1 _ A Unit of information containing the object's position: rotation, and scale values is called:
an inform
a transform
a coaxts
a blueprint

Answers

Answer 1

Answer:

an inform

Explanation:

A information is an inform

Answer 2

A Unit of information containing the object's position: rotation, and scale values is called an inform. Hence, option A is correct.

What is Unit of information?

To describe the size of data, decimal units like kilobyte (KB), megabyte (MB), and gigabyte (GB) are frequently employed. Kibibyte (KiB), mebibyte (MiB), and gibibyte are examples of binary units of measurement (GiB).

Yotta is the largest prefix recognized by the SI, mostly because no necessity exists for a larger prefix at this time. However, there are still additional unapproved units in existence. One of the most well-known is the brontobyte, for instance. An average brontobyte is 1,024 YB.

In both computing and digital communications, the bit is the most fundamental unit of information. The word is a combination of two binary digits. A logical state with one of two potential values is represented by the bit.

Thus, option A is correct.

For more information about Unit of information, click here:

https://brainly.com/question/15087301

#SPJ6


Related Questions

Which addresses identify a computer on the network?

Answers

There are two addresses that identify a computer on the network, which are the MAC address and the IP address.

A Media Access Control address is a unique identifier that is assigned to a computer's network interface controller for communication on the physical network. The MAC address is a 48-bit address that is permanently embedded into the hardware, which means it cannot be changed.An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two primary functions: identifying the host or network interface and providing the location of the host in the network.

The IP address is a 32-bit address that is typically dynamically assigned by a network administrator or a Dynamic Host Configuration Protocol (DHCP) server. However, it is possible to use a static IP address that is permanently assigned to a computer by a network administrator or user.Difference between IP address and MAC addressAn IP address is used to connect to the internet while a MAC address is used for identification purposes on a network.The MAC address is used to determine the unique device that is sending or receiving data on a network, while the IP address is used to locate and communicate with a specific device over a network.Therefore, both MAC and IP addresses are necessary for a computer to connect to and communicate on a network.

For such more questions on MAC address:

brainly.com/question/13267309

#SPJ11

Decide whether each example is representative of a paid app or a free app.

Monthly subscription for access: Paid app or free app

In app advertisements: Paid app or free app

Charge for upgrades only: Paid app or free app

Advance charge for download: Paid app or free app

Answers

1. Paid, you are paying to have access to the application

2. Free, the ads help pay for the application to be available on the store for free

3. Free app, you are not paying to use the app, but parts are paywalled

4. Paid? I am a beginning developer and I have never heard of paying extra just to download an app before...

Your school is hosting a diving contest, and they need a programmer to work on the scoreboard! Your job is to calculate each diver's total after the three judges hold up their individual scores. Write the function calculate_score which takes a tuple of three numbers from 0 to 10 and calculates the sum. A perfect dive is worth 30 points, a belly flop is worth 0. For example: calculate_score((10, 10, 10)) # => 30 calculate_score((9, 9, 6)) # => 24

Answers

Answer:

def calculate_score(setss):

    num1, num2, num3= setss

    if num1 >= 0 and num1 <=10 and num2>= 0 and num2<=10 and num3>= 0 and num3<=10:

         print(num1+ num2+num3)

    else:

         print("Out of range")

Explanation:

I've added the full source code as an attachment, where I used comments as explanation

the thanksgiving attack on san francisco was an example of what kind of cyber attack?

Answers

An example of a ransomware cyber attack was the Thanksgiving Day assault in San Francisco.

What does a targeted cyber attack look like?

The Spear-phishing is a type of targeted attack in which emails are sent to specific recipients and may contain links or the attachments that download dangerous software. using a botnet to launch a DDOS assault.

What are some instances of active attacks?

An assault on the authentication procedure in which the attacker sends data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Man-in-the-middle (MitM), impersonation, and session hijacking are a few examples of ongoing attacks.

To know more about cyber attack visit:-

https://brainly.com/question/28270451

#SPJ4

In the TV special ' How the Grinch Stole Christmas,' what three words best describe the Grinch?

Answers

Answer:

Stink, Stank, Stunk!

