List 10 different products made from timber

Answers

Answer 1

Answer:

Bath towels.

Toothpaste.

Nail polish.

Makeup.

Disinfecting wipes.

Medications.

Paints.

LCD screens.

Houses

Buildings

Explanation:


Related Questions

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

What combination of keys will autofill highlighted cells to the right?

Answers

Answer:

it is Ctrl+R            

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

write fade in shorthand​

Answers

Answer:

"Fade In is a Class Act" Macworld says: "Fade In makes it easy to just write...It has all the features you'd find in the more expensive apps, such as Final Draft and Movie Magic Screenwriter, and there's even free and paid iPhone, iPad, and Android apps available

Explanation:

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

what is the main theme of The hundred dresses​

Answers

Explanation:

The main theme of The hundred dresses is about the act of forgiving someone's mistake. i hope so

The main theme of The Hundred Dresses is that we should never judge someone by their name, looks or status. This theme is presented through a Polish immigrant in America, who is bulied by the other girls of her class because she had a "strange" name and she was poor, but then she surprises everyone by her drawing skills.

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice

Answers

Option b (file management system) is used to provide a set of input/output interface.

A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.

The other given alternatives such as:

Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.

These options are not connected to the given question. Thus the above answer is the correct one.

Learn more about the file directory here:

https://brainly.com/question/2170165

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

Employees in your organization regularly need to print sensitive documents. The employees properly dispose of the hard copies of these documents. How can you ensure that electronic copies of these documents are not leaked to unauthorized users after the documents are printed

Answers

Answer: Regularly purge all network printers' hard drive caches.

Explanation:

what do you mean by HDML coding ​

Answers

Answer:

hdml coding is a standard markup language for documents designed to be displayed in a web browser.

Explanation:

it can be assisted using things like CSS or JS

explain the types of computer on the basis of model

Answers

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

A specialized output device for producing charts, maps, and very high-quality drawings is

A. Printer
B. Plotter
C. Scanner
D. OMR​

Answers

Answer:

B- plotter

Explanation:

because it's designed to produce high quality graphics.

A specialized output device for producing charts, maps, and very high-quality drawings is plotter. The correct option is B.

What is plotter?

Plotters are also known as large-format and wide-format printers. They were the first output devices capable of printing high-resolution continuous lines, text, and images in color.

It also aids in generating graphics and full-sized engineering drawings. Plotters cost more than traditional printers.

It interprets computer commands and draws line drawings on paper with multicolored automated pens using plotters. It can generate graphs, drawings, charts, and maps, among other things.

Plotters are used in a wide range of construction and MCAD applications, such as technical drawings, maps, orthophotos, and renders.

Plotter is a specialized output device used to create charts, maps, and very high-quality drawings.

Thus, the correct option is B.

For more details regarding plotter, visit:

https://brainly.com/question/20904644

#SPJ2

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

Match the term with the appropriate definition.
1. motherboard
the central processing unit
2. CPU
a small mobile computer
3. system software
a device that gives you directions
to a certain location
4. GPS
instructions for the computer
written in a programming language
the main board in the body of the
5. laptop
computer
software that helps run the
6. program
computer hardware

Answers

Answer:

1. the main board

2. the central processing unit

3. software that runs

4. a device that gives you directions

5. hardware

6. instruction for the computer

Answer:

1- the main board in the body in the computer

2- central processing unit

3- software that helps run the computer hardware

4-  instructions written for the computer in a programming language

5- small mobile computer

6- device that gives directions

Explanation:

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

Answers

Answer: Deception

Explanation:

Pretty straight forward...

The attacker was then able to gain physical access to a restricted area by following behind the employee into the building, this type of attack is tailgating attack. The correct option is B.

In order to trick a worker, the assailant used a tailgating attack in which they pretended to be a postal worker.

The attacker tricked the employee into granting access to a restricted area by putting on the appearance of a real package delivery.

This type of physical intrusion gets over security precautions and takes advantage of public confidence.

In contrast to digital attacks, a tailgating attack takes use of human weaknesses, hence it is essential for organizations to place a high priority on staff awareness and training to reduce such dangers.

Thus, the correct option is B.

For more details regarding Tailgating attack, visit:

https://brainly.com/question/34195547

#SPJ3

Your question seems incomplete, the probable complete question is:

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

A) Phishing attack

B) Tailgating attack

C) Denial of Service (DoS) attack

D) Man-in-the-middle attack

E) Brute force attack

Still giving out the brainly thing :)
just answer its as simple as that and you get points :)

Answers

Answer:

The answer to that my friend, Is 0 :D

Explanation:

Answer:

4/4

Explanation:

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

who was the first person to invent computer​

Answers

Answer:

Alan Turing

Explanation:

If we're speaking modern terms, I would say Alan Turning

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario

Answers

DDoS hope this helps :3

Guys can anyone tell me answer from this photo Get Branilliest

Answers

Answer:

1. A computer itself

2.I don't no

What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20

Answers

Answer:

what?

Explanation:

what is communication?
What is telecommunications?
what do you mean by model of transmission?

Answers

Communication network requires certain components such as sender, receive,data protocol and medium

telecommunications the message such as text , audio , video through electronic media in the from of electronic signals

The direction of communication from sender to receiver and vice versa

[tex] \huge \bold \blue{AnSweR}[/tex]

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

The transmission of information, as words, sounds, or images, usually over great distances, in the form of electromagnetic signals, as by telegraph, telephone, radio, or television.

