015. The novel is set in the same fictional town as To Kill a Mockingbird, but 20 years later. Another novel, The Mockingbird Next Door: Life with Harper Lee, was also published in 2015 by Marja Mills, a journalist who lived next door to Lee in Monroeville.
It is worth noting that Harper Lee did not announce two new novels to be published in the fall of 2021 or any other year after 2015.
To know more about Prize-winning visit:
brainly.com/question/31551611
#SPJ11
How does segmenting your network increase network security?
Answer:
By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.
Explanation:
PLEASE MARK ME AS BRAINLIEST
An _______________ is a sequence of instructions written to perform a specified task or series of tasks for a computer.
An app is a sequence of instructions written to perform a specified task for a computer. Today, most of these programs are installed as desktop apps or Windows Store apps.
What is the function of the app?
Any app's ability to be navigated by the user is its most crucial feature. In recent years, centered tabbed menus at the top or bottom of the screen have gained popularity. Users are able to operate them naturally, and the majority of menu options are always within reach of the thumb.
An app is a set of written instructions that a computer can use to carry out a certain operation. These days, the majority of these applications are downloaded as desktop apps or Windows Store apps.
What is this function about?The relationship between a group of inputs and one output each serves as the foundation for the definition of a function.
Remember that a function is only a relationship between inputs in which each input is connected to a certain output.
To learn more about function refers to:
https://brainly.com/question/27863366
#SPJ4
What is the value of the variable moneyDue after these lines of code are executed?
>>> numSodas = 2
>>> costSodas = 1.50
>>> moneyDue = numSodas * costSodas
Answer:
3.0
Explanation:
To understand why there is a blank decimal, we have to understand that when you add multiply or subtract with a float (in python), the result will also be a decimal, even you use a blank decimal in the equation. A circumstance where the output would just plain 3, you would have to put in the following:
>>>int(moneyDue)
To insure it will output an int. However, it does not use that line of code, thus proving the answer is 3.0.
hope this helped :D
Answer:
3.0
Explanation:
edge
Drive
0101
0102
0103
0104
0105
0106
0107
0108
0109
0110
0111
0112
0113
0114
0115
0166
Sorting Minute
True
102
162
165
91
103
127
112
137
102
147
163
109
91
107
93
100
An Excel table can help
you organize your data in
preparation for using it
with charts and other
analysis tools.
Copyright © 2003-2022 International Academy of Science. All Rights Reserved.
False
Answer:
What
Explanation:
True
In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the
The Information Security Officer (ISO) is the professional responsible for ensuring the security and integrity of an organization's information systems and data.
An information security officer (ISO) is an individual within an organization who is responsible for managing the security and integrity of the organization's information systems and data. The ISO is responsible for ensuring that the organization's data is protected from unauthorized access and that its information systems are secure from external and internal threats.
The ISO is typically a senior-level professional within an organization's information security team. They are responsible for overseeing the organization's information security program and for ensuring that the organization's security policies and procedures are followed.
To know more about ISO visit:-
https://brainly.com/question/14754171
#SPJ11
Display the total number of parking tickets.
Answer:
Explanation:
select * from customer where balance > (select avg(balance)
from customer) and credit_limit > (select avg(credit_limit) from customer);
which vpn type might feature the use of a clientless vpn solution? this task contains the radio buttons and checkboxes for options. press the enter key to select the option. option a site-to-site option b client-to-site option c client-to-client option d server-to-server
When users only wish to encrypt web traffic, they frequently utilize clientless SSL VPNs in kiosks, shared workstations, mobile devices, and other situations.
Client-based: The user uses a client to connect to the VPN terminating device (router, firewall, etc.). The Cisco AnyConnect Secure Mobility Client is a good illustration of a VPN client. End users can use an SSL-enabled Web browser to securely access corporate network resources from any location using a clientless SSL VPN. A Clientless SSL VPN gateway must first verify the user's identity before granting access to preconfigured network resources. A browser-based VPN called a clientless SSL VPN enables remote users to securely access corporate resources. They use HTTP over an SSL connection to access the resources from any location.
