Since the image is not given, answer will be subjective. Check more below.
What is VoIP communication?The Voice over Internet Protocol (VoIP), is known to be a kind of a technology that helps a person to be able to make voice calls.
Note that this can be done through the use of a broadband Internet connection and one do not need to use any analog phone line.
Learn more about VoIP from
https://brainly.com/question/14255125
SPJ1
2. What is the difference
between a folder and sub
folder
Answer:
In a computer file system, a subdirectory is a directory that is contained another directory, called a parent directory. A parent directory may have multiple subdirectories. In operating systems with a GUI such as Microsoft Windows, a directory is called a folder, and a subdirectory is called a subfolder.
If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used?.
The feature being used is thin provisioning.
When programmers work together, what is an example of how abstraction in programming can promote collaboration?.
Answer:
. When programmers work together, what is an example of an abstraction in programming that can promote collaboration?
Explanation:
answer choices Team members can rely on one another to explain their code. Programmers can write functions without needing ot know what they do or how they should work.
How to solve level 53 on rapid router?
<img src=/static/game/image/actions/go.svg alt=' + ugettext(play= button)= += '= style=width: 4%;> ) def noPermissionMessage():
Which of the following best describes the average amount of stored data per user for the first eight years of the application existence
The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.
What is RAM memory?The memory of a system is known to bee RAM which is Random Access Memory.
Conclusively, This is known to be a part of system hardware where operating system (OS), and data are saved. The option that best describes the average amount of stored data per user for the first eight years of the application existence is memory.
Learn more about data from
https://brainly.com/question/19243813
#SPJ1
What is the purpose for brainstorming & screening in product/service management?
Maintain revolving inventory
Generate new product ideas
Evaluate management effectiveness
Evaluate feedback from competitors
Answer:
Generate new product ideas
Explanation:
Brainstorming allows for new ideas to come up and screening allows us to confirm that we are not recycling old ideas
If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ________ the file
Answer:
copy
Explanation:
To work with dates, you need to import Group of answer choicesthe date class from the datetime modulethe date, time, and datetime classes from the datetime modulethe date and datetime classes from the datetime modulethe date class from the date module
Answer:
datetime.time
Explanation:
datetime.time is an idealized time that assumes there are 86,400 seconds per day with no leap seconds. This object stores the hour, minute, second, microsecond, and tzinfo (time zone)
Which of the following describe the characteristics of a good logo? Choose all that apply. It is a complex design It is memorable. It utilizes the elements of design. O It is trendy
Answer:
It is memorable.
It utilizes the elements of design.
Explanation:
IMO these 2 will determine a good logo. Since everyone should remember it if they come across it again in the future
if you click on repeat header rows what will happen?
Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the transaction is being made with the intended party
Answer:
Security in communication between applications and sites in m-commerce can use SSL technology.
Explanation:
While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.
A company sells computers only over the internet. Customers can decide their own computer configuration at the company's website and then place the order for the computer. This is an example of:
Answer:
This is an example of business to consumer e commerce
what is the chip that allows the screen to work
Answer:
V-chip technology works much like closed captioning and uses the vertical blanking interval in the television signal.
Answer:
V-chip technology works much like closed captioning and uses the vertical blanking interval in the television signal.
Explanation:
What can designers use multimedia authoring tools for?
Answer:
A. creating and editing video
You are building a game that needs to do the following:
•Make the player unable to cross walls of yellow blocks
•Make the player "faint" and start
over if it touches a red block
•Make the player win if it touches a green block
Which three modules would you need to use?
A. An "if () then" block that outputs movement to the initial position if
the sprite touches a red block.
B. An "if () then" block that outputs a small change in position if the
sprite touches a yellow block, one for each direction
C. A "forever" block that outputs different messages in sequence as
the player navigates
D. An "if () then" block that outputs a happy sound
the sprite touches a green block
and message if the spirit touches a green block
Part B Identify the Boolean data type in the database and explain why it is a Boolean field.
Answer:
Talent Show Registration
Explanation:
Boolean is True or False so the only one that is true or false is Talent Show Registration as there is Yes and No
Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is odd, or the two middle characters if the length is even. Write the main that tests this function.
Answer:
Note: a) If the length of the string is odd there will be two middle characters.
Explanation:
b) If the length of the string is even there will be one middle character. There was a problem connecting to the server. Please check your connection and try running the trinket again.
