clients can select their own operating systems, development environments, underlying applications like databases, or other software packages (i.e., clients, and not cloud vendors, get to pick the platform), while the cloud firm usually manages the infrastructure (providing hardware and networking)
Infrastructure as a Service (IaaS)

Answers

Answer 1

Answer:

Infrastructure as a Service (IaaS)

Explanation:


Related Questions

What is the output?

>>> answer = "five times"
>>> answer[1:6]

Answers

Answer:

Any information that has been processed by sent out from a computer or similar device is considered output. A simple example of output is anything you view on your computer monitor.

what is your idea of hand tool?​

Answers

Answer:

any handheld tool that you can use to fix something

Which of the following rules is most likely to be used in an AUP

Answers

An Acceptable Use Policy (AUP) typically includes a set of rules and guidelines that outline the proper and acceptable use of an organization's computer network, internet connection, and other technology resources.

What is an AUP?

An Acceptable Use Policy (AUP) typically includes a set of rules and guidelines that outline the proper and acceptable use of an organization's computer network, internet connection, and other technology resources. The specific rules included in an AUP can vary depending on the organization, but some common rules that are likely to be included in an AUP are:

Prohibiting the use of the organization's technology resources for illegal activities, such as hacking or spreading malware.

Prohibiting the use of the organization's technology resources to harass or bully others.

Prohibiting the unauthorized access, use, or modification of the organization's technology resources or data.

Prohibiting the use of the organization's technology resources for personal or non-work-related activities.

Requiring users to keep their passwords secure and to change them regularly.

Requiring users to report any security incidents or suspicious activity to the organization's IT department.

Out of these rules, the most likely to be used in an AUP is the first rule, which prohibits the use of the organization's technology resources for illegal activities. This is because it is a fundamental rule that applies to all organizations and is essential for maintaining the security and integrity of the organization's technology resources. However, all of these rules are important and are likely to be included in an AUP to some extent.

To know more about AUP,visit:

https://brainly.com/question/24951641

#SPJ1

Line charts are best used for

Answers

Answer:

to track changes over short and long periods of time.

Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital color image

Answers

Explanation:

Sampling and RBG (red blue green) pixels and also the binary sequences working together such that it display any digitally colored image by allowing the computer system know where the Red Blue Green pixel is going to be placed and also what the opacity would be for that pixel. The combination of these components is what gives you a digital color image.

A digital color-image is facilitated by sampling RBG pixels using binary sequences which enable the PC to understand the RBG pixel as well as its opacity.Each combination of both these features provides digital photography to users.It implies an analog picture can be transformed into a digital one.These analog pictures use binary sequences utilizing model 1 or 0, and when sampling our analog images, RGB-pixels display on our screen.We must use binary sequences to display the color photo and also to convert the analog. They work together because it creates RGB pixels in this digital image.

Learn more:

brainly.com/question/17389862

Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital

what scenario would be ideal for the use of a check button? question 4 options: you require a gui element that restricts a user to a single choice of items out of a group of items. you require a gui element to display an error message upon incorrect input. you require a gui element to prompt for a user's text input. you require a gui element that can be grouped with other elements that can be selected at the same time.

Answers

A check button is a graphical user interface (GUI) element that allows users to select one or more options from a group of options. It is ideal for scenarios where a user needs to choose one or more items out of a group of items.

This is particularly useful when a user needs to select multiple items at once, such as choosing toppings for a pizza or selecting multiple genres in a music streaming app. Check buttons are also useful when a user needs to select a single option from a group of options, such as selecting a language or a currency. Check buttons can be grouped with other GUI elements, such as radio buttons or dropdown menus, that allow users to make choices. This grouping makes it easy for users to see all available options and select the ones that they need. Check buttons are also useful for indicating which options have been selected or deselected, making it easy for users to keep track of their choices.