Explanation:

explain any five features of a spread sheet application​

Answers

The basic features of a spreadsheet program are :

Grids, Rows & Columns. A spreadsheet consists of a grid of columns and rows.

Functions. Functions are used in the Spreadsheet software to evaluate values and perform different kinds of operations.

Formulas.

Commands.

Text Manipulation.

Printing.

Title Bar.

Menu Bar

Hope u understood!

pls mark me brainliest!

#staysafestayhome

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

Please draw a graph that shows the supply and demand in the market of smartphones. Moreover, please draw a graph that shows the supply and demand in the market of regular cell phones. Show what happens when rising raw material prices make it costlier to produce regular cell phones. Furthermore, show what happens to the market for smartphones.

Answers

The graph of supply and demand in the market for smartphones shows the equilibrium price and quantity where the supply and demand curves intersect.

When rising raw material prices make it costlier to produce regular cell phones, the supply curve for regular cell phones shifts leftward, resulting in a higher equilibrium price and a lower quantity supplied. This increase in the cost of regular cell phones may lead consumers to shift their demand towards smartphones, causing an increase in the demand for smartphones and potentially driving up their equilibrium price and quantity.

In the market for smartphones, the graph of supply and demand shows the equilibrium point where the supply and demand curves intersect. The vertical axis represents price, and the horizontal axis represents quantity. The supply curve slopes upward from left to right, indicating that as the price of smartphones increases, suppliers are willing to produce and supply more of them. The demand curve slopes downward from left to right, indicating that as the price of smartphones decreases, consumers are willing to demand and purchase more of them. The point where the supply and demand curves intersect represents the equilibrium price and quantity, where the quantity supplied matches the quantity demanded.

When rising raw material prices make it costlier to produce regular cell phones, the supply curve for regular cell phones shifts leftward. This means that at any given price level, suppliers are willing to produce and supply a lower quantity of regular cell phones. As a result, the equilibrium price for regular cell phones increases, and the equilibrium quantity decreases.

The increase in the cost of regular cell phones may lead consumers to shift their demand towards smartphones. As consumers find regular cell phones more expensive, they may prefer to purchase smartphones instead. This shift in consumer preference increases the demand for smartphones. Consequently, the demand curve for smartphones shifts rightward, indicating that consumers are willing to demand and purchase a higher quantity of smartphones at any given price level. The increase in demand for smartphones may lead to an increase in their equilibrium price and quantity.

Overall, the increase in raw material prices for regular cell phones impacts both the supply and demand in the market. The decrease in the supply of regular cell phones and the potential increase in the demand for smartphones can result in changes in their respective equilibrium prices and quantities.

Learn more about   market here: https://brainly.com/question/30699183

#SPJ11

Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?

Jamal plugged his new touchpad device into the USB port. He keeps getting a message that says that the device is not recognized.
Felicia lost the driver CD for her new monitor. She can’t install the monitor without the correct driver.
Credence just recently changed from a Windows computer to a Mac. His Bluetooth headphones worked fine on the Windows computer but they won’t connect on the new computer.

Answers

Answer:

The general answer for three problem is go to the company to download the latest driver, you can also download drivers via operating systems...

1) Update windows and check your drivers,

2) If monitor driver still missing then go the the companies website and download the monitors and usb driver from there.

If the USB port is part of the motherboard then you may download the USB port driver from that motherboard company...

Regarding the change from windows to Mac, check if OS support that Bluetooth product, in general one should be able to find the required drivers either by updating OS or contacting the drivers providers via their website...

To fix a  code on USB, one can Uninstall and then try to reinstall the drivers again for the device.

Why do I keep getting USB device not seen?

The issue where your USB port is not seeing your device is largely due to the USB cord.

Not that when you use an inferior cord, your system may not see it but if the cord is a standard one, then it can be seen by the system. Another may be due to the fact that the USB driver is unstable or corrupt. Try and update your PC and see what happens then.

Learn more about computer setups from

https://brainly.com/question/14364696

The window snipping tool will let you take a screenshot of any part of the screen true or false

Answers

Answer:

True

Explanation:

Answer:

true

Explanation:

it is supposed to take screenshots of your screen.

