Terrel is designing and maintaining a web page for a local company. In which career pathways would Terrel be involved?

Programming and Software Development, and Network Systems
Network Systems and Interactive Media
Information Support and Services, and Programming and Software Development
Interactive Media, and Information Support and Services

Answers

Answer 1

Answer:

C information Support and services

Explanation:

Answer 2

Answer:

c

Explanation:


Related Questions

Which of the following statements are true about the Internet?
1 - The Internet connects devices and networks all over the world
II - The Internet helps people collaborate to solve problems
III - The Internet helps people communicate
IV - There are no negative consequences of the Internet, it is purely positive

Answers

1, 2, and 3 are true

Paraphrase the following passage:
All employee e-mail accounts should be used only for business purposes; use of company e-mail accounts for personal
messages is strictly prohibited. All e-mail is company property and the company reserves the right to access any e-mail sent to
or from any company personal computer. E-mails sent from company e-mail accounts may not contain libelous, slanderous, or
generally offensive content and may not be used to harass any other employee or customer. Employees who violate this policy
are subject to HR discipline up to and including termination, depending on the violation and its consequences.

Answers

Answer:

The usage of official e-mail accounts by employees should be strictly restricted to business-related communication only. Personal messages must not be sent through company e-mails. The company owns all e-mail correspondence, and can review any e-mail sent or received on office computers. Any e-mails transmitted through official accounts should not contain any abusive, defamatory, or insulting content, nor should they be used to harass fellow employees or customers. Those violating this policy are liable to HR penalties, which may lead to their termination, depending on the severity and consequences of the offense.

WILL MARK BRAINLIEST!!
What will be displayed after this code segment is run?

luckyNumbers + 15, 33, 25
INSERT lucky Numbers, 2, 13
APPEND lucky Numbers, 3
REMOVE lucky Numbers, 1
DISPLAY LENGTH luckyNumbers

Please explain!! :)

WILL MARK BRAINLIEST!!What will be displayed after this code segment is run?luckyNumbers + 15, 33, 25INSERT

Answers

Answer:

Output: 4

Explanation:

You start with [15,23,25]

You insert 13 at index 2 [15,13,33,25]

Append 3 [15,33,25,3]

Output length of array: 4

The output that will be displayed after the code segment is run is 3

The flow of the algorithm is as follows:

luckyNumbers <- 15, 33, 25:

This above line initializes a list

INSERT lucky Numbers, 2, 13:

The above line replaces the number in the 2nd index with 13.

So, the list becomes 15, 33, 13

APPEND lucky Numbers, 3

The above line appends 3 at the end of the list.

So, the list becomes 15, 33, 13, 3

REMOVE lucky Numbers, 1

The above line removes the number in the 1st index

So, the list becomes 15, 13, 3

DISPLAY LENGTH luckyNumbers

The above line prints the count of numbers in the list i.e. 3

Hence, the output that will be displayed after the code segment is run is 3

Read more about algorithms at:

https://brainly.com/question/24793921

the order by clause is invalid in views, inline functions, derived tables, subqueries, and common table expressions, unless top, offset or for xml is also specified.

Answers

Based on SQL tags and Query, and considering the original codes programmer do not need to use ORDER BY in inner query after WHERE clause because it has already been used in ROW_NUMBER () OVER (ORDER BY VRDATE DESC).

Note that it is not acceptable or executable to have ORDER BY command used in a subquery, although the main query can use an ORDER BY.

Hence, in this case, programmer needs to have is the following:

SELECT

*

FROM (

SELECT

Stockmain. VRNOA,

item. description as item_description,

party. name as party_name,

stockmain. vrdate,

stockdetail. qty,

stockdetail. rate,

stockdetail. amount,

ROW_NUMBER() OVER (ORDER BY VRDATE DESC) AS RowNum --< ORDER BY

FROM StockMain

INNER JOIN StockDetail

ON StockMain.stid = StockDetail. stid

INNER JOIN party

ON party. party_id = stockmain. party_id

INNER JOIN item

ON item.item_id = stockdetail. item_id

WHERE stockmain.etype = 'purchase'

) AS MyDerivedTable

WHERE

MyDerivedTable. RowNum BETWEEN

Inexecutable Code in the question is the following:

SELECT

*

FROM (

SELECT

Stockmain. VRNOA,

item. description as item_description,

party. name as party_name,

stockmain. vrdate,

stockdetail. qty,

stockdetail. rate,

stockdetail. amount,

ROW_NUMBER() OVER (ORDER BY VRDATE) AS RowNum

FROM StockMain

INNER JOIN StockDetail

ON StockMain. stid = StockDetail. stid

INNER JOIN party

ON party. party_id = stockmain. party_id

INNER JOIN item

ON item. item_id = stockdetail. item_id

WHERE stockmain. etype = 'purchase'

ORDER BY VRDATE DESC

) AS MyDerivedTable

WHERE

MyDerivedTable.RowNum BETWEEN 1 and 5

Learn more here: https://brainly.com/question/14777974

In a particular spreadsheet, the data in each cell is password protected. When cells are selected, the formula is visible in the formula bar. Which is true?

