Answer:
here yuuuurrrrr Vote for me nah jk
Match the careers with the career clusters.
The careers with the career clusters are:
A. Architecture and construction:
CarpenterGeologistB. manufacturing:
Sewing machine operatorQuality assurance inspectorC. Agriculture, food and natural resources:
Animal trainerFarm labor and contractorD. Energy
Wind turbine engineerElectrician What is a career cluster?Career Clusters are known to be made up of different occupations that belongs to the same field of work that often needs the same skills.
Therefore, the matchup above are correct.
See full question below
Match the careers with the career clusters. (two answers in each group)
CAREERS
1. electrician
2. wind turbine engineer
3. sewing machine operator
4. geologist
5. quality assurance inspector
6. farm labor contractor
7. animal trainer
8. carpenter
GROUPS
A. architecture and construction
B. manufacturing
C. agriculture, food and natural resources
D. energy
Learn more about career from
https://brainly.com/question/11952179
#SPJ1
what file extension is automatically added to documents in word 2019?
The file extension that is automatically added to documents in word 2019 is .docx.
What is a file extension?File extension is the ending of a file that helps identify the type of file in operating systems, such as pdf files. For example the files extension of PDF is .pdf.
In a simpler terms, a file extension, or filename extension, is a suffix at the end of a computer file.
The file extension indicates the kind of file that is saved.
Therefore, the file extension that is automatically added to documents in word 2019 is .docx.
learn more on file extension here: https://brainly.com/question/14576685
#SPJ2
The first field in an 802. 11 header is known as a ________
The first field in an 802. 11 header is known as a the frame control.
What is the first field in an 802.11 header?The first three fields are:
Frame ControlDuration/ID,Address 1Note that it is also made up of reserved types and subtypes and thus, The first field in an 802. 11 header is known as a the frame control.
Learn more about file field from
https://brainly.com/question/13189580
#SPJ12
Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know that _________.
Answer:
there are exactly two elements between those two elements
i) Convert 8GB to bits. Give the expression.
Answer:
64 billion
Explanation:
1gb = 1 billion bytes
so 8gb = 8 billion bytes
then
1 byte= 8 bits
so 8 billion bytes = 8 × 8 billion bits, 64 billion bits
a diminished triad can be indicated by
A diminished triad can be indicated by A lower-case Roman numeral and °.
How do you Know a diminished triad?In any diminished triad, the middle and top two notes of the chord are known to be the flattened and shown by the symbol "o" or "dim."
Therefore, A diminished triad can be indicated by A lower-case Roman numeral and °.
See options from below
A diminished triad can be indicated by:
A) A lower-case Roman numeral and °.
B) A lower-case Roman numeral and +.
C) An upper-case Roman number and °.
Learn more about triad from
https://brainly.com/question/4951751
#SPJ11
after input is finished, another call to read would return which of the following to indicate that the end of the file has been reached?
After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.
What is data read from a file?When data is said to read from a file, it is said to fully or automatically saves itself in a variable. Note that If a file is said to already exists, one can open it.
Note that After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.
Learn more about input from
https://brainly.com/question/5451281
#SPJ11
Suppose that you want to write a program that inputs customer data including name, zipCode, balance, and regionNum. At the end of the program, a summary of the number of customers in each of 12 sales regions who owe more than $1000 each is displayed. The most likely statement during the main processing loop would be _________.
The most likely statement during the main processing loop would be
customerCount[regionNum] =
customerCount[regionNum] + 1
What is a processing loop?A loop means a sequence of instruction s that is continually repeated until a certain condition is reached.
In this case, the most likely statement during the main processing loop would be customerCount[regionNum] = and customerCount[regionNum] + 1.
Learn more about loop on:
https://brainly.com/question/4510147
#SPJ12
Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer
The iso 14001:2004 standards require documentation of a firm's environmental program. Which component requires a plan to improve performance in resource use and pollutant output?
The component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.
What is a pollutant?Pollutant simply means a substance that is harmful to the environment.
In this case, the component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.
Learn more about pollutant on:
brainly.com/question/25537936
#SPJ12
Select the correct answer.
An Al scientist placed an agent in a known environment. The agent observed changes in the environment. Soon, it began to take action
toward making a decision. What was the agent doing?
