Some might consider careers in the Construction industry to be quite flexible. Which statement supports this claim? Employees can work for themselves, big companies, or the government. Employers often release their staff when projects end. Employees work outdoors in dirty and dangerous environments. Employers can train staff so they work in both Design and Maintenance.

Answers

Answer 1

Answer:

The answer is probably A.

Employees can work for themselves, big companies, or the government.

Explanation:

Answer 2

Answer:

The answer is A

Explanation:

I took the test on edgenuity


Related Questions

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy

Answers

Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy

What does "digital literacy" mean?

The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.

Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.

Learn more about Digital literacy from

https://brainly.com/question/20718794

#SPJ1

An optimal solution to an Operations problem will yield:____________

Answers

Answer:

The best solution.

Explanation:

In the operations and management of systems such as manufacturing, transport, government, network, service systems, we encounter various type of challenges and problems. These challenges and problems must be fixed or resolved as soon as possible in order to restore normal operations, as well as ensuring that the solution mitigates the occurrence of such problems in the future.

Hence, an optimal solution to an Operations problem will yield the best solution because it gives the maximum functionality. For instance, an optimal solution is considered to be the best solution because it gives the least cost, effective and efficient or gives the most profit.

Mr. Edwards, a game designer, creates a game that draws attention to how real estate developers are causing the natural habitat of an
endangered species of bird to decline. Which option best describes this game?
ОА.
It is an entertainment-based game.
ОВ.
It is an advergame.
It is an educational game.
Ос.
OD.
It is an issues-based game.

Answers

Answer:

OB

Explanation:

Mr. Edwards the game designer is making it for education purposes so you can learn, it is for learning. So you know endangered species of birds.

. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.

Answers

Answer:

The Following are the solution to this question:

Explanation:

In Option a:

In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They  [tex]\Omega(f(n))[/tex]   will also be [tex]h(n)[/tex].  

In point (ii), The  value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is  [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].

In Option b:

In this algorithm, the input size value is equal to 1 object, and the value of  A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].

A new object of type list is created for each recursive invocation of f.A. TrueB. False

Answers

Answer:

True but double check!

You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.

Answers

Explanation:

Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.

Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.

Using pseudocode do the following;

determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.

                       

When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8

Answers

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation

Answers

Answer:

D

Explanation:

Hard work and dedication prove that you will be there and do what you need to.

Answer:

isnt it leadership

Explanation:

making tough descisions..

The direction of data transport is its built from the top and goes down and across the wire and read going up on the recieving computer?
True
False

Answers

Do u mean one direction

what is computing networking​

Answers

A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP

Answers

Answer: Exabyte

Explanation:

I took the Quiz

A good administrative position to acquire as a stepping stone to further positions is

Answers

Answer:

A good administrative position to acquire as a stepping stone to future positions is an intern.

Explanation:

When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.

In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.

what is an unknown network called

Answers

Answer

It means the network has no name and your device has picked it up as a wifi / network.

Explanation:

This likely means the owners of the network have not set a SSID. ( SSID is network name.)

Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.

Answers

Answer:

1. create the first array A

2. create the second array A1, the same length as array A.

3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.

4. save both items to "a" for minimum value A and "b" for minimum value A1.

5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.

Explanation:

This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.

Taking an online class doesn't require any special skills.
Please select the best answer from the choices provided
()T
()F
help pls

Answers

Answer:

F

Explanation:

It depends on whether the person has interest in it

The statement - "Taking an online class doesn't require any special skills" is false.

What is online class?

An online class is a course that is delivered through the Internet. They are often delivered via a learning management system, where students may monitor their course curriculum and academic progress, as well as communicate with their classmates and course teacher.

When taking an online class, one must be alert and prompt. Furthermore, certain material may be obscure owing to a communication barrier between the student and teacher.

The student must be able to grasp what the teacher is saying in a short period of time, and self-teaching abilities should be strengthened in distance online education. As a result, the supplied assertion is untrue.

Learn more about online class here:

https://brainly.com/question/13649312

#SPJ2

Is a pocket watch consider a computer

Answers

Answer:

I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.

Explanation:

What converts source code onto object code

Answers

Answer:

The Compiler

Explanation:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-­‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-­‐‑bit-­‐‑key.)

Answers

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency [tex]= \frac{100 \ million }{second}[/tex]

calculating the main length of cryptography = 112 bit

[tex]\to 100\ Million = 1 \times 10^8[/tex]

calculating the second year value:

[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]

                                  [tex]=3.15 \times 10^7 \ seconds[/tex]

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  [tex]2^{111} \ keys[/tex]

[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]

the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The graduates include students majoring in management, finance, accounting, information systems, and marketing. Create a PivotTable in Excel to display the number of graduates in each major and the average monthly starting salary for students in each major.

