Answer:
option 1
Explanation:
it is because they need better security for operational
Answer:
operational continuity
operational profitability
operational security
Explanation:
the person who receives an e-mail
hlp plz...........,....
ANSWER ASAP!!!!!
Which statement best describes licensed characters?
A.
They are based on real-life characters from past periods in history.
B.
They are given human qualities, and star in games for young children.
C.
They are based on preexisting media.
D.
They are based on legend and folklore.
E.
They are characters specifically created for a game.
Answer:
my friend thinks its c
hes too smart to be wrong 100% :DDDD
Explanation:
In your opinion what do you think “digital freedom”means?
Answer:
umm i think secure websites and privacy
Explanation: I guessed
Answer:
digital freedom in my opinion is being digataly free like not being moderated every time you flipping answer somthing
Explanation:
(all hale eggplant god
PLS HELP MEE!!!
Which characterization would accurately describe hump notation?
1. starting with uppercase letters, followed by the underscore and dollar sign
2. starting with lowercase letters, followed by an underscore, and followed by lowercase
3. starting with lowercase letters, using uppercase letters for the first letter in a new word
4. starting with a dollar sign, using lowercase for the remaining parts of each word
Answer:
starting with lowercase letters, using uppercase letters for the first letter in a new word
Explanation:
starting with a dollar sign, using lowercase for the remaining parts of each word
Culinary Arts simply means the art of
(7 Letters)
Answer:
I believe it means C-o-o-k-i-n-g (7 letters)
Explanation:
Answer:
C-O-O-K-I-N-G
Explanation: I got this one correct pls mark as brainliest
What will be printed if the below code is run?
1. a = "123"
2. b = “456"
3. a = b + "123"
4. b = a
5. print (b + a)
Answer:
What will be printed if the below code is run?
1. a = "123"
2. b = “456"
3. a = b + "123"
4. b = a
5. print (b + a)
HELP ME ASAP
Use the drop-down menus to explain how to turn off meeting responses.
Meeting responses can be turned off to save room in the email inbox from large numbers of
Turning off meeting responses will disable the command
Answer:
1 replies 2 tracking
Explanation:
edge
Answer:
replies, tracking
Explanation:
A. RHYTHM
B. HARMONY
C. INFORMAL BALANCE
D. FORMAL BALANCE
E. PROPOTION
F. REPETITION
G. EMPHASIS
H.GRADIATION
I. BALANCE
G.RADIATION
1. It is a type of balance when the structure decoration and
accessories are different both sides from the center of the design.
2. These are smooth movement repeated again and again
3. It is a type of rhythm in which the eyes can move easily from
one part to the other on the small lines created by gathers
4. It a
principle of design in which from the center of the dress the
design should be identified on both sides.
5. It is a type of rhythm in which the parallel lines are formed by the
use of seams, lace, etc. which helps uninterrupted eye movement
6. It is a type of rhythm can be created by gradual change of lines,
shape or shade of the color
7. It is a type of balance shown when pants have pockets on both
sides with the same style, size and shape
8 It refers to a principle of design in which a large hat on a small
boy is out of proportion to his size.
9. It is a principle of design when a pretty collar, an attractive bow
bow or a lovely pin are observed
10. It is a relationship of different portion of a dress
Answer:
1. Informal balance.
2. Rhythm.
3. Radiation.
4. Balance.
5. Repetition.
6. Gradation.
7. Formal balance.
8. Proportion.
9. Emphasis.
10. Harmony.
Explanation:
Principles of designs can be defined as concepts which are typically used for organizing or arranging the structural
elements of a design. Thus, the ways in which these principles are applied generally affects the message of a piece of work.
1. Informal balance: It is a type of balance when the structure decoration and accessories are different both sides from the center of the design.
2. Rhythm: These are smooth movement repeated again and again
3. Radiation: It is a type of rhythm in which the eyes can move easily from one part to the other on the small lines created by gathers
4. Balance: It is a principle of design in which from the center of the dress the
design should be identified on both sides.
5. Repetition: It is a type of rhythm in which the parallel lines are formed by the use of seams, lace, etc. which helps uninterrupted eye movement
6. Gradation: It is a type of rhythm that can be created by gradual change of lines, shape or shade of the color
7. Formal balance: It is a type of balance shown when pants have pockets on both sides with the same style, size and shape.