In summary, the use of check buttons is ideal in scenarios where users need to make choices from a group of options, whether it's selecting one or more options or indicating which option has been selected. They are versatile and easy to use, making them a great addition to any GUI.

To learn more about Graphical User Interface (GUI) :

https://brainly.com/question/14758410

#SPJ11

how to draw a flowchart to compute area of a triangle​

Answers

To draw a flowchart to compute the area of a triangle, you can follow the steps below:

The Steps

Start the flowchart with a start/end symbol.

Ask the user to enter the base and height of the triangle.

Store the values of base and height in variables.

Multiply the base and height and divide the result by 2 to get the area of the triangle.

Display the area of the triangle to the user.

End the flowchart with an end symbol.

The flowchart will look like a series of symbols and arrows, with each symbol representing a different action or decision point in the process.

The symbols used in the flowchart will depend on the specific software or tool you are using to create it, but typical symbols include start/end, input/output, process, decision, and connector symbols.

By following this flowchart, you can easily compute the area of a triangle with just a few simple steps.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

A virtual function is a member function that expects to be ________ in a derived class.

A. called frequently

B. overridden

C. ignored

D. private

E. None of these

Answers

A member function that anticipates being overridden in a derived class is known as a virtual function.

What is meant by overridden?

To prevent or stop a process from happening, a process is said to be overridden. For instance, if a file copy is taking too long, you can override the procedure. Software terms: Abort, Overwrite, etc.

A method that has already been specified and/or implemented in a parent class or one of its parents can have a different implementation provided by a child class by utilizing the object-oriented programming concept known as overriding.

Only if an instance method is inherited by the subclass can it be overridden. A method that has been marked final cannot be modified. A static method cannot be modified once it has been defined, although it can be re-declared. A method cannot be overridden if it cannot be inherited.

To learn more about overridden refer to :

https://brainly.com/question/29409734

#SPJ4

you notice that your computer is running slow and decide to reboot the computer to see if that will fix the problem. during the reboot, you notice that the amount of ram shown during the ram count is not the same as it was the day before. what might cause this problem?

Answers

There are a few possibilities that could cause the amount of RAM shown during the RAM count to change after a reboot. They are :

HardwareBIOS SettingsSoftware Issue.

What is RAM?

RAM (Random Access Memory) is a type of computer memory that is used to temporarily store data that the computer is actively using.

The possibilities that could cause the amount of RAM shown during the RAM count to change after a reboot are:

Hardware issue: There could be a problem with the RAM module or slot, causing it to malfunction or become partially dislodged. This could cause the system to recognize less RAM than it should.

Software issue: There could be an issue with the operating system or other software that is causing the system to allocate less RAM to the system.

BIOS settings: The amount of RAM recognized by the system can also be affected by the BIOS settings. It's possible that a change was made to the settings that caused the system to recognize less RAM than before.

In any case, if the amount of RAM recognized by the system has changed.

Learn more about RAM:
https://brainly.com/question/30765530
#SPJ1

computers are not automatic they need human to operate.(true or false)​

Answers

Answer:

both

Explanation:

most computers need a human to operate but there are ai can run without human intervention

The answer to your question is actually true and false

Name 2 product categories that could be disrupted by 5G (ultra-fast mobile broad band) and why? A product category is a group of similar and related products such as office furniture fashion or magazines.

The 'why?' should include each of the following:

- Impact to content, community, or commerce related to the consumer behavior

- Disruption to the consumer path to purchase

Answers

Two product categories that could be disrupted by 5G are Gaming and Autonomous Cars. Gaming is the first category that could be disrupted by 5G. It would allow users to play games with ultra-fast loading times and virtually no lag.

With 5G, gamers can download games and updates quickly, stream games without interruptions, and play games with other gamers globally. 5G also offers a low latency that enhances the gaming experience by enabling real-time responses. Gamers would benefit from the fast and seamless gameplay experience, which would result in enhanced consumer behavior.5G technology can also disrupt the consumer path to purchase in gaming. Since games can be downloaded and installed faster, consumers would be inclined to purchase more games.