Answers

The true statement regarding the spreadsheet is - "When cells are selected, the formula is visible in the formula bar."

How is this so?

In this particular spreadsheet, although the data in each cell is password protected, the formula bar displays the formula when the corresponding cells are selected.

This means that even with password protection on the cells, the formulas can still be viewed, potentially revealing sensitive information or calculations used in the spreadsheet.

Learn more about spreadsheet at:

https://brainly.com/question/4965119

#SPJ1

How much would it cost to get the screen replaced on a Moto G7?

Answers

If you know enough about tech you can buy a replacement screen online for like $40.00 and do it yourself or might be around like $100 to get it fixed, depends on the place you go too.

what utility can you use to ensure that an embedded port on the motherboard is enabled?

Answers

To ensure that an embedded port on the motherboard is enabled, you can use the utility called "BIOS" (Basic Input/Output System) or "UEFI" (Unified Extensible Firmware Interface) depending on your system.

To ensure that an embedded port on the motherboard is enabled, follow these steps:

1. Restart your computer.
2. Press the specific key (usually F2, F10, F12, or DEL) during the boot-up process to access the BIOS/UEFI settings. This key varies among different motherboard manufacturers; refer to your motherboard's manual for the correct key.
3. Navigate to the settings related to the embedded port you want to enable, usually found under "Integrated Peripherals," "Advanced Settings," or a similar section.
4. Locate the specific embedded port option (such as USB, Serial, or Parallel port) and change its status to "Enabled."
5. Save the changes and exit the BIOS/UEFI settings.
6. The computer will restart, and the embedded port on the motherboard should now be enabled.

Remember to consult your motherboard's manual for specific instructions related to your particular model.

To learn more about motherboard visit : https://brainly.com/question/12795887

#SPJ11

list 20 specific purpose of application software​

Answers

Answer:

1. Word processing

2. Spreadsheet creation and analysis

3. Database management

4. Presentation creation and delivery

5. Graphic design and editing

6. Video editing

7. Music production

8. Web browsing

9. Email management

10. Project management

11. Time tracking and monitoring

12. Accounting and financial management

13. Inventory and supply chain management

14. Human resources management

15. Customer relationship management

16. Sales management

17. Marketing management

18. Education and training

19. Healthcare management

20. Scientific research and analysis

help i don't know the answer

help i don't know the answer

Answers

A test bed is an environment with all the necessary hardware and software to test a software system or component.

What is meant by hardware and software?The term "hardware" describes the actual, outward-facing parts of the system, such as the display, CPU, keyboard, and mouse. Contrarily, software refers to a set of instructions that allow the hardware to carry out a certain set of activities.RAM, ROM, Printer, Monitor, Mouse, Hard Drive, and other items are some examples of hardware. Software examples include, MySQL, Microsoft Word, Excel, PowerPoint, Notepad, Photoshop, and more.System software, utility software, and application software are some of the numerous kinds of software that can be used with computers.Office suites, graphics software, databases, database management software, web browsers, word processors, software development tools, image editors, and communication platforms are some examples of contemporary applications. software for a system.

To learn more about hardware and software, refer to:

https://brainly.com/question/23004660

Can someone do this for me before 11:59 thanks in advance




How we hear

Here is someone listening to some music produced by the loudspeaker and CD player

Please explain how the person hears the music

Can someone do this for me before 11:59 thanks in advance How we hearHere is someone listening to some

Answers

The person hears the music because of the vibrations coming out off the speaker and CD player. The vibrations come in different size wavelengths which then lead/flow to our eardrums and to our brains which signals us to recognize what the sound is, causing us to be able to hear it.

A workspace that an employee accesses using a Web browser fits the definition of a _____.

•mobile device
•Wifi-enabled device
•collaborative environment
•virtual workspace​

Answers

Answer:

virtual workspace

Explanation:

I hope I've helped

TRUE/FALSE. abc, cbs, and nbc typically provide how hours of programming to affiliates each day.