1. Write a String constant that is the empty string .
2. Assume that message is a String variable . Write a statement to display its value on standard output .
3.Given a String variable word , write a String expression that parenthesizes the value of word . So, if word contains "sadly", the value of the expression would be the String "(sadly)"

Answers

1. Code String constant that is the empty string="";*************************** 2. A statement on standard output is System.out.println(message) 3. String expression that parenthesizes the value of word is "("+word+")".

What does Java's string class do?

Character strings are represented by the String class. Java applications implement all string literals as instances of this class, including "abc." Strings are immutable; once they are generated, their values cannot be altered. Mutable strings are supported via string buffers.

What is a string's function in Java?

In Java, a string is an object that represents different character values. Each letter in the string is represented by a unique character value in the Java string object. Java uses the char class to represent characters. A user-entered array of char values will have the same significance as a string.

To know more about String visit-

brainly.com/question/13262184

#SPJ4

Code String constant "";***************************; the empty string 2. The usual output statement is System.out.println(message). 3. The string expression "("+word+")" parenthesizes the value of the word.

The String class represents character strings. Java programs implement this class as an instance for each string literal, including "abc." Strings are immutable; their values cannot be changed after they have been formed. String buffers can handle mutable strings.

A string is an object that represents various character values in Java. The Java string object's representation of each letter in the string uses a different character value. The char class is used by Java to represent characters. An array of char values supplied by the user will have the same importance as a string.

Learn more about Java string here:

https://brainly.com/question/13262184

#SPJ6

A Question 1 (3 points) Retake question Listen ▶ Lyrics, melodies and underlying musical notes all refer to the.... sound recording copyright music copyright master recording mechanical license

Answers

Lyrics, melodies, and underlying musical notes all refer to the music copyright.

Copyright is the legal right that belongs to an artist, publisher, or producer to be the sole user of a literary, musical, dramatic, or artistic work. Copyright laws grant creators of original works exclusive rights to the use, distribution, and display of their works. Copyright infringement happens when someone uses a creative work without the owner's permission.

In the context of music, the term "copyright" refers to the protection provided to original songs and music compositions. Lyrics and musical notes that make up a song are both protected by copyright. This means that anyone who wishes to use, record, or reproduce the song or composition must first acquire the necessary rights or licenses.

The mechanical license, master recording, and sound recording copyright are all related to the music industry and refer to different types of licenses and rights granted to music producers, artists, and copyright owners.

The mechanical license is granted to anyone who wants to create a cover or new version of a song. The master recording refers to the final version of a song that is used for commercial purposes, and the sound recording copyright refers to the protection provided to the sound recording of a song or musical composition.

To learn about copyright here:

https://brainly.com/question/357686

#SPJ11

write an sql query for the following: find the names of companies which have employees living in lincoln and omaha. (meaning of this query: for each company appears in the result, it must have some employees live in lincoln, and some other employees liv in omaha. if a company only has employees live in one of these two cities, not both, then it should not be included in the result.)

Answers

SQL Queries: SELECT CompanyName FROM Companies WHERE CompanyID IN (SELECT CompanyID FROM Employees WHERE City IN ('Lincoln','Omaha') GROUP BY CompanyName HAVING COUNT(DISTINCT City)=2;

What is SQL Queries?

SQL Queries are special programming language used to communicate with databases. It is used for data manipulation and retrieval. SQL stands for Structured Query Language and is a standard language for interacting with databases. It is used to access and manage data in relational database management systems (RDMS) like MySQL, Oracle, SQL Server, and others. SQL Queries allow us to query a database, create and modify tables and records, and manage the data stored in the database.

To know more about SQL Queries

brainly.com/question/25694408

#SPJ4

Jamf Pro allows navigation through keyboard shortcuts.
a) True
b) False

Answers

Answer : True. Jamf Pro allows navigation through keyboard shortcuts, making it more efficient and user-friendly., the list of available keyboard shortcuts can be used to quickly reference any commands you may have forgotten or are not familiar with.

The nano editor keyboard shortcut that displays help text, including a list of all keyboard shortcuts, is Ctrl + G.