Learn more about browser here-
https://brainly.com/question/28504444
#SPJ4
In cell J9, use the CORREL function to test for a correlation between sales data and milestones reached.
To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these steps:
1. Gather your sales data in a range of cells, for example A1:A10.
2. Gather your milestones data in another range of cells, for example B1:B10.
3. Click on cell J9 to make it the active cell.
4. Enter the CORREL function: =CORREL(A1:A10, B1:B10).
5. Press Enter.
In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation.
This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.
To know more about correlation function visit:
https://brainly.com/question/31546990
#SPJ11
To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these : Gather your sales data in a range of cells, for example A1:A10.
In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation. This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.
Learn more about correlation function visit:
https://brainly.in/question/40546464
#SPJ11
This term refers to an individual item in a list.a. elementb. binc. cubbyholed. slot
The term that refers to an individual item in a list is "element". In computer science, an element is a single item in a data structure or collection. It can be a number, a character, a string, or any other type of data that can be stored and manipulated within a program.
Elements are commonly used in programming languages such as Python, Java, and C++. They are often stored in arrays or lists, which are collections of elements that can be accessed and modified by the program. Elements can also be used in other data structures such as stacks, queues, and trees.
When working with elements, it is important to understand how to access and manipulate them. In an array or list, elements are typically accessed by their index, which is a number that corresponds to their position in the collection. For example, the first element in an array has an index of 0, the second element has an index of 1, and so on.
Overall, understanding elements is a fundamental concept in programming and computer science. By mastering this concept, programmers can effectively work with data structures and collections to create efficient and effective programs.
Learn more about data structures here:
https://brainly.com/question/12963740
#SPJ11
which of the following terms is used in secure coding: principles and practices to refer to the direct results of events?
a Events b Consequences c Impacts
d Goals
In secure coding principles and practices, the term "consequences" is used to refer to the direct results of events. Secure coding involves implementing measures to prevent unauthorized access, data theft, and other cyber threats.
It is crucial to consider the consequences of various events that could occur in the system and the impact they would have on the security of the application. By considering the consequences of an event, developers can identify potential vulnerabilities and design a system that is more secure. For instance, developers can consider the consequences of a successful SQL injection attack on the application and implement measures such as input validation to prevent such attacks. It is essential to have a thorough understanding of secure coding principles and practices to ensure the security of the application.
In conclusion, the term "consequences" is used in secure coding principles and practices to refer to the direct results of events, and it is important to consider these consequences when developing secure applications.
Learn more about principles here:
https://brainly.com/question/30388578
#SPJ11
What part of the computer is responsible for executing instructions to process information?.
Answer:
The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions.
Explanation:
Short: Central Processing Unit or CPU
what are the main functionalities in ip addresses. hint: there are two.
The two main functionalities of IP addresses are: Identification and Addressing and Routing.
Identification: IP addresses serve as unique identifiers for devices connected to a network. They enable devices to be identified and distinguished from each other on the internet or within a local network. IP addresses consist of a combination of numbers and are used to establish communication between devices.
Addressing and Routing: IP addresses are used for addressing and routing data packets across networks. When data is sent over the internet, it is divided into packets and each packet is assigned the source and destination IP addresses. Routers use these addresses to determine the appropriate path for the packets to reach their destination. IP addresses play a crucial role in ensuring that data is correctly routed and delivered to the intended recipient.
Know more about IP addresses here:
https://brainly.com/question/31026862
#SPJ11
On what basis computer can be classified into different categories?
Please answer these question and you will get 16 points
Computers are classified into 4 different sizes:
- Mini Computers
- Micro Computers
- Super Computers
- Mainframe Computers
Micro Computers are small computers that are usually called PCs, or personal computers. They complete general purpose tasks and can be from $400 home computers to $15000 workstations. These are the most common types of computers, and most people have them in the forms of desktop computers to laptop computers. Even phones and tablets are considered micro computers because they meet the basic criteria of having local storage, a processor, a graphics coprocessor, and a compatible operating system.