8. Proportion: It refers to a principle of design in which a large hat on a small boy is out of proportion to his size.
9. Emphasis: It is a principle of design when a pretty collar, an attractive bow or a lovely pin are observed.
10. Harmony: It is a relationship of different portion of a dress.
20 POINTS!!! I NEED HELPP
Answer:
Apple
Explanation:
Answer:
Windows Internet Explorer
because windows is aka microsoft windows
Which is a type of intellectual property law? Select 4 options.
copyright
brand
patent
trademark
trade secret
TRADE SECRETS
Trade secrets refer to specific, private information that is important to a business because it gives the business a competitive advantage in its marketplace. If a trade secret is acquired by another company, it could harm the original holder.
Examples of trade secrets include recipes for certain foods and beverages (like Mrs. Fields’ cookies or Sprite), new inventions, software, processes, and even different marketing strategies.
When a person or business holds a trade secret protection, others cannot copy or steal the idea. In order to establish information as a “trade secret,” and to incur the legal protections associated with trade secrets, businesses must actively behave in a manner that demonstrates their desire to protect the information.
Trade secrets are protected without official registration; however, an owner of a trade secret whose rights are breached–i.e. someone steals their trade secret–may ask a court to ask against that individual and prevent them from using the trade secret.
PATENTS
As defined by the U.S. Patent and Trademark Office (USPTO), a patent is a type of limited-duration protection that can be used to protect inventions (or discoveries) that are new, non-obvious, and useful, such a new process, machine, article of manufacture, or composition of matter.
When a property owner holds a patent, others are prevented, under law, from offering for sale, making, or using the product.
COPYRIGHTS
Copyrights and patents are not the same things, although they are often confused. A copyright is a type of intellectual property protection that protects original works of authorship, which might include literary works, music, art, and more. Today, copyrights also protect computer software and architecture.
Copyright protections are automatic; once you create something, it is yours. However, if your rights under copyright protections are infringed and you wish to file a lawsuit, then registration of your copyright will be necessary.
TRADEMARKS
Finally, the fourth type of intellectual property protection is a trademark protection. Remember, patents are used to protect inventions and discoveries and copyrights are used to protect expressions of ideas and creations, like art and writing.
Trademarks, then, refer to phrases, words, or symbols that distinguish the source of a product or services of one party from another. For example, the Nike symbol–which nearly all could easily recognize and identify–is a type of trademark.
While patents and copyrights can expire, trademark rights come from the use of the trademark, and therefore can be held indefinitely. Like a copyright, registration of a trademark is not required, but registering can offer additional advantages.
Answer:
C.
trade secrets
Explanation:
Sincerely : Baby weeb
it connects computers in different cities and different countries
Answer:
I think VPN firewall devices can do that.
Tema: LA CIENCIA Y SUS APORTES AL MEJORAMIENTOO TÉCNICO SEGUNDO GRADO SECUNDARIA 1.¿Cuál es el inicio de los procesos técnicos y científicos? 2. En la actualidad ¿ De que están hechas la mayoría de las construcciones? 3.¿Que material usaron en la construcción de sus pirámides de los teotihuacanos? 4.Este material de construcción es artesanal, no contamina, es térmico y está hecho con tierra y paja.
Answer:
1. El inicio de los procesos técnicos y científicos es la realización de observaciones objetivas y basadas en hechos previos o recurrentes y verificables como verdaderas o falsas por otros observadores.
2. La mayoría de los edificios de hoy en día están hechos de hormigón que consiste en cemento adherido en una proporción fija con agregados, que se pueden moldear en la forma deseada cuando se convierten en una lechada. El agua del proceso de poro se evapora fácilmente y el hormigón se seca después de varios días para formar una estructura sólida de la forma deseada.
3. El material utilizado en la construcción de las pirámides de Teotihuacanos incluye una roca volcánica, conocida como tezontle tallada
4. Un material de construcción artesanal que no contamina, es térmico y está hecho con tierra y paja es el adobe
Un adobe consiste en una mezcla de paja, arena y arcilla, así como otros materiales fibrosos que se secan al sol después de moldear la mezcla en ladrillos.
