Answer:
B, C, F, G
Explanation:
Digital Citizenship
Among the options given, the examples of humane design are as follows:
Periodic alerts asking if you want to quit.Suggested options for offline activities.Settings to keep track of usage time.Settings to control the amount of notifications.Thus, the correct options for this question are B, C, F, and G.
What do you mean by Humane design?The Humane design may be defined as a type of design system that significantly emphasizes the user's experience and well-being. It takes deals with the processes on account of how people interact with technology.
According to the context of this question, examples of humane design are turning off all notifications that aren't from people, charging your device outside of your bedroom, eliminating social media, setting to keep track of usage time, etc. All these activities which are of human nature are now controlled by technology.
Therefore, the correct options for this question are B, C, F, and G.
To learn more about Humane design, refer to the link:
https://brainly.com/question/18187305
#SPJ2
If you have a second Ethernet adapter, which network location is being used by the adapter?
Answer:
Public network
Explanation:
The network includes different networks and settings for sharing which are applied to the network which you are connected to.
A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.
If someone you don”t know asks where you go to school, what should you do?
Answer:come up something that sounds real but is not true.
Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry
The right thing to do when someone you don't know asks where you go to school, is do not respond.
Why talking to stranger has its cons?The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.
Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.
Learn more about school from
https://brainly.com/question/6947486
#SPJ2
Mr. Edwards, a game designer, creates a game that draws attention to how real estate developers are causing the natural habitat of an
endangered species of bird to decline. Which option best describes this game?
ОА.
It is an entertainment-based game.
ОВ.
It is an advergame.
It is an educational game.
Ос.
OD.
It is an issues-based game.
Answer:
OB
Explanation:
Mr. Edwards the game designer is making it for education purposes so you can learn, it is for learning. So you know endangered species of birds.
what is an unknown network called
Answer
It means the network has no name and your device has picked it up as a wifi / network.
Explanation:
This likely means the owners of the network have not set a SSID. ( SSID is network name.)
which of the following are bee per frame attribute
Explanation:
where are the choices
A new object of type list is created for each recursive invocation of f.A. TrueB. False
Answer:
True but double check!
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
Answer:
c. 4 to 6
Explanation:
According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.
Hence, in this case, the correct answer is option C
Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tester. Since Tara is trying to get a job as a tester, she should concentrate on improving her and skills in order to get the desired job.
Answer:
heres your answer
Explanation:
have a good day <3
A good administrative position to acquire as a stepping stone to further positions is
Answer:
A good administrative position to acquire as a stepping stone to future positions is an intern.
Explanation:
When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.
In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.
One suggested means of gaining eye contact before reversing is to:____.
Answer:
hit the vehicle horn
Explanation:
Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.
what is computing networking
Match each of the following servers to its definition:
1. DNS
2. Web
3. E-mail
4. DHCP
5. Commerce
a. enables users to purchase items over the Internet
b. specifically deals with the SMTP communication method
c. translates a domain name into an IP address
d. delivers HTML documents on request
e. assigns users IP addresses for the duration of a session
Answer:
1. Commerce
2. E-mail
3. DNS
4. Web
5. DHCP
Explanation:
A server can be defined as a dedicated system either software or hardware that is used to provide specific services to other devices or programs, which are referred to as the clients. The following are the functions of various functions of server in cloud computing services;
a. Commerce: enables users to purchase items over the Internet.
b. E-mail: specifically deals with the SMTP communication method.
c. DNS: translates a domain name into an IP address.
d. Web: delivers HTML documents on request.
e. DHCP: assigns users IP addresses for the duration of a session.
Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation
Answer:
D
Explanation:
Hard work and dedication prove that you will be there and do what you need to.
Answer:
isnt it leadership
Explanation:
making tough descisions..
The direction of data transport is its built from the top and goes down and across the wire and read going up on the recieving computer?
True
False
Smart home appliances typically include which of the following?
Answer:
Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.
Explanation:
Smart home appliances include;
Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.What is a smart home appliance?A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.
They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.
Learn more about home appliances from
https://brainly.com/question/18713901
How does Wireshark differ from NetWitness Investigator?
