Which of the following is NOT a possible duty for a professional working in the Web and Digital Communications pathway?

Creating computer software

Designing graphics and animation

Implementing security measures

Designing websites

Answers

Answer 1

Answer:

creating computer software

Explanation:

HOPE THIS HELPS!!!


Related Questions

which of the following is an open-source intrusion detection system that provides search and analysis tools to help index collected data?

Answers

The answer is OSSEC, which stands for Open Source Security. OSSEC is an open-source Intrusion Detection System (IDS) that provides search and analysis tools to help index collected data. It is designed to detect and prevent cyber attacks on both local and remote systems and networks, while also providing security log analysis and file integrity checking.

What Is An Intrusion Detection System:The Intrusion detection system is the one that works on detection and prevention systems and determines whether the activity is present that is contrary to organization policy.A monitoring system called an intrusion detection system (IDS) looks for abnormal activity and sends out alarms when it does.a(n) reprsents the intrusion.

More About Intrusion Detection System: https://brainly.com/question/28962475

#SPJ11

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

A doctor in progress sheet in a computer she did copy and paste of the previous progress sheet because nothing changed . But she
entered the same date .what type of error ? A. Systematic error B . Random error C. Missing error

Answers

Based on the information provided, the type of error that occurred when the doctor in progress sheet was copied and pasted with the same date is a missing error.

This is option C

This is because the doctor failed to update or change any information on the progress sheet, resulting in missing or incomplete data. It is important to regularly update and review information to ensure accuracy and prevent missing errors.

Missing errors refer to errors or mistakes that occur when something essential or necessary is not present or included. In the context of a document or a piece of writing, a missing error can occur when vital information, words, phrases, or punctuation marks are unintentionally omitted.

These errors can negatively impact the clarity and meaning of the text, leading to confusion or misinterpretation for the reader. It is important to carefully review and proofread any document to identify and correct any missing errors before finalizing it.

So, the correct answer is C

Learn more about missing error at

https://brainly.com/question/14382279

#SPJ11

given that object-oriented programming is centered around objects, what c construct is used to create objects?

Answers

In programming, an object refers to an instance of a class. Objects are used to represent a particular item in the real world. For example, a car is an object in the real world, so it will be represented in a program as an object and the class keyword is used to create objects.

Object-Oriented Programming is a programming paradigm that emphasizes the use of objects. The C++ programming language has been specifically designed to support OOP (Object-Oriented Programming) programming. In C++, the class keyword is used to create objects. A class is a blueprint for an object that defines the properties and behaviors of that object. The class can be thought of as a template for creating objects. A constructor is a special member function that is called when an object is created. The constructor is used to initialize the data members of the object. In C++, the new keyword is used to dynamically create objects. The new keyword returns a pointer to the object that was created. The pointer can be used to access the object's members. In conclusion, C++ is a programming language that supports Object-Oriented Programming.

To know more about pointer visit:

https://brainly.com/question/30553205

#SPJ11

Effective security measures are achieved through _____. Select 3 options.

employee education
employee education

codes of conduct
codes of conduct

technology-use policies
technology-use policies

inefficient security systems
inefficient security systems

difficult-to-use systems

Answers

Effective security measures are achieved through employee education, and technology-use policies. The correct options are A, and C.

What is security measure?

All administrative, physical, and technical precautions in an information system are referred to as security measures.

Components of a system's software, firmware, hardware, or processes that are present to satisfy security requirements

Your computer is separated from the rest of the Internet by a firewall. A firewall may be a piece of hardware, a piece of software, or a mix of the two.

The implementation of security measures is made possible by technology use guidelines and personnel education.

Thus, the correct options are A, and C.

For more details regarding security system, visit:

https://brainly.com/question/30165725

#SPJ1

How would you describe
"analogous color harmony" to a six year old?

Answers

Answer:

Analogous colours are groups of three colours that are next to each other on the colour wheel, and a tertiary. ... An analogous color scheme creates a rich, monochromatic look. It is best used with either warm or cool colors, creating a look that has a certain temperature as well as proper color harmony.

Explanation:

Which of the following are generally considered to be professional behaviors in IT? Check all of the boxes that apply.

O.maintaining technical competency
O.sharing confidential information
O.teaching others about technology​

Answers

The option that considered to be professional behaviors in IT is Maintaining technical competency.

What professional behavior implies?

Professional behavior is known to be a kind of etiquette that is often seen in the workplace and it is one that is often  linked to respectful and courteous ways.

