a two year college degree that focus on arts, humanity, and social sciences, are called an

Answers

Answer 1
Associates of Applied Science.

Related Questions

If the mine winch drum diameter is 6M, how far will the counterweight lift for each single rotation of the drum

Answers

Answer:

Circumference of drum = 18.86 m

Given:

Diameter of drum = 6 m

Radius of drum = 3 m

Find:

Circumference of drum

Computation:

Circumference of drum is called single rotation

Circumference of drum = 2πr

Circumference of drum = 2[22/7][3]

Circumference of drum = 18.857

Circumference of drum = 18.86 m

True or false A job analysis weight the positives and negative of a given career

Answers

the answer to the given question is true in my opinion.

A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could use at least one type of input and one output to create a physical computing device to help this friend.

Answers

Answer:

We can add a water temperature guage with an alarm to show off that the tank is hot or cold

Explanation:

Answer:

Simple:

Explanation:

We could add a temperature sensor connected to the water, and a heater / cooler connected to the sensor, we created a program that checks the temperature from the sensor, making sure that when the water is hotter than recommended, we turn on the refrigerator, and when it is cooler, we turn on the heater

Which of the following statements is true regarding ARPANET? Select 3 options. It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers. It was a product of Bell Laboratories and was introduced to the general public in 1966. It was managed by three large corporations throughout its existence.

Answers

Answer:

1. It led to the development of the Internet.

2. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.

3. It was created to connect geographically dispersed researchers with high powered research computers.

Explanation:

ARPANET which stands for Advanced Research Projects Agency Network, was originally a form of network designed to provide wide-area packet-switching network combined with functions of control distribution through execution of the TCP/IP protocol suite.

Consequently, it led to the specialized establishment and creation of internet. Also, during its execution the first message sent through ARPANET was in 1969 and it was later decommissioned in 1990. The idea behind ARPANET creation was to connect geographically dispersed researchers with high powered research computer.

Answer:

b. It led to the development of the Internet.  

c. It was created to connect geographically dispersed researchers with high powered research computers.  

d. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.  

What should Tuan do in the following scenario? Tuan wants to add a guest account to his computer for his little brother, but when he goes to the System and Security folder, he can not find the right option.

A) Go to Choose Homegroup and Sharing Options.
B) Go to Ease of Access.
C) Go to Appearance and Personalization.
D) Go to User Accounts and Family Safety.

Answers

Answer:

Tuan should do D.

Explanation:

As in if you use the mac, or any other computer, you would find the accounts in User Accounts and Family Safety or something like that. Go there, authenciate/unlock the computer, and press the + button or enable the guest. That is how you do it.

The answer is D because he wants to add an account so he would go to user accounts

Before you could train as a physician, you first had to become _____.

Answers

Answer:

a scribe

Explanation:

Answer:

before you could train as a physician you have to be a Scribe

Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
add a title to a chart
change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart

Answers

Answer:

add a title to a chart

change the way a chart looks

change the type of an existing chart

Explanation:

In Microsoft Excel, a chart tool design tab is used to design and customize the look, feel and properties of charts in order to meet the taste of a user. Charts are used generally to visually or graphically represent the data in an excel worksheet.

The tasks which can be completed using the Chart Tools Design tab are;

1. Add a title to a chart.

2. Change the way a chart looks.

3. Change the type of an existing chart.

The tasks which can be completed using the Chart Tools Design tab are:

Add a title to a chart  Change the way a chart looks  Change the type of an existing chart

Based on the knowledge of computer spreadsheets, there are various tasks which can be used to complete the Chart Tools Design tab.

These tasks includes:

Add a title to a chart  Change the way a chart looks  Change the type of an existing chart

Read more about design tab here:

https://brainly.com/question/10053553

Ok this a computer question I downloaded a beta intel graphics driver and i am also installing ark editor from epic games but now something is taking up my disk drive its saying on task manager the disk is 100% also i had a driver on before that does anyone know the problem? is the ark editor or me installing the new driver on top of the other the problem?

Answers

Answer:

Uninstall the driver.