Answers

The given statement "abc, cbs, and nbc typically provide how hours of programming to affiliates each day" is false. ABC, CBS, and NBC typically provide several hours of programming to their affiliates each day.

The exact amount of programming can vary depending on the network and the specific day or time slot. These major television networks have schedules that include a range of programming, including news, sports, entertainment shows, dramas, sitcoms, and more.

The duration of programming can differ throughout the day, with prime time slots typically featuring longer programming blocks. However, it is important to note that the specific programming lineup and duration can vary, so it is advisable to consult the network's schedule or check with the respective network for the most accurate and up-to-date information.

Learn more about network visit:

https://brainly.com/question/29350844

#SPJ11

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

What two names are given to UDP blocks of communication?

Answers

The two names given to UDP blocks of communication are datagrams and packets.

Datagram refers to a self-contained unit of data that is transmitted over a network and contains all the necessary information for its delivery, including source and destination addresses. It is a fundamental component of the User Datagram Protocol (UDP) that provides an unreliable, connectionless service for transmitting datagrams between network hosts.

A packet, on the other hand, is a similar unit of data that is used in various network protocols, including UDP and TCP (Transmission Control Protocol). A packet contains not only the data to be transmitted but also additional information such as header information, error detection codes, and other control information necessary for its successful transmission and reception. Unlike datagrams, packets can be guaranteed to arrive at their destination, as they are transmitted using connection-oriented protocols like TCP that ensure their reliable delivery.

In summary, datagrams and packets are both essential units of data used in network communication, with datagrams being used in connectionless, unreliable protocols like UDP, and packets being used in connection-oriented protocols like TCP. Understanding the differences between these terms is crucial for network engineers and administrators to effectively manage and troubleshoot network issues.

know more about User Datagram Protocol here:

https://brainly.com/question/20038618

#SPJ11

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

Output of functions with branches/loops. Jump to level 1 Type the program's output def get_numbers(): user_input = input() values = [] for token in user input.split(): values.append(int(token)) return values Input 18 3 15 11 136 Output def print selected numbers(): numbers = get_numbers() for number in numbers: 11 number < 10: print(number) print_selected numbers)

Answers

The program provided defines a function called "get_numbers" which takes user input and converts it into a list of integers. Another function called "print_selected_numbers" is defined which uses the "get_numbers" function to obtain a list of integers and then loops through the list checking if the number is less than 10.

If it is, the number is printed to the console.The output of this program depends on the user input. If the user input is "18 3 15 11 136", then the output would be "3". This is because only the number 3 is less than 10. If the user input was different, for example "5 10 15 20 25", then the output would be "5".The program demonstrates the use of functions and loops in Python. Functions are a way to break down a program into smaller, reusable parts. Loops are used to repeat a set of instructions multiple times, such as checking if a number meets a certain condition. The program also uses the concept of branching, where the program takes different paths depending on whether a certain condition is met or not.

For such more question on Python

https://brainly.com/question/26497128

#SPJ11

There are a few errors in the provided code, which makes it impossible to determine the expected output.

Here are the issues:

The print_selected numbers) line at the end of the code has a syntax error: it should be print_selected_numbers().

The print(number) line inside the print_selected_numbers function is missing a colon at the end: it should be print(number):.

There is no implementation for the print_selected_numbers function. This function needs to be defined before the code can be run.

Once these issues are fixed, we can determine the expected output by running the code.

Learn more about output here:

https://brainly.com/question/13736104

#SPJ11

Which of the following are provided by most
professional organizations? Check all of the boxes
that apply.
uniforms
a code of conduct
Olegal representation
a network of professionals
skills validation
DONE

Answers

a code of conduct

a network of professionals

skills validations

individuals sometimes attempt to remove personal information from the internet. which of the following is the least likely reason the personal information is hard to remove? responses internet users with a copy of the information might redistribute the personal information without first seeking permission. internet users with a copy of the information might redistribute the personal information without first seeking permission. there are potentially an extremely large number of devices on the internet that may contain the information. there are potentially an extremely large number of devices on the internet that may contain the information. automated technologies collect information about internet users without their knowledge. automated technologies collect information about internet users without their knowledge. all personal information is stored online using authentication measures, making the information hard to access.

Answers

I understand you are asking which of the provided reasons is least likely to make personal information hard to remove from the Internet.

Among the mentioned reasons, the least likely reason is: "All personal information is stored online using authentication measures, making the information hard to access."

While authentication measures do protect personal information, they are not the primary reason why it's difficult to remove personal information from the internet.