Hence, The option that considered to be professional behaviors in IT is Maintaining technical competency.

Learn more about IT from

https://brainly.com/question/25226643

#SPJ1

Answer:

The answer is actually A and c

Explanation:

The answer is right trust me

How to use multiple monitors in windows 10

Answers

Answer:

To choose how you want to use your display on Windows 10, press Windows + P keys on your keyboard. Choose a new display mode from the available options: ...

You should choose the Extend option when you use three monitors.

Then, configure your displays on Windows 10.

Explanation:

this is probably not a clear explanation so u should just watch microsoft's video on it

Set up dual monitors on Windows 10:

1) Select Start > Settings > System > Display. Your PC should automatically detect your monitors and show your desktop.

2) In the Multiple displays section, select an option from the list to determine how your desktop will display across your screens.

3) Once you've selected what you see on your displays, select Keep changes.

X = "apple"
y = X
z = "banana"
print(x
+
+
y + "\n" + z)
What is output?

Answers

pede po bang pa pic ang gulo po Kasi ehh

The first time a user launches the PowerPoint program, which view is shown allowing the user to access recent

presentations or create new presentations based on templates?

Answers

Answer:Click file, go to NEW then you can choose the template you would like to use to create your presenation.

Explanation:

Answer:

It might be edit view

Explanation:

what is an indication that malicious code is running?

Answers

Answer:

If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.

please give brainliest

Data quality management, data architecture management, and data development are three of the many functions of _____.a. data governanceb. b. data manipulation languagesc. c. data managementd. d. data dictionaries

Answers

Data quality management, data architecture management, and data development are three of the many functions of data governance.

Option A is correct.

Data governance :

Setting internal standards—data policies—for the collection, storage, processing, and disposal of data is known as data governance. It determines which types of data are under governance and who can access them. The term "data governance" is used at both the macro and micro levels. The first is a political idea that is related to Internet governance and international relations; The latter is a part of corporate data governance and is a concept in data management.

Data quality management :

A set of procedures with the goal of preserving information of a high quality is called data quality management. It encompasses both the acquisition of data and the implementation of sophisticated data processing techniques, as well as the efficient dissemination of data. It likewise requires an administrative oversight of the data you have.

Learn more about data governance :

brainly.com/question/30886486

#SPJ1

if there are multiple slots available on one time, can i block off one option when the other is taken signupgenius

Answers

If you're planning an event and want to give people the option to sign up for different time slots, you might be wondering if you can block off one option when the other is taken.

The short answer is yes, you can do this with SignupGenius. When you create your signup, you'll see an option to "lock" a time slot after a certain number of people have signed up. This is helpful if you only have a limited number of spots available, or if you want to make sure that people who sign up for a certain time slot are actually committed to attending.

Of course, you can always change the number of people allowed in a time slot, or remove the lock entirely, if you need to. So if you're not sure how many people will be signing up, you can always adjust as needed.

Learn more on Sign up here:

https://brainly.com/question/27960093

#SPJ4

navigation tracking uses satellites to transmit signals that determine the location of a device. called

Answers

Global positioning system (GPS) tracking, the technology is used in a variety of applications, including navigation, surveillance, and theft prevention.

What is Navigation?
Navigation is the process of planning, recording and controlling the movement of a vehicle from one place to another. It involves the use of various navigational tools such as maps, compasses, GPS systems, radar, and sonar to determine the position of a vehicle at any given time. It also involves accurate calculation of time, speed, and direction in order to get to the desired destination safely and efficiently. Navigation plays a critical role in the transportation industry, military operations, and marine exploration.

To know more about Navigation
https://brainly.com/question/146597
#SPJ4

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

the truth value of an array with more than one element is ambiguous.

Answers

An array is a collection of elements that are of the same data type, and each of them has a unique identifier. In computing, it is used to organize data and for easy access. The truth value of an array with more than one element is ambiguous because a single condition cannot fully determine the truth or falsity of the entire array.

Consider an array with two or more elements. If we were to test the condition of the array to determine its truth value, we would have to test each element in the array. This is because a single element can be true or false, but the entire array cannot be true or false as a single entity. To overcome this problem, we can use a loop to iterate through each element in the array and test the condition.

If the condition is true for all elements in the array, then the entire array is considered true. However, if the condition is false for at least one element, then the entire array is considered false. In conclusion, the truth value of an array with more than one element is ambiguous, and we must test each element to determine its truth or falsity.