The availability of instant updates and fixes will also increase the likelihood of customers making in-game purchases. Gaming companies can also offer additional content to enhance gameplay, such as new skins, weapons, or challenges, resulting in increased sales.The second category that could be disrupted by 5G is autonomous cars. Autonomous cars require a fast, reliable network for real-time communication, and 5G is the ideal network for this. Autonomous cars can be connected to the cloud through 5G, which would enable them to exchange data and communicate with other vehicles and smart traffic systems.

Learn more about 5G technology: https://brainly.com/question/29966877

#SPJ11

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

given the following declaration, where is the value 77 stored in the scores array? int scores[] = {83, 62, 77, 97, 86} group of answer choices scores[2] scores[0] scores[5] scores[1] scores[3]

Answers

In the given declaration int scores[] = {83, 62, 77, 97, 86}, the value 77 is stored at scores[2].In C and most programming languages, array indices start from 0. So, scores[0] refers to the first element, scores[1] refers to the second element, and so on.So option a is correct.

In programming, arrays are declared using a set of brackets []. A declaration for an integer array is int []. To initialize the array, we use the following syntax: int scores[] = {83, 62, 77, 97, 86}. The initial values are listed within curly braces. These values are known as "elements" of the array. The first element is 83, the second is 62, and so on. To access an element of an array, we use square brackets after the name of the array, with the index number of the desired element. The first element in an array is always index 0, not 1.So, the value 77 in the scores array is stored at the index of 2. Therefore,  the correct option is a .

To learn more about arrays visit: https://brainly.com/question/28061186

#SPJ11

Critical thinking skills can be applied to reading.


Please select the best answer from the choices provided

T
F

Answers

T

Critical thinking means that you do not just accept what an author presents. By reading critically, you read skeptically, questioning the author against your own knowledge and your own world view. Sometimes your ideas will align with an author's.

Answer:

Explanation:

hello i know the answe and the anwer is TRUE

An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices quickly, we will soon surpass 232 unique devices on the Internet.
In anticipation of all the new Internet devices, we are in the process of switching to IPv6, which uses 128 bits for a single address. That’s 96 extra bits to represent one address!
Which of the following statements correctly describes how many more addresses will be possible to represent by switching from IPv4 to IPv6?
i. 96 more addresses can be represented with IPv6
ii. 296 more addresses can be represented with IPv6
iii. 96 times as many addresses can be represented with IPv6
iv. 296 times as many addresses can be represented with IPv6

Answers

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

The 96 times as many addresses can be represented with IPv6. Hence option 3 is correct.

What are addresses?

Addresses are defined as the address, street name, and town name where a person resides or works and where mail can be sent: her home and office addresses. a shift in address. Memory addresses are used by computer programs to execute machine code and store and retrieve data. A device or CPU uses a memory address as a specific identifier to track data. The CPU can keep track of where each memory byte resides in the system by using this binary address, which is determined by an ordered and finite sequence.

The magnitude of IP addresses is the fundamental distinction between IPv4 and IPv6. Unlike IPv6, which has a 128-bit hexadecimal address, IPv4 has a 32-bit address. Compared to IPv4, IPv6 has a broad address space and a straightforward header.

Thus, the 96 times as many addresses can be represented with IPv6. Hence option 3 is correct.  

To learn more about addresses, refer to the link below:

https://brainly.com/question/29065228

#SPJ5

5. which of the following are not stored inside the database? an index a pl/sql package specification an anonymous block a sequence a database trigger

Answers

Out of the given options, only the pl/sql package specification and the anonymous block are not stored inside the database. The rest of the options - index, sequence, and database trigger - are stored inside the database.

