Drive
0101
0102
0103
0104
0105
0106
0107
0108
0109
0110
0111
0112
0113
0114
0115
0166
Sorting Minute
True
102
162
165
91
103
127
112
137
102
147
163
109
91
107
93
100
An Excel table can help
you organize your data in
preparation for using it
with charts and other
analysis tools.
Copyright © 2003-2022 International Academy of Science. All Rights Reserved.
False

Answers

Answer 1

Answer:

What

Explanation:

True


Related Questions

The first field in an 802. 11 header is known as a ________

Answers

The first field in an 802. 11 header is known as a the frame control.

What is the first field in an 802.11 header?

The first three fields are:

Frame ControlDuration/ID,Address 1

Note that  it is also made up of reserved types and subtypes and thus, The first field in an 802. 11 header is known as a the frame control.

Learn more about file field from

https://brainly.com/question/13189580

#SPJ12

Data erasure software uses standards that are called.

Answers

Data erasure software uses standards that are called Typically, a software program device is used for information erasure like BitRaser, which implements the overwriting sample primarily based totally on the usual used, together with US DoD 5220.22, NIST 800-88.

What is statistics erasure?

For virtual garage devices, erasing names after its developer, the Gutmann set of rules is a way of disk wiping that overwrites statistics the usage of a complete of 35 passes. This makes it one of the maximum steady statistics erasure methods, however additionally the maximum time-consuming.

The statistics manner that zeros and ones are verifiably overwritten onto all sectors of the device. This renders all statistics completely unrecoverable at the same time as retaining the capability of the device the beyond few years, NIST Special Publication 800-88 has end up the go-to statistics erasure preferred withinside the United States.

Read more about the software :

https://brainly.com/question/1538272

#SPJ1

Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer

Answers

I believe Vulkan Ubisoft uses it for there large scale game for them to work on computer that can’t handle them

when scrum team members meet and collaborate with each other to find the best way to build and deliver the software to the customer, which of the following agile values is being practiced?

Answers

The agile values is being practiced is Individuals and interactions over processes and tools.

What is individuals and interactions over processes and tools?

This is known to be a first value that is seen in the Agile Manifesto as it is “Individuals and interactions over processes and tools.”

Note that it place Value of people more highly instead of processes or tools and as such, The agile values is being practiced is Individuals and interactions over processes and tools.

Learn more about  scrum team  from

https://brainly.com/question/4763588

#SPJ11

3. Describe how you would properly dispose of the following materials so that you do not damage the environment. Write on each topic below.
CRT monitors
Scanners
Batteries
Ink/Toner
Hard Drives

Answers

Alkaline and zinc-carbon batteries may be securely disposed of in your domestic garbage in the majority of areas.

What is disposing of?

Disposing of is the process of completely destroying any material completely.

It's critical to adhere to established practices for electronic device disposal, in addition, to securely protecting sensitive information on electronic devices.

The most effective method of preventing outsiders from obtaining your information is to physically destroy a gadget.

Your computer disc and other gadgets can be destroyed using specialized services that can burn, melt, dissolve, or pulverize them.

These techniques of sanitization are used in authorized incineration facilities or outsourced metal destruction facilities, and they are intended to totally destroy the media.

If you don't want to utilize a service, you may break your hard drive yourself by hammering nails or drilling holes in it.

Hence batteries may be securely disposed of in your domestic garbage in the majority of areas.  

To learn more about the disposing of refer ;

https://brainly.com/question/15709251

#SPJ1

Match the careers with the career clusters.

Answers

The careers with the career clusters are:

A. Architecture and construction:

CarpenterGeologist

B. manufacturing:

Sewing machine operatorQuality assurance inspector

C. Agriculture, food and natural resources:

Animal trainerFarm labor and contractor

D. Energy

Wind turbine engineerElectrician  

What is a career cluster?

Career Clusters are known to be made up of different occupations that belongs to the same field of work that often needs the same skills.

Therefore, the matchup above are correct.