To know more about elements visit:

https://brainly.com/question/31950312

#SPJ11

In the case study, naldi vs. grunberg, the court ______ the argument for dismissal arguing that the negotiations were only drafted in an email.

Answers

In the case study, Naldi vs. Grunberg, the court rejected the argument for dismissal arguing that the negotiations were only drafted in an email.

What are the characteristics of E-mail?

The characteristics of E-mail are as follows:

It involves an instinctive reply to messages.It facilitates the mechanism of auto-forwards and redirection of messages.It involves the facility delivering copies of a message to numerous people. Self-filing and retrieval of messages.

According to the question, a formal fallacy may be implemented by the court in order to reject the argument for dismissal. This demonstrates the negotiations that were only drafted in an email format.

Therefore, in the case study, Naldi vs. Grunberg, the court rejected the argument for dismissal arguing that the negotiations were only drafted in an email.

To learn more about Emails, refer to the link:

https://brainly.com/question/25642105

#SPJ1

The Hypertext Markup Language (HTML) is a language for creating A. Networks B. Webpages C. Protocols D. All of the Above Which of the following is not a component of hardware?

Answers

Answer is B.

None of the options is a hardware component. On the other hand web pages and protocols can be considered a software component. I hope this helps.

reduction in occipital cortex gamma-aminobutyric acid concentrations in medication-free recovered unipolar depressed and bipolar subjects

Answers

The phrase refers to a study or observation indicating that in individuals who have recovered from unipolar depression or bipolar disorder and are not currently on medication, there is a reduction in the concentration of gamma-aminobutyric acid (GABA) in the occipital cortex of the brain.

GABA is the primary inhibitory neurotransmitter in the brain, playing a critical role in reducing neuronal excitability throughout the nervous system. In many mood disorders, including unipolar and bipolar depression, alterations in GABA signaling have been implicated. The occipital cortex, the visual processing center of the mammalian brain, isn't usually the primary focus in depression studies, but all brain areas are interconnected. The observed reduction in GABA could influence other brain regions involved in mood regulation, implying a potential role in the pathophysiology of these disorders.

Learn more about gamma-aminobutyric acid here:

https://brainly.com/question/1233703

#SPJ11

8. What part of the desktop is this? O Icons O Folder O Notification area O Start button​

8. What part of the desktop is this? O Icons O Folder O Notification area O Start button

Answers

Answer:

i think its cortana

icons

Explanation:

Answer:

It's an Icon. Hope this helps please mark me BRAINLIEST

A network consists of five computers, all running windows 10 professional. All the computers are connected to a switch, which is connected to a router, which is connected to the internet. Which networking model does the network use?.

Answers

Answer:

Star. It uses both a switch and a hub. As Star network does.

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation (multiplication and addition and maybe parenthesis)?

Answers

#include <iostream>

int main(int argc, char* argv[]) {

   //One line

   std::cout << "\t\t*\t\t\n\t\t\b* *\t\t\b\n\t\t\b\b*   *\t\t\b\b\n\t\t\b\b\b*     *\t\t\b\b\b\n\t\t\b\b\b\b*       *\t\t\b\b\b\b\n\t\t\b\b\b\b\b* * * * * *\t\t\b\b\b\b\b\n";

   return 0;

}

Yes, it is possible with a single line and using escape sequences, but it is tedious and not recommended. Instead, you can use loops to write more readable and easy on the eyes code. We only used the cout  method (C++). Good luck!

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the _______

Answers

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

What is ERP (Enterprise Resource Planning)?

The Enterprise Resource Planning or ERP is the software which is used by the organization to manage its essential elements such as sales, marketing, accounting etc.

The cloud used to manage this sensitive data is called the Cloud ERP.

Cloud ERP is the system which runs on the cloud platform of a vendor.This system allow the customers and organization to store and manage their sensitive data.

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

Learn more about the Enterprise Resource Planning here;

https://brainly.com/question/14635097

#SPJ1

the contents of a text box may be cleared in visual basic code by ________.

Answers

In Visual Basic code, the contents of a text box can be cleared using the "Text" property of the control. To clear the text box, you can set the value of the "Text" property to an empty string ("").

Clearing the contents of a text box in Visual Basic Code is a simple task that can be accomplished with just a few lines of code.
For example, if you have a text box named "txtName", you can clear its contents using the following code:

txtName.Text = ""

This will set the text box's contents to an empty string, effectively clearing any text that was previously entered.