This will bring up a list of all available keyboard shortcuts within the nano editor, allowing you to quickly and easily access the help text and find the shortcut you need.

The Ctrl + G keyboard shortcut is a helpful tool for navigating the nano editor. By pressing this shortcut, you can quickly access a list of all available keyboard shortcuts, which can then be used to access helpful text, find commands quickly, and move through the nano editor more efficiently. the list of available keyboard shortcuts can be used to quickly reference any commands you may have forgotten or are not familiar with.

Learn more about keyboard shortcuts here

https://brainly.com/question/31018449

#SPJ11

which type of vpn connects using the transport layer security (tls) feature?

Answers

A VPN that uses the transport layer security (TLS) feature is typically referred to as an SSL VPN. SSL VPNs use the same encryption protocol (TLS) that is commonly used to secure websites and online transactions.

This type of VPN allows remote users to securely access resources on a network without requiring specialized client software. SSL VPNs are generally considered more secure than other VPN types, such as PPTP and L2TP/IPsec, because they provide end-to-end encryption and are not susceptible to certain types of attacks. In short, SSL VPNs are a good option for organizations that need a secure and flexible remote access solution.


A type of VPN that connects using the Transport Layer Security (TLS) feature is called SSL VPN (Secure Sockets Layer VPN). SSL VPNs use TLS to establish secure connections and encrypt data transmitted over the network, ensuring privacy and data integrity.

To know more about VPN visit:-

https://brainly.com/question/28945467

#SPJ11

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

A piece of copper metal is initially at 100.0 ∘
C. It is dropped into a coffee cup calorimeter containing 50.0 g of water at a temperature of 20.0 ∘
C. after stirring, the final temperature of both copper and water is 25.0 ∘
C. Assuming no heat losses, and that the specific heat of water is 4.18 J/g 0
C, what is the heat capacity of the copper? none of these choices is correct 2.79 13.9 3.33 209

Answers

To find the heat capacity of the copper, we can use the principle of heat transfer. The heat lost by the copper is equal to the heat gained by the water.

First, we need to calculate the heat gained by the water using the formula:

Q = m * c * ΔT

Where:

Q is the heat gained by the water

m is the mass of the water (50.0 g)

c is the specific heat of water (4.18 J/g°C)

ΔT is the change in temperature of the water (final temperature - initial temperature)

ΔT = 25.0°C - 20.0°C = 5.0°C

Q = 50.0 g * 4.18 J/g°C * 5.0°C = 1045 J

Since the heat lost by the copper is equal to the heat gained by the water, the heat capacity of the copper can be calculated as:

Q = m * c * ΔT

Rearranging the equation, we get:

Copper heat capacity = Q / ΔT = 1045 J / 5.0°C = 209 J/°C

Therefore, the heat capacity of the copper is 209 J/°C.

To know more about heat transfer visit-

https://brainly.com/question/31778162?referrer=searchResults

#SPJ11

2.3 pseudocode exercise on edhesive

Answers

Answer:

a=int(input("Enter a numerator: "))

b=int(input("Enter a divisor: "))

quotient=a/b

remainder=a%b

print("Quotient is: " + str(int(quotient)))

print("Remainder is: " + str(int(remainder)))

That's 2.3 question 1

a_ft = int(input("Enter the Feet: "))

a_inc = int(input("Enter the Inches: "))

b_ft = int(input("Enter the Feet: "))

b_inc = int(input("Enter the Inches: "))

sum_inc = a_inc + b_inc

# select the whole and the fractional part

inc_to_ft = sum_inc // 12

rem_from_div = sum_inc % 12

sum_ft = a_ft + b_ft + inc_to_ft

print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))

That's 2.3 question 2

Explanation:

I wasn't sure which one you needed so I added both.