See full question below

Match the careers with the career clusters. (two answers in each group)

CAREERS

1. electrician

2. wind turbine engineer

3. sewing machine operator

4. geologist

5. quality assurance inspector

6. farm labor contractor

7. animal trainer

8. carpenter

GROUPS

A. architecture and construction

B. manufacturing

C. agriculture, food and natural resources

D. energy

Learn more about career from

https://brainly.com/question/11952179

#SPJ1

after input is finished, another call to read would return which of the following to indicate that the end of the file has been reached?

Answers

After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

What is data read from a file?

When data is said to read from a file, it is said to fully or automatically saves itself in a variable. Note that If a file is said to already exists, one can open it.

Note that After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

Learn more about input from

https://brainly.com/question/5451281

#SPJ11

When there are conflicting gpos, what's the order in which they're evaluated and applied?

Answers

When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.

What is the conflict about?

Note that when trying to know which policy settings to apply, the local policy of the machine is said to be examined, followed by site policies, then domain policies, and lastly the policies on all the OUs that has all the object being processed.

Therefore, When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.

Learn more about conflicting from

https://brainly.com/question/24769299

#SPJ12

a diminished triad can be indicated by

Answers

A  diminished triad can be indicated by A lower-case Roman numeral and °.

How do you Know a diminished triad?

In any diminished triad, the middle and top two notes of the chord are known to be the flattened and shown by the symbol "o" or "dim."

Therefore, A  diminished triad can be indicated by A lower-case Roman numeral and °.

See options from below

A diminished triad can be indicated by:

A) A lower-case Roman numeral and °.

B) A lower-case Roman numeral and +.

C) An upper-case Roman number and °.

Learn more about triad from

https://brainly.com/question/4951751

#SPJ11

A/An is useful in comparing data values from populations with different means and standard deviations.

Answers

A useful tool in comparing data values from populations with different means and standard deviations is z-score.

What is a Z-score?

This is known to be a kind of numerical measurement that tells a value's association to the mean of a group of values.

The Z-score is said to be measured in regards to standard deviations that arises from the mean.

Note that A useful tool in comparing data values from populations with different means and standard deviations is z-score.

Learn more about z-score from

https://brainly.com/question/25638875

#SPJ11

C. What is windows operating system? Compare different versions of operating system after 2003

Answers

Answer:

:)

Explanation:

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows OS from 1985 to present day.

The Windows operating system (Windows OS) for desktop PCs is more formally called Microsoft Windows and is actually a family of operating systems for personal computers. Windows has traditionally dominated the personal computer world, running, by some estimates, more than 75 percent of all personal computers. Beginning in the early 2000s, Windows dominance has lessened with the growth of the Linux and Mac operating systems.

Windows provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. In addition to Windows operating systems for personal computers, Microsoft also offers operating systems for servers and mobile devices.

Windows is also the foundation for the Microsoft Office productivity suite. Introduced in 1990 as a Windows-only family of applications for desktop computers, Office has grown to become the world’s most widely used productivity suite, with windowscentral.com reporting an estimated 1.2 billion + user worldwide as of 2016.

Which is a major drawback of muliuser procesing of a database

Answers

The main drawback of multiuser processing of a database is:

Lost-update problem.

What is  lost-update problem?

In the area of lost update problem, an update that has been carried on to a data item by a transaction is said to be lost as it is known to be overwritten by the update that has been carried on by another transaction.

Therefore, The main drawback of multiuser processing of a database is:

Lost-update problem.

Learn more about database from

https://brainly.com/question/26096799

#SPJ12

what type of e-mail typically lures users to sites or asks for sensitive information?

Answers

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

What is a phishing email?

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: https://brainly.com/question/14954901

#SPJ11

When there is a missing DLL file, _______.
A. Hard drive needs to be scanned
B. the computer will display error messages
C. Applications might run slowly

Answers

Answer:

B. the computer will display error messages

When there is a missing DLL file, the computer will display error messages. The correct option is B.

What is a DLL file?

DLL is dynamic link library is a concept of Microsoft implementation of the shared library concept of Microsoft Windows. This library contains codes and data that can be use in making a program.

Thus, the correct option is B. the computer will display error messages.

Learn more about a DLL file

https://brainly.com/question/23551323

#SPJ1

A web search engine is a that helps you locate on the web.

Answers

A web search engine is a software which helps you locate on the web.