Additionally, you can use the "Clear" method of the text box control to clear its contents. The "Clear" method is equivalent to setting the "Text" property to an empty string. To use the "Clear" method, you can simply call it on the text box control, like this:

txtName.Clear()

Both methods will achieve the same result of clearing the contents of the text box. The choice of which method to use may depend on personal preference or coding style.

Know more about the Visual Basic Code

https://brainly.com/question/29362725

#SPJ11

Kevin works as a salesperson in a company that manufactures and sells luxury cars. He wants to present a luxury car to Simone, the owner of a luxury car showroom. The customer database team has informed him that she belongs to the expressive quadrant of the social style matrix. What should Kevin do to close the deal

Answers

To close the deal with Simone, the owner of a luxury car showroom who belongs to the expressive quadrant of the social style matrix, Kevin should focus on building a personal connection, showcasing the car's unique features and benefits, and emphasizing the car's ability to enhance Simone's image and social status.

Since Simone belongs to the expressive quadrant of the social style matrix, she is likely to value personal relationships and enjoy being the center of attention. Therefore, Kevin should aim to establish a personal connection with her. He can start by researching Simone's interests, hobbies, and preferences, and using that information to engage in conversations that resonate with her. By showing genuine interest and actively listening to Simone, Kevin can build rapport and trust, which are crucial for closing the deal.

When presenting the luxury car, Kevin should emphasize its unique features and benefits that align with Simone's preferences and aspirations. He can highlight the car's advanced technology, superior performance, and luxurious design, making sure to emphasize how these features enhance the overall driving experience. Additionally, Kevin can tailor his presentation to focus on the aspects that are most likely to impress and captivate an expressive individual like Simone.

Furthermore, Kevin should highlight how owning the luxury car can elevate Simone's image and social status. Expressive individuals often value recognition and seek opportunities to stand out from the crowd. Kevin can emphasize how the car's prestigious brand, elegant aesthetics, and exceptional craftsmanship will make Simone a trendsetter and symbol of success within her social circle. By appealing to Simone's desire for recognition and admiration, Kevin can create a compelling case for why the luxury car is a perfect fit for her showroom.

In summary, to close the deal with Simone, an expressive individual, Kevin should focus on building a personal connection, showcasing the car's unique features and benefits, and emphasizing its ability to enhance Simone's image and social status. By understanding Simone's preferences and aspirations, Kevin can tailor his approach to resonate with her and increase the chances of a successful deal.

learn more about social style matrix, here:
https://brainly.com/question/8894110

#SPJ11

O
(c) Write a code segment to change the name of the Thing object something such that the new name consists of the old name with one character removed at random. For example, if
something has name "ABCD", its new name could be set to "ACD
Write the code segment below

Answers

The program written in python 3 which randomly removes one alphabet from a string and returns the new string is written thus:

import random

#import the random module

def rand_minus(s):

#initialize a function named rand_minus which takes on one parmaters, which is a string

minus_1 = random.sample(s, len(s)-1)

#using the sample method in the random module, randomly select alphabets which is one lesser than the number of alphabets passed in.

new =''

#initialize an empty string named new

for alp in minus_1:

#loop through the randomly selected alphabets in the list

new+=alp

#place each alphabet in the empty string created

return new

#return the string in the new variable.

# A sample run of the program and its output are attached below.

old = 'ABEFCD'

print(rand_minus(old))

Learn more :https://brainly.com/question/25210352

O(c) Write a code segment to change the name of the Thing object something such that the new name consists

What is the binary equivalent of the decimal number 138?

Answers

Answer:

10001010

Explanation:

Select the correct answer from each drop-down menu.

Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this represent?

This scenario depicts a. Public b. Private c. Hybrid d. Community a

cloud model. A third-party service provider hosts this cloud a. Only off site b. Only on site c. Both off site and on site

Answers

According to the information, the correct answers are Community cloud model, and Only off site.

How to find the correct options?

To find the correct options we have to consider that in this scenario, three healthcare firms jointly own and share the same cloud resources to meet their computing needs. This represents a Community cloud model.

The Community cloud model is a type of cloud computing model where cloud resources are shared among organizations with common interests, such as industries or sectors. In this case, the three healthcare firms are pooling their resources and using a shared cloud infrastructure to meet their computing needs.

Additionally, the scenario states that a third-party service provider hosts this cloud. This means that the cloud resources are hosted off-site, typically in a data center owned and managed by the third-party service provider.