In what higher-order function do you apply a predicate to each value within a list, and if the predicate returns true, the value is added to an object
Answer:
Returning function
Explanation:
As functions are objects, we can also return a function from another function. In the below example, the create_adder function returns adder function.
You want to a get a rough idea of how many art assets you'll need to create for your next project. What is the best way to do this?
A. Ask for advice on Scratch's forum section
B. Build off a similar Scratch project
C. Write out a prototype of your project on paper
D. Examine the code from a similar Scratch
project
The best way to do this is to Ask for advice on Scratch's forum section.
Why is art an asset?Art as is known to be an asset because it is said to be attractive and its worth often grows up in the long run.
Note that The best way to do this is to Ask for advice on Scratch's forum section as one will be able to know what to do and not to do.
Learn more about art assets from
https://brainly.com/question/8084221
#SPJ1
15. Question
What type of network address space allows for nodes on a network to communicate with each other,
but prevents any gateway router from forwarding traffic there, and are reserved for internal
networks?
58:1
Subnet mask
Non-routable address space
IP address
MAC address
Type here to search
O
briefly explain the emerging trends in micro computer technology according to size
Answer:
Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022
This is an example of what type of formula?
=(D1+D17)
Question 2 options:
ADDITION
SUBTRACTION
RANGE
AVERAGE
Answer:
Average
Explanation:
The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.
The critical components of the operating system that remain in memory as long as the computer is running are commonly known as the
Answer:
KERNEL
Explanation:
Q:
The critical components of the operating system that remain in memory as long as the computer is running are commonly known as the
A:
KERNEL
Ninety percent of the fastest-growing jobs require some kind of postsecondary education.
true
false
Answer:
True
Explanation:
Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists
Answer:
captures data in whatever format it naturally exists
Explanation:
quizletBig Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the use of structured data captures data in whatever format it naturally exists
Cost and equity is one of the four intertwined issues that must be taken into consideration when institutions thinks of implementing ICTs in teaching and learning
The major issues includes in the e-learning with the use of ICTs are cost, effectiveness, equity and sustainability.
What is ICTs in teaching and learning?ICT or Information and Communication Technology are used to communicate, create and manage the information source.
The use of ICTs in education forms the basis for e-learning. There issues faced in considering ICTs in education include cost, effectiveness, equity, and sustainability.
Thus, the given statement about the issues faced by ICTs in education is correct.
Learn more about ICTs, here:
https://brainly.com/question/20717870
#SPJ1
Which method would you use to get the value associated with a specific key and remove that key-value pair from the dictionary
Compose an e-mail to your coworker Adam that describes how to add a photograph to a slide.
The ways to add a photograph to a slide is given below: What to write when composing the email is also given below.
How do you Insert photos into a slide?The steps are given below?\
The first thing to do is to open the slide you want to insert the image on.then click on Insert menu, and take the cursor to the Picture, and then one can click Photo Browser or insert pictures.Then select the picture that you want and and one can drag it onto the slide.Note that it is essential to follow the steps and one can add as many pictures as they want to their slides.
Learn more about e-mail from
https://brainly.com/question/24506250
#SPJ1
write a letter to your future self :”Imagining a world in 2030”.Be sure to mention things that you think your future self would probably be doing and experiencing in daily life. You may include your hobbies, your surroundings, the role of AI in your life, etc.
To write a letter to your future self, follow the steps:
Start with an introduction in the first paragraph.The next is what you want your future self to know in the second paragraph.The last is conclusion in the third paragraph.What is a Letter?A letter is known to be a form of a written message that passes information from a person to another.
Note that by following the steps above, one can be able to write a letter to your future self.
Learn more about letter from
https://brainly.com/question/24140747
#SPJ1
A text-editing application uses binary sequences to represent each of 210 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters
Answer:
8
Explanation:
The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
What are binary sequences?A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros. The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.
Historically, the most commonly used text code is the IRA or the International Reference Alphabet, in which each character in this code is represented by a unique 7-bit pattern. Since each character in this code is represented by a 7-bit binary code, there are 128 different characters that can be represented here.
The characters that are encoded with International Reference Alphabet, are always stored and transmitted using 8-bits per character, where the 8th bit is a parity bit mainly used for error detection.
Therefore, The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.
Learn more about binary code on:
https://brainly.com/question/29792509
#SPJ2