A web search engine is a software that searches the web  for information is known as a web search engine. A user query's search results are frequently presented as a list. Web pages, pictures, and other file kinds could be included in the lists.

some major search engines are  Yahoo , Bing etc

Learn more about search engine here:

https://brainly.com/question/20850124

#SPJ10

what is the size of the rc.conf file in bytes

Answers

Answer:

It is 281 bytes.

In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.

What is rc conf file?

The rc. conf file is known to be a file that often specifies the kind of services that needs to  be enabled in course of system startup by the startup scripts that was invoked by /etc/rc (see rc(8)), and that also ashutdown scripts that is said to be invoked by /etc/rc. shutdown.

Note that In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.

Learn more about bytes from

https://brainly.com/question/6835146

#SPJ11

You have a server that has a 100basefx network interface card that you need to connect to a switch. the switch only has 100basetx switch ports. which device should you use

Answers

Media Converter is the device that you will use to switch only has 100BaseTx switch ports.

What is a network media converter?

A media converter is known to be a kind of networking device that helps to link two different media, such as Ethernet copper and Ethernet fiber.

Note that they can link devices that are more that 100 meters from the close available switch and as such, Media Converter is the device that you will use to switch only has 100BaseTx switch ports.

Learn more about Media Converter from

https://brainly.com/question/24858866

#SPJ1

Under the fair use doctrine, which group of people are allowed to use certain
portions of copyrighted material without permission?
O A. Web developers
OB. Teachers
C. Entrepreneurs
OD. Producers

Answers

Answer:

the answer is b fair use lets people teachers use some copy right materials since this is instruction

Hope This Helps!!!

Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

Answers

Answer:

Internet transportation exchanges brings together shippers who post LOADS and carriers that post their AVAILABLE CAPACITY in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not

ram is ________ and has no moving parts.

Answers

RAM is Electronic (solid state) and has no moving parts.

What is a RAM in computer?

RAM is known to be an random-access memory as it is said to be a short term memory and it is the place where data is saved as the time the processor requires for it.

Note that RAM is Electronic (solid state) and has no moving parts as it is often inbuilt in a computer system.

Learn more about RAM From

https://brainly.com/question/13196228

#SPJ11

The iso 14001:2004 standards require documentation of a firm's environmental program. Which component requires a plan to improve performance in resource use and pollutant output?

Answers

The component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.

What is a pollutant?

Pollutant simply means a substance that is harmful to the environment.

In this case, the component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.

Learn more about pollutant on:

brainly.com/question/25537936

#SPJ12

Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know that _________.

Answers

Answer:

there are exactly two elements between those two elements

what is computer generation​

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

What is the principle of operation of the INS?

Answers

The principle of operation of the INS is referred to as dead reckoning.

What is INS?

INS is acronym for Inertial Navigation System and it can be defined as a navigation device that is designed and developed to make use of motion sensors, a computer, and rotation sensors, so as to continuously calculate by dead reckoning the velocity, position, and orientation of an object in motion.

Based on Engineering and Aircraft Avionics, we can infer and logically deduce that the principle of operation of the Inertial Navigation System (INS) is referred to as dead reckoning.

Read more on INS here: https://brainly.com/question/26052911

#SPJ12

an estimated _____ percent of all college students suffer from ptsd.

Answers

An estimated amount of nine (9) percent of all college students suffers from PTSD.

What is the meaning of Post Traumatic Stress Disorder (PTSD)?

Post-traumatic stress disorder (PTSD) is a mental health disorder caused by experiencing a traumatic incident.

It can emerge after experiencing or witnessing a traumatic incident from symptoms includes from such as:

Flashbacks from accidents or war,Nightmares,Acute anxiety, as well as Uncontrolled thoughts from abuse.

According to statistics, it is estimated that nine (9) percent of all college students suffer from PTSD.

Learn more about Post Traumatic Stress Disorder here:

https://brainly.com/question/13097232

#SPJ12

What type of relational methods that allow you to insert or update records and extract information from records for viewing? comptia

Answers

Data Manipulation Language (DML) allows a user to insert or update records and extract information from records for viewing.

What is a relational database?