The other reasons, such as redistribution without permission, the vast number of devices containing the information, and automated technologies collecting information without users' knowledge, all contribute significantly to the difficulty of removing personal information from the internet.

These factors involve the widespread and uncontrollable nature of information sharing online, which makes it challenging to control and remove personal information once it is out there.

To Learn More About Internet

https://brainly.com/question/2780939

SPJ11

Select the correct answer from each drop-down menu.
What should companies and industries practice to avoid the dangers from AI and robots?

Companies and industries should train (BLANK ONE)
and implement effective (BLANK TWO).

Blank one options:
A- HR resources
B- AI resources
C- Customers

Blank two options:
A- Testing programs
B- incentive programs
C- Marketing programs


I accidentally started the test before doing the lesson, I need some help. I will give brainliest for a correct answer.

Answers

To avoid the potential dangers associated with AI and robots, companies and industries should practice AI resources  and  AI- Testing programs

Blank one: B- AI resources

Companies and industries should invest in training their AI resources.

This involves providing comprehensive education and training programs for employees who work directly with AI and robotics technologies.

This training should encompass not only technical skills but also ethical considerations and best practices in AI development and deployment.

By ensuring that their AI resources are well-trained, companies can minimize the risks associated with AI and make informed decisions about its implementation.

Blank two: A- Testing programs

Implementing effective testing programs is crucial in mitigating the dangers of AI and robots.

These programs involve rigorous testing and validation of AI algorithms and robotic systems before they are deployed in real-world settings.

Thorough testing helps identify potential biases, errors, or unintended consequences that could pose risks to individuals or society at large.

Companies should establish robust testing protocols that include simulations, controlled environments, and real-world scenarios to evaluate the performance, safety, and reliability of AI and robotic systems.

For more questions on AI

https://brainly.com/question/20339012

#SPJ8

why do i have to log in everytime?

Answers

Answer:

For security reasons

Explanation:

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

What are the safety precautions related to networks?

Answers

Answer:

The following are some of the common safety precautions mentioned in the Network+ objectives.

...

Installation Safety

Lifting equipment. When lifting equipment, it's best to lift with your legs, not your back. ...

Rack installation. ...

Placement. ...

Tool safety.

Answer:

*we should not give details about ours bank, otps etc

What does this say in morse code?
-. . ...- . .-. / --. --- -. -. .- / --. .. ...- . / -.-- --- ..- / ..- .--.

Answers

Answer:

That it is time for lunch?

Explanation:

Answer:

Never gonna give you up

Explanation:

can't believe I fell for that

What is one thing we should avoid doing when summarizing a storyline or event in a review?

Answers

Don't use the same words in the passage or story

what type of application-layer payload or protocol message is being carried in this first udp segment in the trace?

Answers

The type of application-layer payload or protocol message being carried in the first UDP segment in the trace is: DNS.

The DNS provides a crucial service in the functioning of the internet because it is the main protocol that allows users to access websites and other internet resources by name rather than numerical IP addresses. A UDP packet is defined as a User Datagram Protocol data packet.

In comparison to TCP, it is a connectionless protocol. It implies that UDP datagrams can be transmitted and received by the receiver without establishing a connection.

Learn more about application-layer: https://brainly.com/question/29590732

#SPJ11

How does one select an entrepreneurial activity?

Answers

Entrepreneurial activities are those activities, the tasks and or functions of an entrepreneur. ... The second part can be answered by looking at the options of entrepreneurial activities, for instance is it marketing, selling the brand name, coming up with funds, etc.

Give one reason why a telephone number would be stored as the text data type. [2 marks]

Answers

Answer:

Telephone numbers need to be stored as a text/string data type because they often begin with a 0 and if they were stored as an integer then the leading zero would be discounted.

The other reason is that you are never likely to want to add or multiply telephone numbers so there is no reason to store it as an integer data type.

Explanation:

A text data type can hold any letter, number, symbol or punctuation mark. It is sometimes referred to as 'alphanumeric' or 'string'.

The data can be pure text or a combination of text, numbers and symbols.

People often assume that a telephone number would be stored as an 'integer' data type. After all, they do look like numbers don't they!

what class of arthropods is mainly involved in the pollination process?​

Answers

Answer:

Insects

Explanation:

insects are the most pollinating arthropods.

Code can be in any language:


You are given a list of people. For each person you know their first name, last name and date of birth. All first names and dates of birth are unique. The date of birth is given in the standard date format (YYYY-MM-DD).

You must group them by their last name.


Print the families sorted by their number of members starting with the largest.

Within a family print the first names sorted by their age starting with the oldest.

Focus on correctness, performance and code quality.