Think of a binary communication channel. It carries two types of signals denoted as 0 and 1. The noise in the system occurs when a transmitted 0 is received as a 1 and a transmitted 1 is received as a 0. For a given channel, assume the probability of transmitted 0 correctly being received is 0.95 = P(R0 I T0) and the probability of transmitted 1 correctly being received is 0.90 = P(R1 I T1). Also, the probability of transmitting a 0 is 0.45= P(T0). If a signal is sent, determine the
a. Probability that a 1 is received, P(R1)
b. Probability that a 0 is received, P(R0)
c. Probability that a 1 was transmitted given that a 1 was received
d. Probability that a 0 was transmitted given that a 0 was received
e. Probability of an error

Answers

The probability that a 1 is received, P(R1), is 0.1.The probability that a 0 is received, P(R0), is 0.55.The probability that a 1 was transmitted given that a 1 was received is 0.8182 (approximately).The probability that a 0 was transmitted given that a 0 was received is 0.8936 (approximately).The probability of an error is 0.1564 (approximately).

In a binary communication channel, we are given the probabilities of correctly receiving a transmitted 0 and 1, as well as the probability of transmitting a 0.

a. To determine the probability of receiving a 1, we subtract the probability of receiving a 0 (0.45) from 1, resulting in P(R1) = 1 - P(R0) = 1 - 0.45 = 0.55.

b. To determine the probability of receiving a 0, we use the given probability of transmitted 0 correctly being received: P(R0 I T0) = 0.95. Since P(R0 I T0) is the complement of the error probability, we have P(R0) = 1 - P(error) = 1 - 0.05 = 0.55.

c. The probability that a 1 was transmitted given that a 1 was received is determined using Bayes' theorem: P(T1 I R1) = (P(R1 I T1) * P(T1)) / P(R1). Substituting the given values, we have P(T1 I R1) = (0.9 * 0.55) / 0.55 = 0.9.

d. Similarly, the probability that a 0 was transmitted given that a 0 was received is determined using Bayes' theorem: P(T0 I R0) = (P(R0 I T0) * P(T0)) / P(R0). Substituting the given values, we have P(T0 I R0) = (0.95 * 0.45) / 0.55 = 0.8936 (approximately).

e. The probability of an error is calculated as the sum of the probabilities of receiving the incorrect signal for both 0 and 1: P(error) = 1 - P(R0 I T0) + 1 - P(R1 I T1) = 1 - 0.95 + 1 - 0.9 = 0.05 + 0.1 = 0.1564 (approximately).

In summary, we determined the probabilities of receiving 1 and 0, the conditional probabilities of transmitted signals given the received signals, and the probability of an error for the given binary communication channel.

Learn more about Probability

brainly.com/question/31828911

#SPJ11

Complete the sentence.
A computer consists of two or more computers connected to each other.


network
switch
server
router

Answers

Answer:

its a network

Explanation:

that is how it is called

Wii or Kinect sports games may provide _____ recreation to help stroke and injury victims recover faster. Smartphones often come with scaled-down versions of games such as _____ to introduce games to users. Role-playing, action, educational, and simulations are examples of computer and video game _____. Head-mounted displays often use organic light emitting diode, or _____, technology. Windows and Apple offer_____ , which contain tools for creating 2-D and 3-D drawings, game-playing interfaces, and multiplayer control.

Answers

Answer:

Therapeutic

Angry Birds

Subcategories

OLED

SDKs

Explanation:

Wii or Kinect sports games may provide Therapeutic recreation to help stroke and injury victims recover faster. Smartphones often come with scaled-down versions of games such as Angry Birds to introduce games to users. Role-playing, action, educational, and simulations are examples of computer and video game Subcategories. Head-mounted displays often use organic light emitting diode, or OLED, technology. Windows and Apple offer SDKs , which contain tools for creating 2-D and 3-D drawings, game-playing interfaces, and multiplayer control.

which type of program is called maintenance program

Answers

The maintenance program is the method of altering software or program after delivery to perform any of these results:

Correct errors

Improve performance

Add functionalities

Remove obsolete portions

What is a Maintenance program?The maintenance program is a record containing the supervision requirements/tasks that ought to be brought out on an aircraft to provide its continuing airworthiness. Maintenance programs and plans will give a list of assignments, with breaks repeated in units of flight hours, flight cycles, or calendar time. These will be selected according to a hard time, On-condition, or Condition monitoring standards. The operator will use an upkeep plan to suit its processes, based on either a Block (Pyramid) system or Equalised (Progressive) system.The purpose of maintenance is to guarantee the highest efficiency and availability of production tools and protection for the circumstances.