PL/SQL is an important programming language that is used to write code for database applications. It allows developers to write procedural code that can interact with the database and perform various operations. PL/SQL packages are a way to organize and store related code, which can then be easily reused across different parts of the application. However, only the package body is stored inside the database, while the package specification is stored in a file outside the database.
An anonymous block is a piece of PL/SQL code that is not stored inside the database. Instead, it is executed on the fly when it is encountered in the code. Anonymous blocks are useful for performing ad-hoc tasks or testing out code before incorporating it into the application.
In contrast, indexes, sequences, and database triggers are all stored inside the database. An index is a data structure that is used to speed up queries by allowing the database to quickly locate rows based on a particular column. A sequence is a database object that generates unique numbers, which can be used as primary keys or other identifiers. A database trigger is a piece of code that is automatically executed in response to certain events, such as a row being inserted or updated.

Learn more about PL/SQL here:
https://brainly.com/question/31837324

#SPJ11

Which of the following are best and safe practices for shutting down a computer or disconnecting a device? Check all of the boxes that apply.

Which of the following are best and safe practices for shutting down a computer or disconnecting a device?

Answers

D and A because in order to be safe you need to unplug it to be safe

Answer:

I'm not 100% sure, but I think I'd be B and D.

Which computer network component connects two different networks and allows them to communicate?

Answers

Answer:

Core network components interconnect other network components. Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols, codes, or security measures. Router: a networking device that forwards data packets between computer networks.

.SQL functions fit into two broad categories?•The Data Definition Language (DDL):•used to describe/create database schema•The Data Manipulation Language (DML):•used for selecting, inserting, deleting and updating data items in a database•Basic command set has vocabulary of less than 100 words

Answers

SQL functions can be categorized into two broad categories: Data Definition Language (DDL) and Data Manipulation Language (DML). DDL is used to describe and create database schema, while DML is used for selecting, inserting, deleting, and updating data items in a database.

Data Definition Language (DDL)

DDL is used to define and manage the structure and schema of a database. It includes commands that create, alter, and drop database objects such as tables, indexes, views, and constraints. DDL statements are used to define the database schema and establish the structure that holds the data. Common DDL statements include CREATE, ALTER, and DROP.

Data Manipulation Language (DML)

DML is used to manipulate and retrieve data within the database. It includes commands that perform operations like selecting, inserting, updating, and deleting data from tables. DML statements are used to modify or query the data stored in the database. Common DML statements include SELECT, INSERT, UPDATE, and DELETE.

By using DDL and DML statements together, developers and administrators can define the structure of a database and perform various operations on the data it holds.

These categories provide a clear separation between managing the database schema (DDL) and manipulating the data within it (DML).

To learn more about SQL: https://brainly.com/question/27851066

#SPJ11

Using this C++ code on www.replit.com
#include
#include
#include
#include
#include
using namespace std;
class Matrix {
public:
int row, col;
int mat[101][101] = {0};
void readrow() {
do {
cout << "how many rows(1-100) ";
cin >> row;
} while ((row < 1) || (row > 100));
} // end readcol;
void readcol() {
do {
cout << "how many columns (1-100) ";
cin >> col;
} while ((col < 1) || (col > 100));
} // end readcol;
void print() {
int i, j;
for (i = 1; i <= row; i++) {
for (j = 1; j <= col; j++) {
printf("%4d", mat[i][j]);
} // endfor j
cout << endl;
} // endfor i
} // end print
void fill() {
int i, j;
for (i = 1; i <= row; i++) {
for (j = 1; j <= col; j++) {
mat[i][j] = rand() % 100 + 1;
}
}
} // end fill
}; // endclass
int main() {
srand(time(NULL));
Matrix m;
m.readrow();
m.readcol();
m.fill();
m.print();
return 0;
}
add to the code above a function or method that rotates a square array 90 degrees counterclockwise.
To achieve this, the following steps must be followed:
1) Obtain the transpose matrix, that is to exchange the element [ i ][ j ] for the element [ j ][ i ] and vice versa.
2) Invert the columns of the transposed matrix.