Mini Computers are smaller than Micro Computers and are usually thin clients (which are computers that have a neural connection to a server / mainframe). They are usually employed by businesses becuase they are cheap and they have the processing power to tackle word processing, spreadsheet production, and presentation creation. Mainframe computers are in charge of providing this data at extremely high speeds through cloud networking, or through running an ethernet cable for speeds exceeding 50 GBps.
Super Computers are the fastest computer on the planet, and are usually lined up in rows that take up large rooms. These computers are usually stored like servers: on racks where they link up to other servers in order to quantify large amounts of data at extremely high speeds. These have lots of storage, but since storage isn't their primary use case, it isn't as much as a minframe computer, whose sole purpose is in fact storage and data networking.
Mainframe Computers are servers, and they hold data that is utilized by thin clients and and personnel at a business, or they are used to store massive amounts of data. Servers also act as a checkpoint, espeically networking / internet servers, where if you want to access a website, the website's servers need to access the search request for the specific URL and send you the output (the webpage). Mainframe computers do not have as much processing power as Super Computers, but they provide massive data storage options, which is their main purpose.
Answer:
computers can be classified into 4 types
mainframecomputer
minicomputer
supercomputer
microcomputer
The batteries on electric vehicles are recharged using electricity from either a wall socket or dedicated charging unit.
Answer:
true
Explanation:
If you want to notify the sender, you need to select the "Message contains sensitive content. " condition for this rule. Error details:
If you want to notify the sender, you need to select the "Message that contains sensitive content. The condition for this rule is to notify the sender and take action that requires the message that contains a data classification predicate.
What do you mean by Sensitive content?Sensitive content may be defined as anything that may significantly provoke a sense of offense to a reader or user, particularly in relation to religion, race, gender, politics, sexuality, disability, or vulgar language.
According to the context of this question, the error details for this condition are provided to the sender in order to notify. This notification will definitely consist of all sorts of terms and conditions that are classified on the basis of data classification predicate.
Therefore, the condition for this rule is to notify the sender and take action that requires the message that contains a data classification predicate.
To learn more about Error details, refer to the link:
https://brainly.com/question/14056040
#SPJ1
10. The technology used to weave patterns into cloth inspired the future creation of computer data storage and retrieval
True or false?!
You supect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?
We should use the DC volts multimeter setting.
Most modern multimeters do polarity detection automatically. It is not necessary for the black lead to touch the negative terminal or the red information to touch the positive terminal while measuring dc voltage. Just be aware that a negative symbol will appear in the display if the probes hit the opposite terminals. Red leads should always touch a positive terminal on an analog multimeter, while black leads should always touch a negative terminal. Otherwise, the meter will sustain damage. According to the function that has been chosen on the dial, modern DMMs default to Autorange. Press the RANGE button several times until the appropriate range is selected to select a specific fixed measurement range.
Know more about Multimeter here:
https://brainly.com/question/30809641
#SPJ4
For the execution of a successful information strategy, staff synchronization _____. (Select all that apply.) relies on informed commander's guidance begins at the execution phase of operations requires cross-talk and cross-representation breaks down staff planning into clearly defined major subsets integrates products does not impact actions, words, and images
For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance.
What is the above about?A successful information strategy, staff synchronization is one that depends on informed commander's guidance.
And as such, if one say that For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance. it is a true statement.
Learn more about information strategy from
https://brainly.com/question/8368767
#SPJ1
Where in OuickBooks Online Payroll can you approve time tracked in QuickBooks Time before running payroll? Payroll center > Overview tab > Approve time Gear icon > Payroll settings > Time > Approve time Payroll center > Time tab > Approve time Payroll center > Compliance tab > Approve time
In QuickBooks Online Payroll, the place where you can approve time tracked in QuickBooks Time before running payroll is the "Payroll center > Time tab > Approve time."
This option can be found in the Payroll Center section. To approve employee hours, follow these simple steps: Click on the Gear icon on the top right corner of your QuickBooks account and choose Payroll Settings. In the Payroll Settings window, click on Time from the left menu bar.
Then, click on the Approve Time option. Under the Approve Time page, select the employee whose time you want to approve for payroll. You can view the employee's name, total hours worked, and the number of hours in each pay period for each pay rate. Once you have reviewed the employee's hours, select the Approve button to approve their time for the current pay period and repeat the process for each employee. QuickBooks Online Payroll makes it easy for you to manage your employees' hours and make sure that payroll is accurate and efficient.