To learn more about the Maintenance program, refer:

https://brainly.com/question/21047147

#SPJ9

In which phase of the ethical hacking methodology would a hacker be expected to discover available targets on a network

Answers

Answer:

Scanning and enumeration.

Explanation:

In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.

The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.

Professional communication is______
and enhances our credibility
verbose and polite

polite and curt
quick and civil
polite and civil

Answers

Answer:

polite and civil

Explanation:

got it right on edge GL

Professional communication is polite and civil and enhances our credibility. The correct option is D.

What is professional communication?

Professional communication is done between professionals. These communications involve specific and professional words. Like a doctor, use  a specific names of medicines and procedures which are unknown to common people.

Polite and civil are the manners which should be used when talking to someone, it shows our culture and behavior. Politeness can give you what you want from someone. It also improves relationships with others.

To make conservation civil or positive, we should use polite behavior. It shows a good attitude and makes the environment positive. We should act courteously if we want to make preservation civil or affirmative. It exudes positivity and fosters good surroundings.

Thus, the correct option is D. polite and civil.

To learn more about professional communication, refer to the link:

https://brainly.com/question/26696199

#SPJ5

1. after you have entered a charge for procedure code 99393, you realize it should have been 99394. what should you do?

Answers

After you have entered a charge for procedure code 99393, edit the procedure in the Transaction Entry dialog box by the following steps:

a. Choose the chart and case numbers for the transaction in the Transaction Entry dialogue box.

b. Track down the fraudulent transaction.

c. Select the action field.

d. Make the required adjustment.

e. Select "Save Transactions" from the menu.

The most common kind of business event for which an accountant would record an accounting entry is a transaction entry. The recording of an invoice to a client, an invoice from a supplier, the receipt of money, and the acquisition of a fixed asset are examples of accounting transactions.

Here are some examples of transactions: paying a supplier for products or services received. purchasing a property that was previously owned by a seller by paying the seller with cash and a note. remuneration for hours worked.

Learn more about transaction:

https://brainly.com/question/28059483

#SPJ4

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

How can I learn programming in mobile?​

Answers

Answer:

You sadly cannot use your coding knowledge to complete things on mobile, but you can learn through YouTuube and Gooogle and such, and simple type it out in Gooogle docs or something. There are sadly no mobile friendly coding websites.

Hope This Helped!

Which of the following numeric values is considered a floating point?
A. 16
B. -16
C. 1.6
D. 160

Answers

Explanation:

B.-16

Because the things is that idk

46. The public information _______________ includes the types of information to be distributed, the procedures for distributing information, procedures for updating or correcting information, and a method for allowing the public to express concerns or questions.

Answers

Answer:

the public information cycle or system

A dietician wishes to mix two types of foods in such a way that the vitamin content of the mixture contains at least "m" units of vitamin A and "n" units of vitamin C. Food "I"
contains 2 units/kg of vitamin A and 1 unit/kg of vitamin C. Food "I" contains 1 unit per kg of vitamin A and 2 units per kg of vitamin C. It costs S50 per kg to purchase food "I"
and $70 per kg to purchase food "I". Formulate this as a linear programming problem and find the minimum cost of such a mixture if it is known that the solution occurs at a
corner point (x = 38, y = 19).

Answers

Here is the linear programming problem formulation:

Minimize:

Cost = 50x + 70y

Subject to:

2x + y >= m

x + 2y >= n

x >= 0

y >= 0

How to explain the information

The objective function is to minimize the cost of the mixture, which is equal to the cost of food "I" per kg (50) times the amount of food "I" used (x) plus the cost of food "II" per kg (70) times the amount of food "II" used (y).

The constraints are:

The mixture must contain at least m units of vitamin A.

The mixture must contain at least n units of vitamin C.

The amount of food "I" used must be non-negative.

The amount of food "II" used must be non-negative.