A. offline computation
B. online computation
OC. learning
OD. perceiving
According to the given condition, the agent doing the process of perceiving. Thus the correct answer is D.
What is perceiving?Perceiving refers to the implementation of any concept based on learning, understanding, and observation of skills to make effective decisions.
In this situation, the agent has observed changes in the environment and based on his observation and analysis began to take action for decision making.
These perceiving nature helps to enhance the process of learning to seek improvement.
Therefore, option D reflects the perceiving nature of agent.
Learn more about skills, here:
https://brainly.com/question/9648460
#SPJ1
Which open-sourced packet capture tool uses linux and mac os x operating systems?
Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.
What is tcpdump?Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.
This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.
Read more on tcpdump here: https://brainly.com/question/14485515
#SPJ12
3. Describe how you would properly dispose of the following materials so that you do not damage the environment. Write on each topic below.
CRT monitors
Scanners
Batteries
Ink/Toner
Hard Drives
Alkaline and zinc-carbon batteries may be securely disposed of in your domestic garbage in the majority of areas.
What is disposing of?Disposing of is the process of completely destroying any material completely.
It's critical to adhere to established practices for electronic device disposal, in addition, to securely protecting sensitive information on electronic devices.
The most effective method of preventing outsiders from obtaining your information is to physically destroy a gadget.
Your computer disc and other gadgets can be destroyed using specialized services that can burn, melt, dissolve, or pulverize them.
These techniques of sanitization are used in authorized incineration facilities or outsourced metal destruction facilities, and they are intended to totally destroy the media.
If you don't want to utilize a service, you may break your hard drive yourself by hammering nails or drilling holes in it.
Hence batteries may be securely disposed of in your domestic garbage in the majority of areas.
To learn more about the disposing of refer ;
https://brainly.com/question/15709251
#SPJ1
Use wireshark to capture packets on the enp2s0 interface for five seconds. analyze the wireshark packets to determine whether arp poisoning is taking place. use the 192.168.0.2 ip address to help make your determination. answer the questions.
In the case above, the Questions that need to be answered is:
"What is the MAC address of the 1st responding device and the answer will be: 00:00:1B:11:22:33"The second question will be "What was the MAC address of the duplicate responding device and the answer will be 00:00:1B:33:22:11".How do you use wireshark to capture packets?The steps are:
Do Open Wireshark and then one can go to under Capture folder and then click on enp2so.Click on Blue fin to start capture.In about 5 seconds after that operation, , click red box to stopLook at the Apply a display filter type arp and click on Enter to depict those packetsLooking at the Info column, you will see lines having the 192.168.0.2 IP. Then Answer questions above.Learn more about wireshark from
https://brainly.com/question/13139168
#SPJ1
what type of e-mail typically lures users to sites or asks for sensitive information?
The type of e-mail typically lures users to sites or asks for sensitive information is phishing.
What is a phishing email?Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.
This criminals usually send an email link mimicking the company .
The aim of the email is to get sensitive information in order to access your funds or private information.
learn more on phishing email here: https://brainly.com/question/14954901
#SPJ11
what is computer generation
Answer:
Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .
What type of relational methods that allow you to insert or update records and extract information from records for viewing? comptia
Data Manipulation Language (DML) allows a user to insert or update records and extract information from records for viewing.
What is a relational database?A relational database is a type of database designed and developed to store, structure and recognize relation which exist between data points and items of information.
In database management system (DBMS), a type of relational methods which allows an end user to insert or update records and extract information from records for viewing is known as Data Manipulation Language (DML).
Read more on database here: brainly.com/question/13179611
#SPJ12
If we use the square wave to transmit digital data (0s and 1s), what will be the data rate. Note data rate is the bits per second. (if two bits contain in one period) 2. Then, if we use the first three components to represent square wave, what is the bandwidth? (Refer to lecture) 3. Consider a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with two signal levels. What can be the maximum bit rate?
HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with
A) the testing team
b)the CEO
Answer:
the testing team
Explanation:
because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not
what is the size of the rc.conf file in bytes
Answer:
It is 281 bytes.
In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.
