Answer:
Economic growth,cyclical and structural factors, demographics, education and training
Explanation:
.........
Which two of these can be stored in a float variable?
1
C
3.4
true
"hello"
Answer:
3.4
Explanation:
A float variable can only store a floating-point number which means it can store a number that has a decimal place or a decimal number.
Answer:
float variable is
3.41what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE
A company purchases a flood insurance policy for its data center. What is its risk
management decision?
1) Mitigation
2) Acceptance
3) Avoidance
4) Transference
When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.
Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.
Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.
The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.
In conclusion, transference is a risk management decision that occurs when a company purchases a flood insurance policy for its data center.
Read more on risk management here: https://brainly.com/question/13760012
PLZ ANWER FAST!!!!
Use the drop-down tool to select the correct word or phrase.
How fast data travels on the network:
The ability of a network to recover after any type of failure:
Text within a document that is linked to other information available to the reader:
The way the network is laid out, including all the interconnections:
When all computers in a network are connected in a “star” formation:
A type of network that does not use a router but shares data directly between computers:
A unique location for a computer on the network:
Rules for how routers communicate with one another and send data:
It should be noted that the speed of fast data on a particular network is known as bandwidth.
The ability of a network to recover after any type of failure is known as fault tolerance.
Text within a document that is linked to other information available to the reader is called hypertext.
The way the network is laid out, including all the interconnections is known as network topology.
When all computers in a network are connected in a “star” formation, it's known as a star topology.
A type of network that does not use a router but shares data directly between computers is known as peer-to-peer.
A unique location for a computer on the network is known as the IP address.
Rules for how routers communicate with one another and send data are known as the router protocols.
Learn more about bandwidths on:
https://brainly.com/question/8154174
Answer:
Text within a document that is linked to other information available to the reader is called
✔ hypertext
.
A unique location for a computer on the network is its
✔ IP address
.
The
✔ fault tolerance
is the ability of a network to recover after any type of failure.
The computer that responds to requests from the client computer is known as the
✔ server
.
A
✔ queue
is an ordered list of tasks waiting to be performed.
Explanation:
just did it.
How can I have a private conversation with no one knowing on my iPhone
Answer:
Just share a note by making one.
Explanation:
Thank you
Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?
How have you seen technology transform in your own life? What was the oldest computer or device you remember using? How does this compare to the machines you use today? What was your favorite piece of tech that is no longer popular or in common use? What are some modern benefits you're grateful for? Share your own "history of computing" with your fellow learners!
I am greatly opportuned to live in a time an era where technology is prevalent and constantly evolving, I have also experience technological changes in my life in the areas of learning because I browse about questions a lot.
What was the oldest computer or device you remember using?
I can remember using a Nokia 3310 but now I use an iPhone 11 pro max
How does this compare to the machines you use today?
The difference in the Nokia 3310 mobile and my current iPhone 11 pro max goes a long way to describe the evolutionary changes in technology, my iPhone 11 pro max is a smart phone with a lot of feature not present in my old Nokia 3310.
What was your favorite piece of tech that is no longer popular or in common use?
My favourite piece of tech no longer in use today is the typewriter, I like it because of the sound from the key when I am typing, it is more like typing and have fun at the same time.
What are some modern benefits you're grateful for?
I am most grateful for the Internet because it is a repository for knowledge, I learn and collaborate everyday using the Internet.
Learn more how the history of computer:
https://brainly.com/question/485705
why the computer is known as versatile and diligent device ? explain.
Answer:
Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.
Marci enjoyed the restaurant's meatloaf so much, she asked for the recipe. She wants to make 1/6 of the recipe. How much garlic powder does Marci need?
Answer:
she needs 1/6 of the garlic powder in the original recipe
Hope This Helps!!!
Which of the following is the correct sequence of the DIIRE
value chain?
A lot of events often takes plain in value chain. The correct sequence of events in the value chain are competitive strategy; value chain; business process and lastly the information systems.
A value chain is simply known as a business model that shows all the aspects or ranges of activities that is often needed to make a product or service.