Answers

1ST, obtain the transpose matrix by exchanging the element [i][j] with the element [j][i] and vice versa. 2ND, invert the columns of the transposed matrix. By performing these steps, the array will be rotated 90° counterclockwise.

To implement the function or method that rotates a square array 90 degrees counterclockwise in the given C++ code, two steps need to be followed.

The first step is to obtain the transpose matrix. This can be done by exchanging the element [i][j] with the element [j][i] and vice versa. The transpose matrix is obtained by swapping the rows with columns, effectively turning rows into columns and columns into rows.

The second step is to invert the columns of the transposed matrix. This involves swapping the elements in each column, where the topmost element is exchanged with the bottommost element, the second-topmost element with the second-bottommost element, and so on. By performing this column inversion, the array will be rotated 90 degrees counterclockwise.

By combining these two steps, the function or method will successfully rotate the square array 90 degrees counterclockwise.

To learn more about function click here, brainly.com/question/29331914

#SPJ11

Microchip PIC18F4321 microcontroller should be used

MikroC should be used to program microcontroller.

Traffic Light System Controller:

A traffic light system with three colors is designed. There is also a counter for green, yellow and red lights. The time for each LED must be adjustable

schematic and code is needed for project.

Answers

The Microchip PIC18F4321 microcontroller is perfect for designing a traffic light controller. The MikroC programming language may be utilized to program this microcontroller.

The schematic and code for the traffic light system controller are included in the following sections of this response.Traffic Light System Controller Design:The traffic light system will have three lights, one for each color: red, yellow, and green. A counter for each color will also be included.

The system will be programmable so that the time for each LED may be adjusted. The traffic light system controller can be implemented in the following manner:• Red LED: Active for 10 seconds.• Yellow LED: Active for 2 seconds.• Green LED: Active for 8 seconds.• Counter for Red: Count from 10 to 0.• Counter for Yellow: Count from 2 to 0.• Counter for Green: Count from 8 to 0.• The system should repeat itself after every cycle.Code for the traffic light system controller:```//define inputs & outputs #define red_led PORTB.RB0 #define yellow_led PORTB.RB1 #define green_led PORTB.RB2 #define red_counter PORTD.RD0 #define yellow_counter PORTD.RD1 #define green_counter PORTD.RD2//define led on/off times #define red_on_time 10000 #define yellow_on_time 2000 #define green_on_time 8000//define counter initial values

#define red_counter_init 10 #define yellow_counter_init 2 #define green_counter_init 8void interrupt(){}//main functionvoid main() { //configure ports TRISB = 0; TRISD = 7; //configure timer T1CON = 0x80; //intialize timers TMR1H = 0x0B; TMR1L = 0xDC; //main loop while(1){ red_led = 1; //activate red led green_led = 0; //deactivate green led yellow_led = 0; //deactivate yellow led for(red_counter = red_counter_init; red_counter >= 0; red_counter--){ TMR1H = 0x0B; TMR1L = 0xDC; //set timer value while(TMR1IF == 0);

//wait until timer is up TMR1IF = 0; //clear timer1 flag } yellow_led = 1; //activate yellow led red_led = 0; //deactivate red led for(yellow_counter = yellow_counter_init; yellow_counter >= 0; yellow_counter--){ TMR1H = 0x0B; TMR1L = 0xDC; //set timer value while(TMR1IF == 0); //wait until timer is up TMR1IF = 0; //clear timer1 flag } green_led = 1; //activate green led yellow_led = 0; //deactivate yellow led for(green_counter = green_counter_init; green_counter >= 0; green_counter--){ TMR1H = 0x0B;

TMR1L = 0xDC; //set timer value while(TMR1IF == 0); //wait until timer is up TMR1IF = 0; //clear timer1 flag } } }```Schematic for the traffic light system controller:  You can implement this code on your Microchip PIC18F4321 microcontroller and adjust the time for each LED according to your needs.