What is rc conf file?The rc. conf file is known to be a file that often specifies the kind of services that needs to be enabled in course of system startup by the startup scripts that was invoked by /etc/rc (see rc(8)), and that also ashutdown scripts that is said to be invoked by /etc/rc. shutdown.
Note that In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.
Learn more about bytes from
https://brainly.com/question/6835146
#SPJ11
Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity
Answer:
Internet transportation exchanges brings together shippers who post LOADS and carriers that post their AVAILABLE CAPACITY in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity
Convert (765)octal into hexadecimal
Answer:
1F5
Explanation:
First convert octal 765 into binary values with each octal digit as a representation using 3 bits
Octal 7 ==> 111
Octal 6 ==> 110
Octal 5 ==> 101
Putting it together we get
111110101
Now group the bit values into groups of 4 (with leading zeros if necessary) starting with the rightmost bit.
Groups are highlighted and then the hex value is written
Right-most group 111110101 and 0101 is 5 hex
Middle group: 111110101 and 1111 is F hex
Left most group: 111110101 ; with leading zeros it is 0001 which is 1 hex
So from left to right we get 1F5
<
1 2 3 4 5
List
the steps for copying and pasting into the correct order.
First
Second
Third
Fourth
Fifth
I III I
Answer:
first :highlight the text
second: select the cut command
third: nice the cursor to the new location
forth: select the paste command
Under the fair use doctrine, which group of people are allowed to use certain
portions of copyrighted material without permission?
O A. Web developers
OB. Teachers
C. Entrepreneurs
OD. Producers
Answer:
the answer is b fair use lets people teachers use some copy right materials since this is instruction
Hope This Helps!!!
In a job-order costing system, manufacturing overhead applied is recorded as a debit to:
In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.
What is Manufacturing overhead (MOH) cost?This is known to be the sum of all the indirect costs which is said to be often incurred while creating a product.
Note that in the case above, In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.
Learn more about costing system from
https://brainly.com/question/24516871
#SPJ12
Type the correct answer in the box. Spell all words correctly. Photographers can compress files in different formats. One of the formats ensures that the quality and details of the image are not lost when the photographer saves the file. Which file format is this? The file format ensures that images don’t lose their quality and details when photographers save them.
Answer: Lossless
Explanation: just took the test
A/An is useful in comparing data values from populations with different means and standard deviations.
A useful tool in comparing data values from populations with different means and standard deviations is z-score.
What is a Z-score?This is known to be a kind of numerical measurement that tells a value's association to the mean of a group of values.
The Z-score is said to be measured in regards to standard deviations that arises from the mean.
Note that A useful tool in comparing data values from populations with different means and standard deviations is z-score.
Learn more about z-score from
https://brainly.com/question/25638875
#SPJ11
You have a server that has a 100basefx network interface card that you need to connect to a switch. the switch only has 100basetx switch ports. which device should you use
Media Converter is the device that you will use to switch only has 100BaseTx switch ports.
What is a network media converter?A media converter is known to be a kind of networking device that helps to link two different media, such as Ethernet copper and Ethernet fiber.
Note that they can link devices that are more that 100 meters from the close available switch and as such, Media Converter is the device that you will use to switch only has 100BaseTx switch ports.
Learn more about Media Converter from
https://brainly.com/question/24858866
#SPJ1
When there are conflicting gpos, what's the order in which they're evaluated and applied?
When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.
What is the conflict about?Note that when trying to know which policy settings to apply, the local policy of the machine is said to be examined, followed by site policies, then domain policies, and lastly the policies on all the OUs that has all the object being processed.
Therefore, When there are conflicting GPOS, the order in which they're evaluated and applied are: Site, Domain, and OU.
Learn more about conflicting from
https://brainly.com/question/24769299
#SPJ12
When there is a missing DLL file, _______.
A. Hard drive needs to be scanned
B. the computer will display error messages
C. Applications might run slowly
Answer:
B. the computer will display error messages
When there is a missing DLL file, the computer will display error messages. The correct option is B.
What is a DLL file?DLL is dynamic link library is a concept of Microsoft implementation of the shared library concept of Microsoft Windows. This library contains codes and data that can be use in making a program.
Thus, the correct option is B. the computer will display error messages.
Learn more about a DLL file
https://brainly.com/question/23551323
#SPJ1