Answer:
Explanation:
pixbay license=Pixabay is a vibrant community of creatives, sharing copyright free images and videos. All contents are released under the Pixabay License, which makes them safe to use without asking for permission or giving credit to the artist - even for commercial purposes.
public domain=Works in the public domain are not subject to any restrictions and may be freely used without permission for commercial and non-commercial purposes. It is important for access to knowledge and must be accessible for the benefit of creators, inventors, universities and research centres
GFDLThe GFDL is meant as a way to enlist commercial publishers in funding free documentation without surrendering any vital liberty.
my brother got the same questions so im giving you the answers i got
hope it helps you out
One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You will need to communicate with one another as you coordinate this event. Pretend you have been given $650 to develop this hunt.
Research the costs of various mobile computing devices.
Write, in a report of at least 250 words, your mobile device purchase recommendations that will best suit the student communication needs of your assignment.
Upload a 250-word report about the geocache treasure hunt that includes the following:
In light of your budget, which device is the best buy for communicating with your fellow student in the coffee shop?
Which device is the best choice for communicating with your fellow student located at your school?
What trade-offs do you need to consider, such as the size of the device vs. features?
Answer:
A LG K92 5G titan Gray that also uses cricket wireless network
Explanation:
It cost 160 bucks plus tacks.
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
What are the different types of software? Give one example
Which device would help someone train for a marathon?
Drone
Navigation system
Smart watch
VR headset
I think Smart watches will be good as it will track your breathing, heartbeat, and steps. VR head set will not make you go so far, drones can look at the track you are running but it is not helping you run, and i don’t know about navigation systems.
Please help I need some one that knows about the article Disney Imagineer because I wasn't in school today so please help me write 2 paragraphs about it please. Help this is due at 11:59 PM
Read the article (Disney Imagineer) in class and write 2 paragraphs.
Answer:
I don't know much but I looked up some stuff about the Article.
River of the light-
When park-goers swarm Walt Disney World's Animal Kingdom later this month, Joe Rohde will be paying close attention.
The executive designer and vice president of Walt Disney Imagineering Creative has spent the last eight years overseeing the expansion of Disney's Animal Kingdom park, including its soon-to-be unveiled evening spectacle, "Rivers of Light." Rohde, a Disney veteran who said he started “at the bottom of the design ladder” in 1980, has also been leading the charge on Disney's "Avatar"-themed land, based on James Cameron's 2009 top-grossing film, which is slated to debut in 2017. The first of four planned sequels to Cameron's movie based on the fantastical world of Pandora will hit theaters a year later.
Rohde has overseen the development of Disney's "Avatar"-inspired land, seen in this illustration, which is scheduled to open at Animal Kingdom in 2017.-
Rohde likened the process of developing and constructing a major attraction to filming a major blockbuster film. The whole investment -- from "the morning of conceptualization to opening day" can take anywhere from four to five years, Rohde told ABC News. And in the case of Animal Kingdom, incorporating live animals can lead to other challenges.
"The inclusion of live animals changes design standards ... but it brings realism to design," he said in a phone interview. "Nature is a supreme, immutable value."
The millions of visitors who travel to Disney’s theme parks around the world -- more than 134 million in 2014, according to the Themed Entertainment Association (TEA), an industry trade group -- are not privy to the trials and tribulations of what it takes to bring an idea to fruition at Disney. Imagineers, as they're referred to at Disney, prefer it that way.
"We try to be invisible," Theron Skees, executive creative director for Walt Disney Imagineering, said in an interview.-
Skees started his Disney career painting artificial grottos and tunnels at Disneyland Paris' Pirates of the Caribbean attraction. Skees, who previously worked as a sculptor and set designer in film and commercials, has lived on three continents as a Disney imagineer, tasked with bringing the visions and interpretations of Disney characters and stories to life. The imagineering division, one of the most competitive and challenging practices within the Disney universe, has the sole responsibility of delivering "the magic" that visitors seek year after year. There are at least 1,500 imagineers currently in the company, according to a Disney spokesperson, with 140 disciplines within the group.
"There's the technical know-how, the creative vision, the planners and the operators," Skees said. "Imagineering is a pretty specialized group that requires a specialized mindset."-
And loners need not apply.
"You have to communicate and get an idea out there, whether that's painting, building or drawing models," Rohde added. "The ability to collaborate as a group is a must."
Skees reiterates that every imagineer is encouraged to submit ideas -- whether that’s for a new roller coaster, a live performance or costume design at one of the theme parks, hotels or Disney cruises.
“All ideas go through a process and it’s not exclusive to one person,” he noted.
Ideas can come from anywhere. Rohde immerses himself in books -- non-fiction, art history, neurology -- and vows to plow through the 35 stacked next to his bed, soon-to-be additions to his personal library of 5,000 books.
To be successful in this career “you need to find smart people to work under you and to read a lot,” he explained. Traveling the world? A necessity.
“We’re not making two-dimensional products. You need to know what places are really like,” he added.
Disney is the parent company of ABC News.
Hope you can get your work in on time.
Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST
send it through the mail
Answer: Be prepared to provide the following information:
1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)
2.Name of restaurant
3.Location/address of the restaurant
4.Date of incident
5.Nature of complaint
If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.
Explanation
Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.
Answer:
1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.
Explanation:
1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.
I hope that my answer helped you. Thank you, and good luck.
The three examples of ethical or legal issues that an IT professional may encounter are:
Privacy violationsCybersecurity breachesIntellectual property violationsWhat are the negative consequences of the issues with IT professional?In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.
In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.
Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.
Learn more about IT professional from
https://brainly.com/question/6947486
#SPJ1
How do the text feature help on the text?
Answer:
Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.
Explanation:
PLZ HELP DUE IN 20 MINUTES!