Explanation:

I would go to your File Explorer, This PC or My Computer, right click, and go up to manage. It would open up a Computer Management window. You would need to find Device Manager on the left. You would then see alot of devices. Find where it says, Display adapters, click on the little arrow to the left of it. If you see the driver, right click on it, and click uninstall. This also depends on what operating system you're using, and note, you've installed a beta driver, not a tested, fully working driver.

Answer:

Uninstalling the driver will not resolve

Explanation:

This is not a driver problem, it is a disk problem, when you run ark, it starts to use a lot of memory, processor and DISCO, with that the disk gets overloaded leaving the system slower, uninstalling the driver can solve it momentarily, but it could cause more problems in the future, the best way for you to solve it is by buying an SSD and asking a technician to clone the HD to the SSD, the cheapest SSDs cost about $ 30

Which communication device uses wireless data transmission? Select 4 options.

Answers

Answer:

Satellite Internet providers, Smart Speakers, Smartphones and Bluetooth headphones are all wireless data transmissions.

Explanation:

The transmission device that uses wireless data transmission are the smartphones, Bluetooth headphones, satellite internet providers and the smart speakers.

What is wireless data transmission?

Wireless data transmission is the transfer of digital or analogue signals using radio spectrum through the atmosphere. It doesn't involve wire or cables.

The examples of devices that makes use of wireless data transmission include the following:

Smartphones,

Bluetooth headphones,

satellite internet providers and

smart speakers.

A typical example of a device that makes use of cable is the Ethernet. An Ethernet connection transmits data over cable.

Learn more about data transmission here:

https://brainly.com/question/24373056

#SPJ2

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

Besides scrolling manually page by page in, say, Print Layout, identify at least two ways to move to specific locations or objects in a document.

Answers

Answer:

1. We can use the search bar 2. We can use the page number 3. Page Thumbnails

Explanation:

1. We can use the search bar

We type the word we are looking for into the search bar and the application then brings up a locations of the word in the document. We then click on the particular location of the word in the document.

2. We can use the page number

We type in the page number in the page number box to go to the particular page the item is found. When we type in the page we want to go to into the page number box and click enter, the application then goes to that particular page in the document.

3. Page Thumbnails

We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.

in a Print Layout, the two ways one can move to specific locations or objects in a document includes using of search bar or Page Thumbnails.

The two ways one can move to specific locations or objects in a document includes:

Using the search bar: We can type the word we are looking for in the search bar and the application then brings up the locations of the word in the document

Using the Page Thumbnails: We can also use the page thumbnails on the left side of the application to go to a specific location or object in a document.

Read more about Object location

brainly.com/question/12287298

Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was introduced to the general public in 1966. It was managed by three large corporations throughout its existence. It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers.

Answers

Answer:

2. It was created to connect geographically dispersed researchers with high powered research computers.

3. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.

5. It led to the development of the Internet.

Explanation:

The ARPANET has been able to led the development of internet with the first message been sent in 1969 and decommissioned in 1990, as well it connect geographically dispersed research. Thus, statements C, D and E are correct.

What is an ARPANET?

ARPANET has been the first public packet-switched United States based computer network system. ARPANET stands for Advanced Research Projects Agency Network and was first used in 1969.

The statements that describe ARPANET includes:

It led to the development of the Internet. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990. It was created to connect geographically dispersed researchers with high powered research computers.

Thus, statements C, D and E are correct.

Learn more about ARPANET, here:

https://brainly.com/question/3346870

#SPJ5

You are choosing your password for an online retailer. Pick the
strongest password:
Abcdefg
NEWS159737
ThisisMyPassword
12345678

Answers

The strongest pass is NEWS159737

Answer:

NEWS159737

Explanation:

This password uses a combination of letters and numbers, which generally makes the password harder to crack. However, some password cracking software may have been written utilizing the ideals that people will try to use a password with letters, numbers, and symbols, which can actually make it easier to hack a password like 1gh234g1kflc34 than a password such as pass1234.

