Answer:
Socratic app
Explanation:
it will help you
How can the information from a phr be shared
Answer:
Patients can decide whether to share their information with providers, family members or anyone else involved in their care. Patients can access their records in a tethered PHR through a secure portal.
Detail for the configuration of your laptop and your phone
Answer:
What do u mean?
Explanation:explanation is...
Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk
Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
Which one of the following careers is the most highly resistant to economic change?
Video Game Designers
Airline Pilots
Fashion Designers
Funeral Attendants
Answer:
Video game designers bbbbbbbbbbbbb
By using ONLY the language of C++,
How many times the loop will be executed?
int odd = 1, sum = 2, count = 9;
do {
sum = sum + odd;
odd = odd + 2;
cout >> sum
count = count + 1;
}
while (count < 10)
}
MCQs:
A) 1
B) 2
c) 0
d) 3
Answer:
0
Explanation:
Answer: Syntax error. So it would be 0.
After correcting syntax it would be 1
Explanation:
Braces never started in beginning but put in the end after while loop
What are the main approaches for dealing with deadlock?
Answer:
Deadlock ignorance
Deadlock prevention
Deadlock avoidance
& Detection and recovery
Hope This Helps!!!
Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout
Answer:
Layout and Table Design
Explanation:
When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch
Answer:
Socratic app
Explanation:
it will help you
ANY KIND PERSON HERE?
in our new situation. what are the things we already use before but we value more now a days to protect our self from virus, write your answer on space provided. ___1. __________________________ ___2.__________________________ ___3.__________________________ ___4.__________________________ ___5.__________________________
Answer:
1. face mask
2. face shield
3. following the social distance
4. taking a vaccine
5. taking care of ourselves
Explanation:
hope this helps
what is wardrobe in french
Answer:
garde - grobe
Explanation:
that's all
TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.
Answer:
True
Explanation:
I just know the answer because I'm a genius hehe
4.7 Code Practice: Question 1 Please help!
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.
Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.
See full question below
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Select an answer:
A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.
B. He connected to an outside data source.
C. He dragged and dropped the file into Tableau.
He duplicated the data in Tableau.
Learn more from
https://brainly.com/question/22908883
buying a good computer you should consider what?
I recommend a Samsung or Chromebook both good conputers
rearrange the following procedures in there proper order. use numbers (1-8) to indicate their order of precedence.
.___________crimp
.___________strip cable end
.___________test
.___________untwist wire ends
.___________trim wires to size
.___________check
.___________arrange wires
.___________attach connector
Answer:
6 - crimp
1 - strip cable end
8 - test
2 - untwist wire ends
4 - trim wires to size
7 - check
3 - arrange wires
5 - attach connector
Explanation:
Step 1. Strip cable by inserting into the stripping tool. Rotate the cable in a smooth and even motion to create a clean cut and pull away towards the end of the wire to remove the sheathing.
Step 2. Untwist wire ends. Separate the twisted wires and straighten them out to easily sort in the right order.
Step 3. Arrange wires. Put the wires in the correct order so they can be properly crimped.
Step 4. Trim wires to size. Use the cutting section of the crimping tool to cut them into an even line.
Step 5. Attach connector. Insert the connector so that each of the small wires fits into the small grooves in the connector.
Step 6. Crimp. Insert the connector in the crimping tool. Squeeze the handles to crimp the connector and secure the wires.
Step 7. Check. Take the connector our of the tool and look at the pins to see that they're all pushed down.
Step 8. Test. Lightly tug at the connector to make sure it's attached to the cable.
Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor
Answer: printer
Explanation:
The process of redefining the functionality of a built-in operator, such as , -, and *, to operate on programmer-defined objects is called operator _____. a. overriding b. overloading c. initializing d. testing
It should be noted that the process of redefining the functionality of a built-in operator to operate is known as operator overloading.
Operator overloading simply means polymorphism. It's a manner in which the operating system allows the same operator name to be used for different operations.
Operator overloading allows the operator symbols to be bound to more than one implementation. It's vital in redefining the functionality of a built-in operator to operate on programmer-defined objects.
Read related link on:
https://brainly.com/question/25487186
What are the process of hacking computers
Answer:
Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.
Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.
Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.
Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.
Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.
Explanation:
Have a great day!
2. PJM Bank has a head office based in Bangalore and a large number of branches nationwide. The
headoffice and brances communicate using Internet. Give two features of Internet.
Answer:
Two features of the internet are that internet is a collection of computers which help in the sharing of information.
Most of the home users of internet make use of cable or phone modem, or a DSL connection in order to connect the internet.
Computers that save all of these web pages are referred to as the web servers.