Answers

Answer:

The pivot table is attached below

Explanation:

procedure used to create the Pivot Table

select insert from worksheet Ribbonselect pivot tableselect the range of Dataselect   "new worksheet "select Major as row heading and the summation symbol to count the majorinput variables given in their right cells

after this procedure the table is successfully created

Attached below is the Pivot Table in Excel displaying The number of graduates in each major and average monthly salaries

Match each of the following servers to its definition:
1. DNS
2. Web
3. E-mail
4. DHCP
5. Commerce
a. enables users to purchase items over the Internet
b. specifically deals with the SMTP communication method
c. translates a domain name into an IP address
d. delivers HTML documents on request
e. assigns users IP addresses for the duration of a session

Answers

Answer:

1. Commerce

2. E-mail

3. DNS

4. Web

5. DHCP

Explanation:

A server can be defined as a dedicated system either software or hardware that is used to provide specific services to other devices or programs, which are referred to as the clients. The following are the functions of various functions of server in cloud computing services;

a. Commerce: enables users to purchase items over the Internet.

b. E-mail: specifically deals with the SMTP communication method.

c. DNS: translates a domain name into an IP address.

d. Web: delivers HTML documents on request.

e. DHCP: assigns users IP addresses for the duration of a session.

which of the following are bee per frame attribute​

Answers

Explanation:

where are the choices

which data type could be used for the field, remark or comment? ​

Answers

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

Max shot a video with a digital camera. Where did the video files get stored in the camera?

Answers

Answer:

In the memory sticks/cards of the digital camera

Explanation:

Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.

Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above

Answers

Answer:

A structured chart is a sequential representation of program design

Explanation:

It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.

It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct

It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.

However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.

If you have a second Ethernet adapter, which network location is being used by the adapter?

Answers

Answer:

Public network

Explanation:

The network includes different networks and settings for sharing which are applied to the network which you are connected to.

A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.

Smart home appliances typically include which of the following?

Answers

Answer:

Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.

Explanation:

Smart home appliances include;

Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.

What is a smart home appliance?

A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.

They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.

Learn more about home appliances from

https://brainly.com/question/18713901

If someone you don”t know asks where you go to school, what should you do?

Answers

Answer:come up something that sounds real but is not true.

Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry

The right thing to do when  someone you don't know asks where you go to school, is do not respond.

Why talking to stranger has its cons?

The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.

Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.

Learn more about school from

https://brainly.com/question/6947486

#SPJ2

How does Wireshark differ from NetWitness Investigator?

Answers

Answer is given below

Explanation:

Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.

One suggested means of gaining eye contact before reversing is to:____.

Answers

Answer:

hit the vehicle horn

Explanation:

Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.

Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tester. Since Tara is trying to get a job as a tester, she should concentrate on improving her and skills in order to get the desired job.

Answers

What’re the choices?

Answer:

heres your answer

Explanation:

have a good day <3

Other Questions
Convert 49F to degrees Celsius.If necessary, round your answer to the nearest tenth of a degree Here are the formulas. How do a cells specialized structures relate to its function? 8 mm =CmWhats the answer to that??? x-9=y+2is it linear or nonlinear How long did it take for the MacDougalls to begin filming? Why did they wait so long? How important are personal relationships in doing ethnographic research? How did the Turkana respond when the MacDougalls asked what they should film if they want to depict how the Turkana live? At one point, a Turkana woman turns the camera on the anthropologist. How important is the exchange of ideas to ethnographic research? How do you think that exchange might affect the MacDougalls's perception of their own culture? Please someone help online school is really hard to do. Write a short paragraph about a true or fictional event, using varied sentence structure. Your paragraph should contain the following: * at least six sentences * one of each type of sentence structure (simple, compound, complex, compound-complex) how many terms did "FDR" (Franklin Delano Roosevelt) Serve How do you think the rise in subprime lending contributed to the credit crunch ? Choose the correct ending of the AR verb based on the subject or subject pronoun. Yo _____ Group of answer choices o an as a amos 4(3x - 6) = 6(3x + 5)please help my asap Explain why it is important to monitor the carrying capacity of ecosystems. Please give me a 9th grader great response !!!Help asap under the from of government practice in the united states, officials are elected .....a unanimously b by other officialsc by the peopled randomly can u guys plz help me?-2(x-3) < 2x - 4 Which inequalities are true? Check all that apply. [tex]\sqrt{5} \ \textless \ 2.3 \ \textless \ \sqrt{6}[/tex] [tex]\sqrt{5} \ \textless \ 2.4 \ \textless \ \sqrt{6}[/tex] [tex]\sqrt{4} \ \textless \ \sqrt{5} \ \textless \ \sqrt{5.5}[/tex] [tex]\sqrt{8} \ \textless \ 3 \ \textless \ \sqrt{9}[/tex] [tex]\sqrt{8} \ \textless \ 2.9 \ \textless \ \sqrt{9}[/tex] [tex]\sqrt{4} \ \textless \ 4.5 \ \textless \ \sqrt{5}[/tex] create a flowchart of the negative feedback mechanism that controls your bodys temperature grefffrresdguyrechyrefhutdput ur call of duty mw 0s4 name here and claim ur points Neglecting your health by eating poorly is considered (A) a controllable risk factor (B) an uncontrollable risk factor (C) a long-term benefit of fitness (D) a temporary setback According to the excerpt above from a health journal, what decision can an athlete make regarding his diet?A. His diet should include foods such as eggs, nuts, and fish.B. He should eat a diet high in carbohydrates to form large muscles.C. He should increase the amount of time he works out to produce red blood cells.D. He should get an extra hour of sleep each night to increase protein production. Olympic athletes are tested to see if they are using illegal performance-enhancing drugs. suppose that urine samples are taken and analyzed and the rate of false positive results is 1%. suppose also that it is too expensive to refine the method to reduce the rate of false possible results. we do not want to accuse innocent people of using illegal drugs. what can you do to reduce the rate of false accusations even though the test always has a false positive rate of 1%. (select all that apply.) Urgent The following picture is an example of which type of energy?Electromagnetic EnergyNuclear EnergyElectric Energy