All of the following are examples of what rigorous coursework in high school might mean except: A) added reading assignments. B) taking twice as many classes as normal. C) faster pace in covering course material. D) increased numbers of quizzes and tests. Can some one please help me Thank u

Answers

Answer:b

Explanation:

The correct option is:

B. taking twice as many classes as normal.

Rigorous coursework in high school typically refers to challenging and demanding academic programs that provide students with in-depth knowledge and critical thinking skills.

While options may vary between schools, rigorous coursework usually includes features such as increased numbers of quizzes and tests, added reading assignments, and a faster pace in covering course material.

However, taking twice as many classes as normal does not necessarily indicate rigor but rather an increased workload.

Rigorous coursework focuses more on the depth and quality of learning rather than the quantity of classes taken.

Learn more about Rigorous coursework click;

https://brainly.com/question/1062173

#SPJ2

Need Help
Redundant Paths
Describe two different paths that a message could take from Person A to Person D.

Answers

Answer:

The possible paths that a message can take from Person A to Person D are;

1) From Person A through Person B, then from Person B to Person D

2) From Person A through Person E, then from Person E through Person C and from Person E to Person D

Explanation:

In information technology networking, network redundancy is the process of message communication through the use of a network communication infrastructure, that includes extra or multiple network communication pathways and devices such that the inter-connectivity of the network is ensured in the event of a device failure.

The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D

For better understanding let's explain this redundant path in this context means

The good description of redundancy is that it is the act of designing a network that can use multiple paths between switches to make sure that there is no single point of failure.From our answer above we can see that there are different path one can take to get to Person D. This shows that redundancy is in place and when an issue occur, there different ways to tackle it or get through to itRedundant path often referred to as Network redundancy is a copied (creating alternatives) infrastructure where more copies or instances of network devices and connections are installed to ensure an alternate path on the advent of failure.

From the above we can therefore say that the answer The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D, is correct

Learn more about redundant path from:

https://brainly.com/question/17880618

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?

Answers

Answer:

C

Explanation:

An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15

The term "bit" means binary digit, and it is used to represent data in a computer system. 4 bits can hold the sum of 14 and 15 because 4-bit is not large enough to represent 29 (an overflow will occur)

The maximum size of data an n-bit computer can hold is [tex]2^n[/tex]

So, a 4-bit computer can hold a maximum of:

[tex]Max = 2^4[/tex]

[tex]Max = 16[/tex]

i.e a maximum of 16 digits

In binary, the digits are 0000 to 1111 i.e. from 0 to 15

So, when 14 and 15 are added, the result is:

[tex]14 + 15 = 29[/tex]

The result is 29.

29 in binary is 11101

11101 is out of the range of the 4-bit binary sequence

Hence, an overflow will occur because 4-bit is not large enough to hold the sum

Read more about binary digits at:

https://brainly.com/question/9480337

All of the following are good reasons to attend a cummunity college except

Answers

I think attending community college is great if that’s what you want and what you can afford then that’s great:))
The meaning or understanding of a community college differs from country to country. In general, this refers to the educational institution that would supply workforce and some with college transfer academic programs. One thing that should not be a reason for attending a community college is the third choice. This is because whatever you take in the community college should allow you to be transferred to a college program that is very much related to your field of study.

What is the typical educational requirement for a non-entry level software programmer? high school diploma technical certificate bachelor’s degree master’s degree

Answers

Answer: technical certificate

Explanation: i just took the test and i got it right

A bachelor's degree in computer science, information technology, or computer engineering is usually required for a career as a computer programmer. Option C is correct.

What education do you need to be a non-entry level software programmer?

Computer programmers create computer programs by creating code in a variety of programming languages. They run new programs through their paces and look for flaws. A bachelor's degree is often required for computer programmers, however some firms may recruit programmers with an associate degree.

Individuals who want to work as computer programmers must have a degree in computer science, information technology, mathematics, or a related field.

A bachelor's degree in computer and information technology or a related discipline, such as mathematics, is often required for computer programmers. Some firms, however, hire people with different degrees or experience in specialized programming languages.