Answer is given below
Explanation:
Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.Max shot a video with a digital camera. Where did the video files get stored in the camera?
Answer:
In the memory sticks/cards of the digital camera
Explanation:
Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.
. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.
Answer:
The Following are the solution to this question:
Explanation:
In Option a:
In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They [tex]\Omega(f(n))[/tex] will also be [tex]h(n)[/tex].
In point (ii), The value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].
In Option b:
In this algorithm, the input size value is equal to 1 object, and the value of A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].
Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.
Answer:
1. create the first array A
2. create the second array A1, the same length as array A.
3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.
4. save both items to "a" for minimum value A and "b" for minimum value A1.
5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.
Explanation:
This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.
Taking an online class doesn't require any special skills.
Please select the best answer from the choices provided
()T
()F
help pls
Answer:
F
Explanation:
It depends on whether the person has interest in it
The statement - "Taking an online class doesn't require any special skills" is false.
What is online class?An online class is a course that is delivered through the Internet. They are often delivered via a learning management system, where students may monitor their course curriculum and academic progress, as well as communicate with their classmates and course teacher.
When taking an online class, one must be alert and prompt. Furthermore, certain material may be obscure owing to a communication barrier between the student and teacher.
The student must be able to grasp what the teacher is saying in a short period of time, and self-teaching abilities should be strengthened in distance online education. As a result, the supplied assertion is untrue.
Learn more about online class here:
https://brainly.com/question/13649312
#SPJ2
Is a pocket watch consider a computer
Answer:
I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.
Explanation:
What converts source code onto object code
Answer:
The Compiler
Explanation:
A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file
Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above
Answer:
A structured chart is a sequential representation of program design
Explanation:
It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.
It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct
It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.
However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.
An optimal solution to an Operations problem will yield:____________
Answer:
The best solution.
Explanation:
In the operations and management of systems such as manufacturing, transport, government, network, service systems, we encounter various type of challenges and problems. These challenges and problems must be fixed or resolved as soon as possible in order to restore normal operations, as well as ensuring that the solution mitigates the occurrence of such problems in the future.
Hence, an optimal solution to an Operations problem will yield the best solution because it gives the maximum functionality. For instance, an optimal solution is considered to be the best solution because it gives the least cost, effective and efficient or gives the most profit.
In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The graduates include students majoring in management, finance, accounting, information systems, and marketing. Create a PivotTable in Excel to display the number of graduates in each major and the average monthly starting salary for students in each major.
Answer:
The pivot table is attached below
Explanation:
procedure used to create the Pivot Table
select insert from worksheet Ribbonselect pivot tableselect the range of Dataselect "new worksheet "select Major as row heading and the summation symbol to count the majorinput variables given in their right cellsafter this procedure the table is successfully created
Attached below is the Pivot Table in Excel displaying The number of graduates in each major and average monthly salaries
Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP
Answer: Exabyte
Explanation:
I took the Quiz
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy
Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy
What does "digital literacy" mean?The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.
Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.
Learn more about Digital literacy from
https://brainly.com/question/20718794
#SPJ1
You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.
Explanation:
Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.
Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.
Using pseudocode do the following;
determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-‐‑bit-‐‑key.)
Answer:
Following are the solution to this question:
Explanation:
In point 1:
Trials frequency [tex]= \frac{100 \ million }{second}[/tex]
calculating the main length of cryptography = 112 bit
[tex]\to 100\ Million = 1 \times 10^8[/tex]
calculating the second year value:
[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]
[tex]=3.15 \times 10^7 \ seconds[/tex]
Currently, in average , at least half the possible sleeves is being used to verify the encryption process: [tex]2^{111} \ keys[/tex]
[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]
the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]
In point 2:
In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).
Algorithm:-
The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::
[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]
I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.
The reverse is the decryption:
[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]
I.e. decrypt by K3, crypt by K2, decrypt by K1.
Every three-bit authentication encrypts a 64-bit block.
Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.
which data type could be used for the field, remark or comment?
Answer:
While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.
copied from google
hope that helps