Learn more about health service in: https://brainly.com/question/27936248

#SPJ1

Help ASAP!!Choose all the basic elements of algorithms. A.Selection B.Loops C.Flow Charts D.Sequencing E.Combinations F.Iteration

Answers

Answer:

b c d

Explanation:

Answer:

A, C, E, F

Explanation:

Just took the test

If person A creates an image with a creative common license. Person B then uses the image on his website. Who own the image and why?

Answers

Person A, of course. This person is the original maker of the image therefore that person has the rights to that image, person B does not automatically become the owner just by using it on his website. So the answer is person A.
Other Questions
The scientific study of human development can best be described as Select one: a. emphasizing stability over change b. multidisciplinary c. non-theoretical d. focused on groups rather than individuals 7th grade math , Ill give brainliest my notes a large manufacturing plant uses lightbulbs with lifetimes that are normally distributed with a mean of 1800 hours and a standard deviation of 50 hours. to minimize the number of bulbs that burn out during operating hours, all bulbs are replaced at once. how often should the bulbs be replaced so that only 1% burn out between replacement periods? (round your answer to one decimal place.) Explain how scientists have used metallic bonding to account for many of the physical properties of metals, such as electrical conductivity and malleability. Aidan needs 15 liters of cleaning solution. He can buy a 2 gallon jug If a =(10,4) and b=(2,19) what is the length of ab HELP ME IM TRYING TO MAKE MY PARENTS PROUD OF ME A person has utility function U = A58.5 for goods A and B. Prices of the goods are PA = $10 and Pb= $10 per unit, with income Y = $1200 per month. Marginal utilities are: MUA = A-0.5B0.5 and MUB = A5B-0.5 Graph the budget constraint (with A on the horizontal axis, B on vertical axis.) Document the intercepts (numerically) and slope of constraint. Calculate the utility-maximizing choices of goods A and B. Illustrate graphically and explain your work. The price of good A increases to $20 per unit. Show the price change graphically and find the new utility-maximization combinations of A and B. Explain your work. Plot out the demand curve given the utility-maximizing combinations above. Explain precisely how/Why the price paid for an additional unit of A can represent its marginal value to this consumer. (creative writing) 2. according to the unit, what is a real-life example where objective and subjective writing styles occur side by side? please elaborate on how and why this is possible. Can someone help me please? the ny city public school system has hired the thinkfinity specialists company to design a new test to be used by high schools to help students identify their career interests based on their personality characteristics. thinkfinity specialists company would most likely employ which type of psychologists? True or False. The adverse consequences related to teen pregnancy end when the child is born? What is the process of adapting to prison culture called?a. incarcerationincarceration b. the inmate code c. the inmate code d. prisonizationprisonization e. cultural anthropology Consider the spectra of the two main sequence stars below (Star 1 on the left and Star 2 on the right) and sort the statements into the true or false bins. The intensity axes are not necessarily on the same scale. 350 450 550 Wavelength (nm) 350 45Q750 650 750 Wavelength (nm) true false Star 1 has a longer lifetime than Star 2 Star 2 is bluer than Star 1 Star 2 has a lower mass than Star 1 Star 1 has prominent hydrogen lines Star 2 has a higher luminosity than Star 1 Star 2 is cooler than Star 1. Determine which structural element is used in the following poem. the sea shore i did explore. it was so fun. but now the day is done. (1 point) - tetrameter, - trochaic trimeter,- sonnet,- rhyme scheme rita traveled 1,250 miles in the first 3 days of her trip. at this rate, how long will it take her to travel 1,875 miles? how much would it cost What facts can we learn from the testimony of josephus? Management at a local company asked employees if they were interested in obtaining job training. Responses are summarized by employment type (salaried or hourly), and whether the employee is interested (yes or no) in job training.SalariedHourly (next ----> total)Yes1889107No4471115Total62160222Compute the probability that an employee is salaried. Give your answer as a decimal, precise to at least three decimal places.P(salaried)=P(salaried)=Next, compute the probability that an employee who is interested in training is salaried. Gives your answer as a decimal, precise to at least three decimal places.P(salaried yes)P(salaried | yes) =Finally, use the results from the two preceeding calculations to determine whether or not employment type and interest in training are independent.Yes, the two events are independent.No, the two events are not independent. What is the net annual cost of the following chequingaccounts?a. Monthly fee, $4.20; processing fee, 20 cents percheque; cheques written, an average of 2 a month; $0.40 per debittransaction over Use the extended Euclidean algorithm to find the greatest common divisor of 6,272 and 720 and express it as a linear combination of 6,272 and 720. Step 1: Find 4, andra 6,272 = 720.41 where Osr