Therefore, option C is correct.

Learn more about the bachelor’s degree, refer to:

https://brainly.com/question/5709442

#SPJ2

Need Help!

Which of the following activities may be legal but are unethical? Check all of the boxes that apply.

A) Cookies deposited by websites collect information about your browsing habits.

B) A law enforcement officer asks you to eavesdrop on a friend’s phone conversations.

C) A computer browser records your browsing history.

D) You download copyrighted movies and games.

Answers

Answer:

A and C are the only legal but unethical options

Answer:

A,B,C

A. Cookies deposited by websites collect information about your browsing habits

B. A law enforcement officer asks you to eavesdrop on a friends phone conversations

C. A computer browswer records your browser records your browsing history

Explanation:

edge 2021

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and ______________. Group of answer choices

Answers

Answer:

Disable.

Explanation:

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and Disable. The aforementioned labels associated with the driver tab of a Windows device are basically the tools which can be used to perform specific functions or tasks on a particular device driver, as well as generate information about them.

For instance, Uninstall button is an action which involves the process of completely removing a particular device driver in Windows.

If you change an item that is not public domain, is the design now yours? Why?

Answers

Answer:

YES, the design of the change item that is not public domain will be mine because I modified it.

Explanation:

Yes , In a situation where I change the item that are NOT public domain the design of the change item will be mine reason been that I am the one that the change the item or modified it .

Therefore PUBLIC DOMAIN can simply be defined as the domain in which every individual or the general public have the right to use without any form of restriction reason been that their is NO any form of property law or restriction law governing them .

This form of restriction law include the following TRADEMARK, COPYRIGHT AND PATENTS LAW.

Therefore despite the public domain is for public use NO individual can own the PUBLIC DOMAIN.

Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the footer and places her insertion point where the page numbers should go. Then, she navigates to the Header and Footer command group in the Design view.

Use the drop-down menus to explain how Angelina should complete this process.

What is her next step?

What should she do next?

What should she do last?

Answers

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

Just did it, e2020

Answer:

Click Page Number, Click Current Position, Click Plain Number 1.

Explanation:

just took it

1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in:​

Answers

Answer:

Centrifugation.

Explanation:

When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in centrifugation.

Centrifugation can be defined as the process of separating particles from a liquid solution according to density, shape, size, viscosity through the use of a centrifugal force. In order to separate these particles, the particles are poured into a liquid and placed in a centrifuge tube. A centrifuge is an electronic device used for the separation of particles in liquid through the application of centrifugal force. Once the centrifuge tube is mounted on the rotor of the centrifuge, it is spun rapidly at a specific speed thereby separating the solution; denser particles are forced to the bottom (by moving outward in the radial direction) and the lighter particles stay at the top as a result of their low density.

What is a Hard Drive

Answers

Answer:

A hard drive is the built-in storage in computers. They have a high-capacity.

Let me know if you have any other questions regarding this topic.

What happens if you give false information on your driver license application?

Answers

Answer:

Cancelled

Explanation:

Providing false information on your driver license application will result in your license being cancelled.

Giving the DMV any false info is considered a crime.

Hope this helped!

Wireless data networks are particularly susceptible to known ciphertext attacks.
A. True
B. False

Answers

Answer:

The answer is TRUE

Explanation:

Wireless data networks uses wireless connections to send information to end users. Information here, are shared within a far distance. Mobile cell phones use wireless networks. Wireless network can be targeted from a distance and are therefore susceptible to attacks among which are ciphertext attacks.

Ciphertext are necessary way of coding a data to prevent readability which in turn would ensure the protection of the data. However, an attacker could attack wireless data networks using ciphertext attacks by decrypting any ciphertext  through the knowledge of the secret key or encrypted key and through a handful of some encrypted messages.

Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose three.)
A. Office documents
B. Contacts
C. Operating system files
D. Email
E. Configuration settings
F. Apps

Answers

Answer:

email ur answer plllllllllllll mark me brainlest.......... ..............