Explanation:
1. most of the home users of internet make use of cable aur phone modern or a DSL connection in order to conduct the internet .
2. computers that save all of these web pages are referred to as the web servers.
(Hope this helps can I pls have brainlist (crown)☺️)
If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only community, what kind of software would this be?
Answer:
Explanation:
crm
characteristics of special computers
Speed, Accuracy, Diligence, Versatility, Reliability, and Memory!
An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?
There are different ways of management. To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.
Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.
It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.
Learn more from
https://brainly.com/question/13438921
Where to store
ammunition
In many businesses, it is common to have a key card style access control to get in and out of the building or into other sections of the building. What major benefit does this type of centralized access control system offer that simple locks and keys cannot
Answer:
identification of who is entering the building
Explanation:
The key benefit of centralized access control system that simple locks and keys cannot offer is to:
Maintain Security of your Sites. Identify people entering or going out of firm.What major benefit does a centralized access control system have?The key benefit over key style is:
Maintain Security of your Sites.Note that is said to be the highest benefit of a building access system as it is aim to properly aid or secure a remote sites.
The key benefit of centralized access control system that simple locks and keys cannot offer is to:
Maintain Security of your Sites. Identify people entering or going out of firm.Learn more about key card style from
https://brainly.com/question/25533998
#SPJ6
Steve Jobs
Born
Feburary 24, 1955
Death
October 5, 20122
Steven Paul Jobs was an American inventor, designer and entrepreneur who was the co-founder, chief executive and chairman of
Apple Computer.
Apple's revolutionary products, which include the
In 1976, when Jobs was just 21, he and Wozniak started Apple Computer in the Jobs’ family garage. They funded their entrepreneurial
venture by Jobs selling his Volkswagen bus and Wozniak selling his beloved scientific calculator. Jobs and Wozniak are credited with
revolutionizing the computer industry with Apple by democratizing the technology and making machines smaller, cheaper, intuitive and
accessible to everyday consumers.
Wozniak conceived of a series of user-friendly personal computers, and — with Jobs in charge of marketing — Apple initially marketed
the computers for $666.66 each. The Apple I earned the corporation around $774,000. Three years after the release of Apple's second
model, the Apple II, the company's sales increased by 700 percent to $139 million.
In 1980, Apple Computer became a publicly-traded company, with a market value of $1.2 billion by the end of its very first day of
trading. Jobs looked to marketing expert John Sculley of Pepsi-Cola to take over the role of CEO for Apple.
The next several products from Apple suffered significant design flaws, however, resulting in recalls and consumer disappointment.
IBM suddenly surpassed Apple in sales, and Apple had to compete with an IBM/PC-dominated business world.
In 1984, Apple released the Macintosh, marketing the computer as a piece of a counterculture lifestyle: romantic, youthful,
creative. But despite positive sales and performance superior to IBM's PCs, the Macintosh was still not IBM-compatible.
Sculley believed Jobs was hurting Apple, and the company's executives began to phase him out. Not actually having had an
official title with the company he co-founded, Jobs was pushed into a more marginalized position and thus left Apple in 1985.
Answer:
what Is your question it is not clearly stated
in microsoft word, level 1 is automatically formatted as
Answer:
Level 1 is the highest or main level of heading, Level 2 is a subheading of Level 1, Level 3 is a subheading of Level 2, and so on through Levels 4 and 5. Headings are covered in Sections 2.26 and 2.27 of the APA Publication Manual, Seventh Edition.
Explanation:
Write a program to grade an n-question multiple-choice exam (for n between 5 and 50) and provide feedback about the most frequently missed questions. Your program will take data from the file examdat.txt. The first line of the file contains the number of questions on the exam followed by a space and then an n-character string of the correct answers. Write a function fgets Answers that inputs the answers from an open input file. Each of the lines that follow contain an integer student ID followed by a space and then that stu dent's answers. Function fgets Answers can also be called to input a student's answers. Your program is to produce an output file, report.txt, containing the answer key, each student's ID, and each student's score as a percentage, and then information about how many students missed each question. Here is a short sample input and output files. examdat.txt 5 dbbac 111 dabac 102 dcbde 251 dbbac
Answer:
I was able to create script however it was not in the correct language, sorry.
Explanation:
Evaluate the expression using stack 14-(6-10)-10
Answer:
14 -(6-10)-10
14-(-4)-10
18-10
= 8
A keyboard would be considered _____. Select 2 options.
an input device
storage
an output device
software
hardware
Answer:
input devise and hardware
Explanation:
Which of the following is not an artificial intelligent technology?
Speech recognition
Text analytics and NLP
Computer vision
Robotic desktop automation
None of the above