Firms often conducts an indepth value-chain analysis through the act of evaluating the detailed procedures involved in each step of its business.
Learn more about Value chain from
https://brainly.com/question/1380316
Get the user to enter some text and print it out in reverse order.
Answer:
strrev in c/c++
Explanation:
5. What is intellectual property? (1 point)
Brainliest if correct
Answer:
intangible property that is the result of creativity, such as patents, copyrights, etc.
Please mark as brainliest
Answer:
A creative work of an invention, designs or names and images used in commerce.
Briefly explain the conceptual of effective computer based instruction for adults outlining the three units output process and input
Based on the research analysis, the concept of effective computer-based instruction for adults is the integration of the key organs of computer-based instruction to deliver desired guidelines for research in CBI for adults.
The three units output process and inputOutput processExternal supportCBI DesignInstructional Strategy designInput ProcessSelf DirectednessComputer Self EfficacyLearning Goal LevelHence, in this case, it is concluded that computer-based instructions can be practical for adult learning.
Learn more about CBI here: https://brainly.com/question/15697793
Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.
when i use python idle to execute a command, i get this message in shell
RESTART: C:/something something
Answer:
yes it always come whenever u execute a command
It comes with everyone
In Scratch, what is used to create a picture that lies behind the characters in your game?
backgrounds
backdrops
rearviews
landscapes
Answer:
the answer to this queston is backdrops
Explain network optimization challenges of internet providers.
Answer:
The internet was initially used to transfer data packets between users and data sources with a specific IP adress.Due to advancements,the internet is being used to share data among different small,resource constrained devices connected in billions to constitute the Internet of Thing (IoT).A large amount of data from these devices imposes overhead on the (IoT) network.Hence,it is required to provide solutions for various network related problems in (IoT) including routing,energy conservation,congestion,heterogeneity,scalability,reliability quality of service (QoS) and security to optimally make use of the available network.In this paper,a comprehensive survey on the network optimization in IoT is presented.
Can anyone provide a good java program that shows how to implement a button?
Answer:
Hello, this is Kyle Risso and I wrote a program for school not too long a go that can probably answer your question. This code creates two buttons that cycle through different colors.
Explanation:
The most important parts of the code are the ArrayList which implements the arrays for the different colors, but to answer your question the buttons are created using Action Listener as you'll see in the code. Hope this helps.
Mark’s friends told him about an automated program that sends unsolicited messages to multiple users. Which type of program were Mark’s friends referring to?
Answer:
Spambots.
Explanation:
Spambots send thousands of messages world wide once they get your information things like email and such and send out unsolicited things out constantly.
How many types of windows does Python use?
a.
four
b.
five
c.
one
d.
two
Question;
How many types of windows does python use?
Answer;
A.Four
Window does python use is Four
PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP
8. Based on the following syntax, what is a likely output for this code snippet if "number" was 35.555
return count(amount_owed. 2)
O 35.555
O 35.55
O 36
O 40
Functions are code segments that are executed when called or invoked
The function definition is not given; so, the output of the program cannot be outrightly determined.
However, the following are the possible scenarios.
The program would return 35.55 if the 2 represents the digits after decimal.The program would return 36 if the 2 represents the significant digits.It is unlikely for the program to return (a) 35.555 and (d) 40
Read more about functions at:
https://brainly.com/question/14284563
PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!
Answer:
what's the question?
Explanation:
I see no question.
Which part of the computer is responsible for managing memory allocation for all applications
A. Word processor
B. Operating system
C. Web browser
D. Intergrated development environment
I think it’s B but I’m not sure so I want to see if I’m right before answering
Answer:
Option B
Explanation:
The operating system is the type of software that is responsible for managing the processor time and also the memory allocation in the system. The operating system mainldeals with the processor time by scheduling the processor work done in the system.
The OS mainly controls the system and then schedule the execution of various types of function by the central processing unit (CPU). It also controls the memory allocation in the system.
The part of the computer responsible for managing memory allocation for all applications is the operating system. The correct option is B.