Know more about QuickBooks Online Payroll here:
https://brainly.com/question/32139674
#SPJ11
Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?
A frames
B. characters
C. key frames
D. movement
In what ways is the information provided by a line-item budget useful to the following:
Program manager
Department head
Central budget office
Elected officials
Citizens
How would one substantially address how this information is useful to each entity listed above.
A line-item budget provides useful information to program managers, department heads, central budget offices, elected officials, and citizens by offering a detailed breakdown of expenses, facilitating accountability, and enabling informed decision-making.
A line-item budget is a financial document that outlines specific expenditure categories and allocated amounts. It is useful to program managers as it allows them to track expenses and ensure that funds are allocated appropriately for their respective programs.
By providing a detailed breakdown of expenses, program managers can effectively manage their budgets, identify areas of overspending or underspending, and make necessary adjustments to optimize resource allocation.
For department heads, the information provided by a line-item budget is essential for monitoring and controlling departmental expenditures. It enables them to assess the financial health of their departments, identify cost-saving opportunities, and ensure compliance with budgetary guidelines.
With this information, department heads can make informed decisions regarding resource allocation, staffing, and program priorities.
Central budget offices rely on line-item budgets to consolidate and analyze financial data from various departments or programs. This information helps them establish a comprehensive overview of the organization's finances, identify trends, and develop long-term financial strategies.
Line-item budgets enable central budget offices to allocate funds strategically, align spending with organizational goals, and ensure efficient use of resources.
Elected officials, such as members of a legislative body or governing board, benefit from line-item budgets as they provide transparency and accountability. By reviewing the detailed breakdown of expenditures, elected officials can assess the effectiveness and efficiency of government programs or organizational initiatives. This information enables them to make informed decisions during budgetary discussions, prioritize funding for critical areas, and hold program managers and department heads accountable for their financial management.
Citizens also find value in the information provided by line-item budgets. It promotes transparency and allows them to understand how public funds are allocated and spent. By having access to a detailed breakdown of expenses, citizens can assess the priorities of their government or organization, hold elected officials accountable for budgetary decisions, and actively participate in discussions regarding resource allocation.
Overall, a line-item budget serves as a valuable tool for program managers, department heads, central budget offices, elected officials, and citizens. It offers a detailed breakdown of expenses, facilitates accountability, and enables informed decision-making, ultimately contributing to efficient resource allocation and effective financial management.
Learn more about line-item budget
brainly.com/question/32249432
#SPJ11
This is an image of the ...................... Topology. * If you get it right i will mark you brainlist
Answer:
Tree
Explanation:
What is a commerce platform?
Answer:
In basic terms, a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.
Answer:
Explanation:
a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.20 Feb 2017
I need an open response pleaseeeeeee
The format is "Describe the smart home devices impact of technology on education"
Answer:
Explanation:
Smart Home devices have had a large impact on education. It has allowed students of all ages to better understand the concept of interconnected devices and artificial intelligence. This alone has also opened up a new door of information by allowing for instant answers to question through such smart home devices as Alexa or Home. Which are artificial intelligence virtual assistants.
Please complete the following program according to the specification given. Partial credit will be given for incomplete answers, so provide as much of the answer as you can. Remember that all program segments are to be written in JAVA.
1.Write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.
Example
split(“1234”) prints: “1,2,3,4”
split(“Hi, Mr. Programmer!”) prints “H,i,,, , M,r,., P,r,o,g,r,a,m,m,e,r,!”
split(“”) prints “”
static public void split(String s) {
Using the knowledge in computational language in JAVA it is possible to write a code that write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.
Writting the code:import java.io.*;
public class Test
{
public static void main(String args[])
{
String Str = new String("Geeks-for-Geeks");
// Split above string in at-most two strings
for (String val: Str.split("-", 2))
System.out.println(val);
System.out.println("");
// Splits Str into all possible tokens
for (String val: Str.split("-"))
System.out.println(val);
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1