Input

6

Mihai Enescu 1980-01-02

George Ionescu 1992-06-20

Maria Popescu 1995-03-13

Elena Popescu 1990-12-13

Andrei Ionescu 1996-03-01

Sergiu Ionescu 1990-02-01


Output

Ionescu: Sergiu George Andrei

Popescu: Elena Maria

Enescu: Mihai

Answers

This is a programming question that requires you to group a list of people by their last names and print the families sorted by the number of members starting with the largest.

Within a family, you should print the first names sorted by their age starting with the oldest. To solve this problem, you can use a dictionary to group the people by their last names. You can iterate through the list of people, extract their last names, and add them to the dictionary as keys. The values of the dictionary will be a list of tuples containing the first name and date of birth. Next, you can sort the values of the dictionary by the number of members in each family. You can then iterate through the sorted dictionary, print the last name, and sort the list of tuples by the date of birth. Finally, you can print the first names in the sorted order.

Here's the code to solve the problem:
```
n = int(input())
people = {}
for i in range(n):
   first_name, last_name, dob = input().split()
   dob = tuple(map(int, dob.split("-")))
   people.setdefault(last_name, []).append((first_name, dob))

for last_name, family in sorted(people.items(), key=lambda x: len(x[1]), reverse=True):
   print(last_name + ":", end=" ")
   for first_name, dob in sorted(family, key=lambda x: x[1]):
       print(first_name, end=" ")
   print()
```

In this code, we first iterate through the list of people and add them to the dictionary using `setdefault()`. We convert the date of birth to a tuple of integers for easy comparison. Next, we sort the dictionary items by the length of the list of tuples using a lambda function. We iterate through the sorted dictionary items and print the last name followed by the sorted list of first names. This code should correctly group the people by their last names, sort the families by the number of members, and sort the first names within each family by their age.

Learn more about programming here: https://brainly.com/question/31192804

#SPJ11

Excel - To clear the active cell, you can use the Ribbon, the keyboard, or the mouse.


True
False

Answers

The answer to your question is true
Other Questions
Helpppp !!! Thank you have a great day :) Which of the following statements regarding the Roman use of concrete as a building material is FALSE?O Concrete made rounded arches and curved buildings possible.O Concrete was cheaper than cut stone.O Concrete was more difficult to use than cut stone.O Concrete required the use of less-skilled labor. will get brainliest!!!!!!What does negative 3 over 8 > 1 indicate about the positions of negative 3 over 8 and 1 on the number line? negative 3 over 8 is located on the right of 0, and 1 is located on the left of 0 negative 3 over 8 is located on the left of 0, and 1 is located on the right of 0 negative 3 over 8 is located on the left of 1 negative 3 over 8 is located to the right of 1 Vertical angles are equal. What is the degree What is significant about the Burgess Shale? Select all that apply. A) Wide diversity of dinosaur fossils B) Rare fossils C) Contains fossils of most of the fossils in the fossil record D) Wide diversity of marine species E) Well-preserved fossils nature selects behaviors that increase the likelihood of sending one's _____ into the future. 5% commission rate of 14.98 Master file contains the most up-to-date and accurate data in the payroll system. This data is input to the payroll system when payroll is processed. Discuss the issues/problems resulting when an unauthorized change is made to the data in the payroll master file and explain its consequences. when giving an explanation of a complicated concept or process, you will usually be most successful when you What is the power of an electric toothbrush if it can do 750 joules of work in 75 seconds? Please answer quickly(3 points) Two manufacturers supply blankets to emergency relief organizations. Manufacturer A supplies 3300 blankets, and 9 percent are irregular in workmanship. Manufacturer B supplies 3500 blankets why the bodies of water important for recreation help!! just 2 questions!! show steps. In "A Harrowing Escape," what do Cornelia's feelings about hereveryday activities reveal about her?7,theShe is torn between her duties as a princess andliving a more simple life.ohadopedla'sShe enjoys the opportunity to dress up and make agood impression on her parents' friends.She respects her parents but disagrees with the waythat they rule their citizens. neShe knows her worth and desires to do things thatare important. Is physics science hard? What number is the divisor in the division problem below? 36 = 4= 9A. 9B. 36C. 4 when differentiating products and services to local markets, strategies and tactics are likely to company costs. group of answer choices decrease decentralize obliterate increase What do I write for ethical advantages about cell theory HelppppppppppppPlz plz plz plz plz plz plz plz Identify the transformation from the original to the image and tell if the two figures are similar or congruent. The original figure (ABC triangle) has continuous lines, the image has dashed lines.