What is the last step when designing an algorithm?
A. Think about what could go wrong.
B. Consider changes that might happen.
C. Look at the big picture.
D. Look at what steps will be repeated.
How to implement switch statement in Python?
Answer:
Switch-case statements are a powerful tool for control in programming. In this article, Sreeram Sceenivasan goes over you can use a switch-case statement in Python.
Explanation:
Python doesn’t need a switch statement. You can do exactly the same thing with if/elif/else statements.
Emily wishes to work in print media. What career would she choose for this purpose?
a
architect
b
textile designer
c
photographer
d
fashion designer
Riley receives an email containing several grammatical errors with a link to sign a petition. Which of the following strategies should he use to make sure the email is trustworthy? (5 points) Evaluate source credibility. Fact check. Listen to his gut. Look for authenticity.
The Answer:
Explanation:
Carina's computer is turning off without warning. Which of the following steps should she take to troubleshoot the problem?
A: Try several fixes at once.
B: Uninstall the anti-virus software.
C: Check the cable connections.
D: Remove devices.
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
what plugs into this?
lol one day i forgot how to say tan and i told my sis i want to be the color teal.... lol i meant to say tan
one day i woke up and realized how ugly and lonely i am
and told myself "lol my guy you really are ugly"
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω
Answer:
just get banned by spamming random stuff
Explanation:
shar is thinking about the amount of time she spends connected to technology, on her studies, and on personal preferences and relaxation. What is her best strategy for accomplishing all of these tasks?
She should focus more on technology
She should avoid all extremes and seek a balance
She should avoid personal time and focus on her studies
she should put all her emphasis on being connected to technology
Answer: The second one :)
She should avoid all extremes and seek a balance
Explanation:
The other options only cover 1 or a few of the answers.
The best strategy for Shar would be to avoid all extremes and seek a balance.
What is technology?Technology refers to the tools, systems, and methods used to create, process, and store information.
It encompasses a wide range of devices and systems, including computers, smartphones, tablets, software applications, social media platforms, and more.
The best strategy for Shar would be to avoid all extremes and seek a balance.
It's important to recognize that technology is a valuable tool, but it's also important to ensure that it doesn't consume all of your time and energy.
Shar should allocate time for her studies and personal preferences and relaxation while also using technology as a means to support those activities.
Thus, this will help her maintain a healthy balance between her academic and personal life while utilizing technology as a useful tool.
For more details regarding technology, visit:
https://brainly.com/question/9171028
#SPJ2
Your friend Tegan is designing a game that involves cats taking over the world. She wants to use obstacles that are difficult at first, and then use simpler obstacles as the game progresses. Would you try to change her approach? Why or why not?
(game design)
Answer:
I would put levels ranging for level 1 to 50, and start off simple and easy but the game becomes hard during the player plays.
Explanation:
how do you disable goguardian on a school chromebook?
Answer:
Navigate to Filtering > Configuration > Advanced Config > Scheduling.
Disable the Enable Out of School Mode toggle.
Explanation:
Or just factory reset, but that will get rid of everything.
Impact of A.I in solving global issues?
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
What are the pros and cons of doing research for homework projects online over using offline resources like libraries?
Place the following events in sequence: A) Feynman challenges people to build "nano-things;" B) The first nano-motor is built; C) The structure of DNA is discovered
Answer: C, A, B.....I think
Explanation:
The correct sequence of events is:
C) The structure of DNA is discovered.
A) Feynman challenges people to build "nano-things".
B) The first nanomotor is built.
What is nano-motor?A molecular or nanoscale device capable of transferring energy into movement is known as a nanomotor. It is capable of producing forces on the order of piconewtons.
The novel DNA-based nanomotor is made up of three parts: a base, a platform, and a rotor arm. The base is around 40 nanometers high and is attached to a glass plate in solution via chemical bonds. A rotor arm with a length of up to 500 nanometers is attached on the base and can rotate.
Nanomotors are molecular devices that use chemical energy to cause molecules to move. Virus genomes are packaged in preformed capsids or procapsids using nanomotors.
Therefore, the correct sequence of events is: C, A, and B.
To learn more about nano-motor, refer to the link:
https://brainly.com/question/15307678
#SPJ2
How do you print "Hello World" in the console with Python? Wrong Answers Only.
Explanation:
with keyboard........
print("Hello world")
OUTPUTHello world
EXPLANATIONPython's print() outputs a given message. Python's print function displays strings on a screen.
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
The abbreviation “px” stands for
A.
perimeter x.
B.
pixels.
C.
point x.
D.
parts of x.
Answer:
c
Explanation:
Consider the following algorithm:
Step 1: Start with a list of the positive integers from 2 to 100, inclusive (meaning you include 2 and 100 in your list).
Step 2: For each $n$ from 2 to 50, inclusive, do the following: Remove all multiples of $n$ greater than $n$ from the list.
Step 3: Output all of the numbers remaining in the list.
What is the tenth number in the list that gets output?
Answer:
The tenth number in the list that gets output is 29
Explanation:
To get this done, the algorithm has to be implemented using a programming language;
The algorithm is translated to Python Programming Language as follows (Comment explains difficult lines);
#Declare an empty list
mylist = []
#Input n = 2 to 100 to list
for n in range(2,101):
mylist.append(n)
#Iterate from 2 to 50
for n in range(2,51):
#Initialize first multiple of n
k = 0
#Iterate multiples of n
for j in range(n,51,n):
k = k + 1
#Check if item exist
if j in mylist:
#Print multiples of n greater than n
if not k == 1:
mylist.remove(j)
#Print All List
print("List: ",mylist)
#Print 10th element of the list
print("10th Element: ",mylist[9])
After running the program, the output is as follows:
List: [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100]
10th Element: 29