The solution occurs at the corner point (x = 38, y = 19) means that 38 kg of food "I" and 19 kg of food "II" are used to create the mixture. The cost of this mixture is 50 * 38 + 70 * 19 = $2510.

Learn more about linear programming on

https://brainly.com/question/14309521

#SPJ4

Other Questions
The opportunity cost of an action is the: Multiple Choice None of the statements associated with this question are correct. monetary payment the action required. value of the most highly valued alternative action given up. cost of all alternative actions that could have been taken. A theme park has a ride that is located in a sphere. The ride goes around the widest circle of the sphere which has a circumference of 527.52 yd. What is the surface area of the sphere? URGENT! To what extent do the issues of the Gilded Age resemble the issues plaguing America today. Please cite at least 5 examples connecting the two eras. The author most likely uses the example in Lines 1-9 of the passage ("Americans'internet") to highlight the A recent increase in online security threats B worries that people have about protecting their privacy online. C frequency with which people visit online retailers. D different steps that people can take to protect their online privacy . which of the following is an appropriate policy for the fed to pursue if it wants to increase the money supply? group of answer choices raise the reserve requirement raise the discount rate buy u.s. treasury bills lower taxes Find the amount of degrees in x, if the three angles of a triangle are 2x, 2x, and 32 degrees. cul es la masa mxima que puede tolerar un soporte de nevera si el fabricante informa que wu producto resiste una fuerza o pes mximo de 686N.encontrar el resultado en unidades de SI The emotions and thoughts of a viewer add to the overall experience of viewing an artwork. What is this experience called? Q2/ A double-section centrifugal pump supplies 0.2 m/s of water which inter axially to the pump. The delivered head is 40 m. This pump operates with 2500 rpm. Impeller has backward curved blades with outlet relative velocity angle of -60. The blades are 36 mm in depth at the outlet. Calculate (a) outlet flow angle (b) overall efficiency (c) mechanical efficiency. (d) if the impeller radii ratio is 2.35 and inlet radii ratio is 2.1, determine the relative velocity angle at the inlet. flow rate m 0.84 75,19 Which condition can increase a plant's rate of transpiration Assume now that there is no change in inflation, but market risk premium increases by 1%. What is WCE's required rate of return now? Do not round intermediate calculations. Round your answer to two decimal placesrRF = 5%; rM = 7%; RPM = 2%, and beta = 1.2 a polysome consists of multiple _____________ bound to a single mrna. group of answer choices release factors ribosomes initiation factors polymerases trnas which management perspective is most closely aligned to industrial psychology? classical management operations management behavioral management perspective scientific management 6. Which organism(s) is/are NOT plant-like protists? (means they areanimal-like or fungi-like.) Select all that apply.6. Qu organismo(s) NO es(n) protista(s) vegetal(es)? Seleccione todas lasque correspondan.1 Algae Algas2 Amoeba Ameba3 Slime mold Moho de fango4 Paramecium paramecio5 Kelp (sea weed) Kelp (algas marinas) How does a reader determine thetheme of the story? Please solve the following question. Q1 Find the equations of the tangent and the normal to y = 2x2 - 9x - 5 at (2, -15). Q2 Find all the critical points of the given functions. a) f(x) = x3 - x2 - x b) f(x) = x (4 - x) Hence, determine whether the critical points are local maximum or minimum. When admitting states from the louisiana territory, the missouri compromise addressed what issue?. The supreme court hasmultiple choice question.almost no control over the cases it hears because the constitution defines when it must accept a case.almost complete control in deciding the cases it will hear.control in selecting about half its cases, whereas the other half are heard on mandatory appeal.a varying amount of control in selecting its cases, depending on the involvement of the particular president in office. Explain why Bob would conclude the emissions of the two signals occurred at different times even though they are simultaneous to Alice. Note that this explanation is neither simple nor straightforward, so explain your logic step by step and as clearly as possible. State clearly when you are using the postulates of special relativity. An engineer claims to have designed a heat engine that, during each cycle, takes 1.75 MJ from a heat source at 570C and releases waste heat in the amount of 750 kJ to a low temperature reservoir at 30C. Comment on this claim by providing quantitative substantiation