The transmission model of communication describes communication as a one-way, linear process in which a sender encodes a message and transmits it through a channel to a receiver who decodes it.

What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

A person is asking you not to use those words/sentences here because it hurt their feelings

Group of programs are software ​

Answers

Answer:

No

Explanation:

a single program or application is a software

Answer:

False

Software categories are groups of software. They allow software to be understood in terms of those categories, instead of the particularities of each package.

ASAP

The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?

- The Great Depression

- World War I

- World War II

- the popularity of television

The first to answer correctly gets a crown and 5 stars. Please help.

Answers

Answer:

The Great Depression and The popularity of television  and the event was The Great Animation Strike  

Explanation:

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

Other Questions
Two closely related beetle species are in the same location. They exhibit reproductive isolation, and they are both diploid. Biologists are arguing about whether it is more likely that they evolved via sympatric or via allopatric speciation. What statement presents the best argument Why did Michael other not like being called big mike A. If you have 8 bags, each weighing 50 lbs., and have to weighout 5 batches at 125 lbs., do you have enough product tomake the batch? The number of patients treated at Dr. Frank's dentist office each day was recorded for nine days: 18, 19, 19, 4, 14, 8, 22, 3, 1. Using the given data, find the mean for this sample. Desde cierto paradero se transportan 300 pasajeros en4 microbuses. Cuntos micros se deben aumentar paraque por cada 3 micros se transporten 90 pasajeros? find the surface area of each figure. Round to the nearest tenth if necessary. Someone please answer not really good with math. Which of the following should group members do in order to ask good questions during a discussion?(1 point)A. Listen closely.B. Speak loudly.C. Use evidence.D. Share feelings.What makes a question or comment relevant to a discussion?(1 point)A. It is clearly connected to the topic.B. It follows the rules set by the group.C. It responds to a question.D. It explores an idea. Your quality of life is the extent to which you experience a healthy, happy, and fulfillinglife.TrueFalse list any two draw backs of the first generation computer Martin Luther King Jr. often spoke of a day in the future when he hoped that his children would be judged not by their skin color but instead by their character. Write a narrative essay about a moment in your life when you were judged by something other than the content of your character. Use narrative techniques to develop experiences, events, and characters.Please don't copy someone else's work, I need an original story. And please do it fast, but don't rush.Thanks!25points Read this sentence."The Civil Rights Movement was a social movement that had goals of ending racism and segregation and gaining legal rights and access tobetter education and jobs for African Americans."What type of definition is provided in the sentence?what type of definition is provided in the sentence? what is the meaning of fraper? A machine uses filtration to separate a component from orange juice. Which component does the machine most likely separate from the mixture?(1 point)waterwaterpulppulpsugarsugarpigmentWhich method of separation would be most appropriate for separating a mixture of water and alcohol?(1 point)chromatographychromatographydistillationdistillationfiltrationfiltrationevaporationWhich method separates components of a mixture according to how quickly the particles travel through a medium?(1 point)chromatographychromatographyfiltrationfiltrationevaporationevaporationdistillationThe boiling point of water is 100C. The boiling point of acetone is 56C. Which statement about distilling a mixture of acetone and water is correct?(1 point)Acetone remains in the original container.Acetone remains in the original container.Acetone is captured and cooled.Acetone is captured and cooled.Water is collected as it leaves the mixture.Water is collected as it leaves the mixture.Water will vaporize from the mixture before acetone.Substance A and substance B are mixed together. To separate the mixture, water is added, and substance A is filtered out. Then, the remaining liquid is heated to remove the water, leaving a residue of substance B. Which statement about substance A and substance B could be correct?(1 point)Substance A is rice, and substance B is sugar.Substance A is rice, and substance B is sugar.Substance A is sand, and substance B is alcohol.Substance A is sand, and substance B is alcohol.Substance A is alcohol, and substance B is salt.Substance A is alcohol, and substance B is salt.Substance A is sugar, and substance B is instant coffee. laws of thermodynamics Plz helpWhich individual would most likely have agreed with the actions taken by President Roosevelt, as shown in the cartoon? O A. John D. Rockefeller O B. Andrew Carnegie O C. William Howard Taft O D. Ida Tarbell a friend you write to is called 26. A dealer was paid 5% commission on all the recharge cards he sold. If he sold N50,000.00 worth of cards, how much commission did he get? Ngoi hnh trn th Hnh no c v s trc i xng 1. use/ scissors/ tool are/ for/ sharp/ very young children_________________________________________________2. wrong/ consider/ they/ smoke/ it/ in public places_________________________________________________3. let/ I/ stay/ think/ them/ should/ the weekend/ until/ we_________________________________________________4. climb/ the first/ oxygen/ who/ Everest/ without/ person/ was?_________________________________________________5. noticed/ run/ him/ from/ away/ she/ home_________________________________________________6. made/ the film/ laugh/ right from/ them/ the first fewminutes._________________________________________________7. I'll/ look at/ the plumber/ have/ the central heating boiler_________________________________________________8. the answer/ you/ it/ work out/ clever/ of/ was_________________________________________________9. the tourists/ back/ when/ be/ the guide/ didn't/ tell/ at thecoach_________________________________________________10. hear/ enough/ the guide/ clearly/ everyone/ didn't/ loudly/ for/speak _________________________________________________