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing.
a. True
b. False

Answers

the answer is B. it is true
The answer is A, it is true

Which statements describe the features of OneDrive? Check all that apply.

Answers

Answer: a,c,e

Explanation:

Answer: a c e

Explanation:

How can the various templates that are available for new Word documents be accessed?

a.) opening up an instance of Word
b.) pressing CTRL+N with Word open
c.) clicking File to enter Backstage View
d.) all of the above

Answers

Answer:

d

Explanation:

Answer:

d - all of the above

Explanation:

Other Questions
When is a Pythagorean theorem true for all triangles? can I get an answer please Calculate net force 532N 215N Fuzzy Monkey Technologies, Inc., purchased as a long-term investment $170 million of 10% bonds, dated January 1, on January 1, 2021. Management has the positive intent and ability to hold the bonds until maturity. For bonds of similar risk and maturity the market yield was 12%. The price paid for the bonds was $151 million. Interest is received semiannually on June 30 and December 31. Due to changing market conditions, the fair value of the bonds at December 31, 2021, was $160 million. Required: 1. to 3. Prepare the relevant journal entries on the respective dates (record the interest at the effective rate). 4. At what amount will Fuzzy Monkey report its investment in the December 31, 2021 balance sheet 3.Political change according to the will and aspiratio of people brings social and economic changesin the country? Present your logics in the formof an article for a newspaper. Which of the following is NOT true of spiral galaxies?A. New star formation is common in the arms.B. They have a central bulge containing mostly older, red stars.C. They are the dimmest of all galaxy types.D. Gasses and stars are more concentrated in the arms. How does inclusions represent the principlesWill give 15 points this has to be turned in ASAP can y'all help me Bile is made in the _________ and stored in the _____________. When food enters the small intestine from the ____________, bile is released into the intestine through the ___________________. The function bile is to improve the digestion of _______. It does this by emulsifying the fat. This means that instead of being in big globules, the fat is held in the digestive juices as lots of small droplets.This increases the _________ area of the fat and makes it easier for the ___________ to reach all the fat molecules. which do you chose i need help!! 1. To determine simple interest, we use the formula i=prt where i is the interest, p is the principal or initial amount, r is the interst rate and t is the time. Sometimes it can be tricky to know what value to use when calculating t. A. What would you plug into the simple interest formula for t if you were given a time of 3 years? B. What would you plug into the simple interest formula for t if you were given a time of 4 months? C. What would you plug into the simple interest formula for t if you were given a time of 45 days? 5. Find the value that makes each statement true.2*? = 2-2*? = -22 *? = 1-2*?=1 Terrence walks at a pace of 2 mi/h to the theater and watches a movie for 2 h and 15 min. He rides back home, taking the same route, on the bus that travels at a rate of 40 mi/h. The entire trip takes 3.5 h. How far along this route is Terrences house from the theater? Explain. Why did Portuguese sailors round the southern tip of Africa in 1488? The influence of biology on the development of technology and engineering1. Give some of your examples where knowledge from biological science has contributed to the development of some technological processes; 2. List some (for you) famous scientists who have contributed to the development of biological science and applied biological sciences. This should be a research paper in the form of a paper e.g. Please help,write a lot, everything you know Question 10 of 10There are five different types of nucleotide bases found in living things. Whichis an accurate comparison of the bases found in robins and the bases foundin sparrows?A. Robins and sparrows have different types of bases.B. Sparrows have only one type of base in their cells; robins havemany.C. Robins and sparrows have the same arrangement of the bases.D. Robins and sparrows have different arrangements of the bases. Make a Iist of Northern and Southern advantages. Based on the passage, which of the statements concerning the tradingcity of Hangzhou is most accurate? What of the following statements is true of a microbiome?a.It refers to the collective genes of a specific bacterial sample.b.It is a collection of disease-causing bacteria.c.It is a group of protein-digesting fungi.d.It is a group of fat-digesting bacteria. need a answer ASAP What conclusion can be drawn about the authors point of view of women in the palace? They seem wicked. They act too bashfully. They appear to be modest. They are confident in themselves.