What is an operating system?The operating system is the kind of software in charge of controlling the system's memory allocation and CPU usage. By scheduling the system's processor work, the operating system primarily manages processor time.
The operating system (OS) primarily manages the system and schedules the central processor unit's performance of many types of functions. Additionally, it manages the system's memory allocation.
The CPU is the brain of the computer. It manages all the functions of the computer. It is a small rectangle chip-like structure present inside the box with other parts.
Thus, the part of the computer that is responsible for managing memory is the operating system. The correct option is B.
To learn more about the operating system, refer to the link:
https://brainly.com/question/6689423
#SPJ2
The NYC_Bicycle_Counts_2016_Corrected.csv gives information on bike traffic across a number of bridges in New York City. In this path, the analysis questions we would like you to answer are as follows: 1. You want to install sensors on the bridges to estimate overall traffic across all the bridges. But you only have enough budget to install sensors on three of the four bridges. Which bridges should you install the sensors on to get the best prediction of overall traffic
The ideal would be to install sensors on bridges at the main points of the city, to get a general idea about the traffic in the city.
We can arrive at this answer because:
The bridges that lead to the main points of the city tend to have more movement of people and vehicles.In this case, we can say that these bridges have more intense and constant traffic, which can promote a generalized view of traffic on other bridges.Therefore, by installing sensors to analyze traffic on these bridges, it would be possible to project the data collected from the sensors on less busy bridges, according to the context in which they apply.In this case, the bridges that lead to commercial centers, highways, tourist places, and other important points of the city, must receive the censors.
You can find more information about traffic at this link:
https://brainly.com/question/10961490
I ate five M&Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
What is the estimated probability of green color?
Answer:
Below is code written in a free CAS (WxMaxima):
The above code creates the probability of 19 or more brown in the sample of 48 for population sizes from 5*19 to 10000 in steps of 5.
Here’s a plot of that data:
The horizontal blue line is the probability for an infinite population size (or, choosing each of the 48 M&Ms with replacement, which I infer is not what you meant). It is calculated using the binomial cdf:
The red curve approaches the blue line asymptotically as the population gets larger.
At population 10000, the red curve is
.
Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. The program should ask for a destination file to save as the last question.
Answer:
there was a type of user name and sentences
Write a program that lets the user enter four quarterly sales figures for six divisions of a company. The figures should be stored in a two-dimensional array. Once the figures are entered, the program should display the following data for each quarter: - A list of the sales figures by division - Each division's increase or decrease from the previous quarter (this will not be dis- played for the first quarter) - The total sales for the quarter - The company's increase or decrease from the previous quarter (this will not be dis- played for the first quarter) - The average sales for all divisions that quarter - The division with the highest sales for that quarter Input Validation: Do not accept negative numbers for sales figures.
Answer: Buisness calendars
Explanation:
Is majority intent determined by how many times the same type of result is shown on the search engine result page?
According to the search engine algorithm, it is True that the majority intent is determined by how many times the same result is shown on the search engine result page.
What is Search Intent?Search Intent is a term used to describe a user's reason when typing a question or words into a search engine.
Generally, if a user found that no search results match his wants, he would likely not click on any link before performing a similar query search. This would make search engines return with more links that have higher clicks.
Different types of Search IntentInformationalCommercialNavigationTransactionalHence, in this case, it is concluded that the correct answer is True.
Learn more about Search Engine here: https://brainly.com/question/13709771
what is computer hardware part
Answer:
Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.
Explanation:
Answer:
Computer hardware is the physical parts of a computer system that is visible.
The parts of computer hardware is Central processing unit, Monitor, Mouse, Keyboard, Computer data storage, Motherboard, Speakers and Mouse.
Hope that helps. x
Which of the following correctly calculates the
money supply with M2?
A. M2 + M3
B. M2-M1
C. M2 + M1
Answer:
I think it's C.
Explanation:
I could be wrong, but this is my understanding. M3 equals the sum of all money in the economy. To get M3, you add M2 and M1. So, this would be the correct way to calculate the money supply with M2.