Learn more about program :

https://brainly.com/question/14368396

#SPJ11

Function of an actuator

Answers

Answer:

an actuator is a device that uses a form of power to convert a control signal into mechanical motion


I really hope this helps you with your studies

What is missing in the following program in order to have the output shown? numA = 24 while numA 3: numA = numA - 7 print(numA) OUTPUT: 3

Answers

Answer:

i got >

Explanation:

24 is > 3

Answer:

me too >

Explanation:

24 is greater than 3

Berat wants to compare images of what the streets of New York City looked like one hundred years ago to now. Which of the follow
artphone options should be used?
OA mp4
OB systems software
c hardware
D. augmented reality

This is apart of my midterm and I need help if you just want points and your gonna comment something random I’m reporting..

Berat wants to compare images of what the streets of New York City looked like one hundred years ago

Answers

Answer:

I think the answer would be D.

Answer:

D. augmented reality

Hope it helps

Which measure of GDP (Nominal or Real) is a more accurate reflection of output and why? HTML Editora BIVA-A-I E337 3xx, EE STT 12pt D Paragraph

Answers

The measure of GDP (Nominal or Real) is a more accurate reflection of output  is Real GDP.

Why do i say Real GDP?

Real GDP is a more accurate reflection of output because it takes into account changes in the price level. Nominal GDP is one that do measures the value of economic output using current prices, but these prices may be affected by inflation or deflation, which can distort the measure of output.

Therefore, one can say that Real GDP, on the other hand, is adjusted for changes in the price level by using a base year price index, such as the consumer price index (CPI). This tends to allows for a more accurate comparison of output over time, as it eliminates the impact of changes in the price level.

Learn more about Real GDP from

https://brainly.com/question/17110800
#SPJ1

i
need a step by step showing calculations. As well as how to input
into excel using the fuctions cells of excel. like =pv(D8,D9...)
Bond \( X \) is a premium bond making semiannual payments. The bond pays a 9 percent coupon, has a YTM of 7 percent, and has 13 years to maturity. Bond \( Y \) is a discount bond making semiannual pay

Answers

To calculate the present value (PV) of bonds X and Y, with different coupon rates and yields to maturity, you can use the PV function in Excel. The PV function requires inputs such as the discount rate, number of periods, and future cash flows.

In Excel, you can use the PV function to calculate the present value of cash flows. The syntax of the PV function is: =PV(rate, nper, pmt, [fv], [type]).

For bond X, with a 9% coupon rate, a yield to maturity (YTM) of 7%, and 13 years to maturity, you can calculate the present value of the bond using the PV function. Set the rate argument as the YTM divided by 2 (since it is a semiannual payment), the nper argument as the number of periods (13 years multiplied by 2), and the pmt argument as the coupon payment divided by 2. The fv argument is the future value of the bond at maturity, which is typically set as 0. The type argument indicates the timing of the cash flows, with 0 representing payments at the end of the period.

For bond Y, with a discount rate of 7% (YTM equal to the discount rate), the process is similar. Set the rate argument as the YTM divided by 2, the nper argument as the number of periods (13 years multiplied by 2), and the pmt argument as the coupon payment divided by 2. Since bond Y is a discount bond, the fv argument would typically be the face value of the bond, but it is not provided in the question. Therefore, the present value would be calculated using the PV function without the fv argument.

By using these calculations in Excel, you can obtain the present value of bonds X and Y, which represents the current worth of their future cash flows based on the given coupon rates, yields to maturity, and time to maturity.

Learn more about Excel here: https://brainly.com/question/32702549

#SPJ11

Realizar la explicacion y mostrar cada una de las partes de la comunicación en los siguientes esenarios

Answers

Lamentablemente, no puedo responder a esta solicitud sin saber el contexto o los escenarios específicos a los que se refiere. Por favor proporcione más información o detalles para que pueda ayudarlo mejor.