A relational database is a type of database designed and developed to store, structure and recognize relation which exist between data points and items of information.

In database management system (DBMS), a type of relational methods which allows an end user to insert or update records and extract information from records for viewing is known as Data Manipulation Language (DML).

Read more on database here: brainly.com/question/13179611

#SPJ12

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

Suppose that you want to write a program that inputs customer data including name, zipCode, balance, and regionNum. At the end of the program, a summary of the number of customers in each of 12 sales regions who owe more than $1000 each is displayed. The most likely statement during the main processing loop would be _________.

Answers

The most likely statement during the main processing loop would be

customerCount[regionNum] =

customerCount[regionNum] + 1

What is a processing loop?

A loop means a sequence of instruction s that is continually repeated until a certain condition is reached.

In this case, the most likely statement during the main processing loop would be customerCount[regionNum] = and customerCount[regionNum] + 1.

Learn more about loop on:

https://brainly.com/question/4510147

#SPJ12

Convert (765)octal into hexadecimal​

Answers

Answer:

1F5

Explanation:

First convert octal 765 into binary values with each octal digit as a representation using 3 bits

Octal 7 ==> 111

Octal 6 ==> 110

Octal 5 ==> 101

Putting it together we get
111110101

Now group the bit values into groups of 4 (with leading zeros if necessary) starting with the rightmost bit.

Groups are highlighted and then the hex value is written

Right-most group 111110101  and 0101 is 5 hex
Middle group: 111110101  and 1111 is F hex

Left most group: 111110101 ; with leading zeros it is 0001 which is 1 hex

So from left to right we get 1F5

Other Questions
write a gueine apology letter to get unbanned from a sever Write a class with name shares shares( ) constructor to initialize the object shares(String , int , int ) constructor to initialize the object void buy( ) for buying the shares void sell( ) for selling the shares calc( ) to calculate the total value of shares show( ) to show the details. Note : buy( ) and sell( ) functions will increase or decrease the number of shares, and accordingly the Total value of shares will change. Create another class and write main( ) function and use the above functions....use : string nm(name of buyer)int no(no. of shares)int unitprc(price of 1 share)int totalval (total value of all shares) help please what is ve questions from this section 18 A bus left Nairobi at 8.00am and traveled towards Busia at an average speed of 80km/hr. At 8.30 am a car left Busia for Nairobi at an average speed of 120km/hr. Given that the distance between Nairobi and Busia is 400km. ve questions from this section 18 A bus left Nairobi at 8.00am and traveled towards Busia at an average speed of 80km / hr . At 8.30 am a car left Busia for Nairobi at an average speed of 120km / hr . Given that the distance between Nairobi and Busia is 400km Gross domestic product calculations count only final goods and services because ______. its math help me out Which of the following correctly describes what happens to liquid and gas particles withmore thermal energy?Select one:O a. Liquid and gas particles with more thermal energy expand.O b. Liquid and gas particles with more thermal energy condense.O c.Liquid and gas particles with more thermal energy rise.O d. Liquid and gas particles with more thermal energy fall. In which century did Marco Polo leave Italy 8 1/2 - 3/8=? pls answer fast This is the full question With the development of air flight and mass transit, humans are able to move very rapidly around the world.Which of the following is a possible consequence of increased human travel?Choose 1 answer: A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page. What setting should the user enable on the printer for this print job to achieve this result for patients with prediabetes, what strategies does the diabetes prevention program show are effective in reducing the risk of progressing to type 2 diabetes? Which of the following is true of Sundiata? A. His pilgrimage to Mecca boosted trade and wealth.B. He made Timbuktu a Christian religious center.C. He recaptured the gold-producing areas of West Africa.D. He rejected Islamic influence. Under what conditions was Germany reunified? If the proportion of the total disposable income spent on consumer goods and services is 93 percent and if consumers spend 85 percent of each additional dollar, what is a. the apc? b. the aps? c. the mpc? d. the mps? An elephant went 119 km moving 42 km/h how many hours did the journey take?2 1/62 1/22 5/6 DF=Help me please:)) What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?. Find the midpoint of the line segment with end coordinates of:(-1,7) and (3,-2)Give coordinates as decimals where appropriate.