Un adobe tiene una alta capacidad calorífica y, por lo tanto, una habitación con paredes de adobe se mantiene fresca en climas cálidos, mientras que en climas fríos, la pared de adobe libera calor lentamente para mantener la habitación caliente
Explanation:
Acredit given to an author for his or her work is called a(n)
citation.
copyright.
evaluation.
permission.
The answers is catation. I think it is right sorry if it is not
Answer:
The answer is Citation because it's the credit given to any author
Discuss two business information systems that are used in two different sectors in a modern economy.
Explanation:
Two business information systems that are used in two different sectors in a modern economy are:
Transaction Processing System (TPS):
The Transaction Processing System (TPS) is a type of data system for capturing, storing, updating and recovering a company's data operations. Transaction systems often try to provide consistent response times to requests even if this is not as important as in real-time systems.
Management Information System (MIS)
MIS is the study of persons, technological systems and associations between them. Management Information Systems (MIS) Professionals at MIS allow businesses to profit maximally from staff, facilities and business process expenditure. MIS is a field of people with a focus on technological support.
HELP ASAP
What can be created to handle large numbers of meeting responses?
a task
an event
a new rule
a calendar
Answer:
a new rule
Explanation:
Sending meeting invitations, updates and receiving responses generates many messages.
And for this reason we create a rule that filters all meeting related messages to a specific folder and handles a large number of meeting responses.
I need anyone's help so please do so!
Do some research online about plasmapheresis. Then write a paragraph explaining what it is and in what kind of situation it would be useful to a patient.
During which phase of the writing process is it best to have other
people review your document
O Pre-writing
O Drafting
Revising
O Publishing
Answer:
the answer should be Revising
What is used to see the fine details of
graphics on a screen
Answer:
graphics card
Explanation:
acess labeling windows
Answer:
I got the same thing
Explanation:
behave online in the same way as you wish to be treated true false
True; you have treat others the way you want to be treated. It is the golden rule for meeting anyone, whether it's online or in real life. If you were being mean to someone online, would you want someone to be mean to you the same way you were mean to that person? So, the answer is true.
state 4 error checking methofds for data transmition
Answer:
parity bits
CRC
MD5 hash
SHA256 hash
Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character from Riverdale
Answer:
I have watched it before
Answer:
my fav is veronica lol
Explanation:
how can online presence help others?
Answer:
Online Presence helps others who might be naturally introverted, stuck in a precarious situation, or even by allowing someone company who desperately needs it.
Explanation:
What is the theory of relativity? How does it relate to the creation of electricity through solar energy?
Answer and Explanation:
The theory of relativity applies to all physical phenomena in the absence of gravity and explains the law of gravitation and relation to nature's force. Solar energy is regarded as the power source of the future and uses sunlight to generate electricity. It is a potential solution to the ongoing environmental problem and caused by the overuse of Earth resources. Solar energy is a power source and widely used by the scientific community. It is a potential solution to the environmental problems caused by Earth resources and high fossil fuel conception. The theory of relativity proposes a fundamental and straightforward presentation of fission with some application. Some characteristics of solar energy produced from the fusion process and deducted from the same equation. Relativity determined physics law for all non-accelerating observers and showed the speed of light within a vacuum. Space and time were interwoven in the single continuum.
which tool is used to select adjacent areas of the same colour in an image.
Answer:
Magic wand tool
Hope it helps
Please mark me as the brainliest
Thank you
What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check digit d)consistency check
Answer:
a) range check
Explanation:
Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.
Basically, there are five (5) main validation methods and these includes;
I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.
II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.
III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.
IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.
V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.
Hence, range check is a validation type you would use to check that numbers fell within a certain range.
For example, 0 < x > 1000 is a range check.
I am doing a inquiry task for A.I. taking over coding I need answer for in the coding industry be ok with A.I. taking over their job. Any links to webs pages like this would be useful too
Answer:
hi! How are you? I’m sorry I really need points, but I hope you find the answer soon tho <3
Explanation:
Which of these is a way of making applications less vulnerable to hacking?
make Deny the default
make Allow the default
apply the principle of greatest privilege
have a single point of defense
Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
Answer:
Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.
La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.