What is an escenarios específicos?

"Escenarios específicos" is a Spanish phrase that translates to "specific scenarios" in English, referring to particular situations that may require tailored solutions.

What is the ayudarlo mejor?

"Ayudarlo mejor" is a Spanish phrase that translates to "help you better" in English, meaning to provide more effective or useful assistance to someone based on their needs or specific situation.

To know more about Lamentablemente, visit:

https://brainly.com/question/13809222

#SPJ1

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following questions.

In which year did most people update their contact information?

1988

2010

2011

2012

Answers

Answer:

2010

Explanation:

Most of the people updated their information in the database in the year 2010. The database files have different functions which enable the sorting of data according to the contact information with year wise filter.

Answer:

It’s 2012

Explanation:

Other Questions
True or False: Company Q has been paying a dividend on its stockevery quarter for the past 103 years. It can only stop paying thedividend going forward if a majority of the shareholdersapprove.tru which cpt appendix would be useful when updating a physician offices superbill? ? ? Joe Jan wants to receive $22,000 each year for the next 22 years. Assume a 6% interest rate compounded annually. How much must Joe invest today? (Round your answer to the nearest cent.) How do you identify imagery? The gravitational force exerted on a solid object is 5.00N. When the object is suspended from a spring scale and submerged in water, the scale reads 3.50N (Fig. P14.24). Find the density of the object. What did I forget to do in this question? What should the answer be? Use only Quadratic Formula [tex] {7x}^{2} + 9x + 2 = 0[/tex][tex] {x}^{2} + 9x + 14 = 0[/tex][tex](x + 7)(x + 2) = 0[/tex]x= -7,x=-2 A council reviews the number of bedrooms in 40 houses located in the same area. The table shows the information gathered. Find the modal average number of bedrooms. Work out the mean number of bedrooms Whats the value of the 2 in 0.812 and write the underline digit as a fraction. west company borrowed $10,000 on september 1, year 1 from the valley bank. west agreed to pay interest annually at the rate of 6% per year. the note issued by west carried an 18-month term. based on this information the amount of interest expense appearing on west's year 1 income statement would be: As exercise levels increase, which of the following physiological changes occurs in the respiratory system?A.The respiratory muscles shrink.B.The lungs expand in size.C.The trachea widens.D.The airways narrow. please help for brainliest ^^Fill the blank with correct word :) Many people like having the latest sneaker releases from name-brand _____ and that has led to the creation of sneaker resellers. was kann man mit die punkte alles machen Find area of the circle. Use 3.14 as (pie symbol) the diameter is 104. Please help will mark brainliest!! Leave No Trace Reading Plus Story Level H Evaluate the given integral by changing to polar coordinates.sqrt1a.gif25 x2 y2dAiintegral.gifRwhere R =leftbrace1.gif(x, y) | x2 + y2 25, x 0rightbrace1.gif QuestionFind the equation of the line with slope through the point (-4, -7).Enter your answer in standard form Ax + By = C, where A, B, and C are integers.Provide your answer below: Can you please help me solve this Use the Distributive Property to solve the problem. [Example: 4(6+3) = 4(6)+4(3) = 24 + 12 = 36] 5(12 + 7) 2. Consider a Black-Scholes framework, where a market-maker sells a 1year European gap call options on an underlying, non-dividend paying stock S. Each gap call option is written on a share of S. She deltahedges the position with shares. Furthermore, she knows that - the initial stock price S0=200, and - the stock's volatility =1, and - the risk-free interest rate r=0, and - each gap call option has a strike price of 100 , and - each gap call option has a payment trigger of 200. Compute: - the initial value of the gap c. - the initial number of shares in the delta-hedge of the gap call (25 pts). Research three OSCM software packages from different companies. Explaining the capabilities and limitations of that package. Additionally, include a short introduction paragraph and conclusion with your overall impressions and recommendations for OSCM software.