Answer:
Question 1:
I. It will help to reduce or eliminate wastes
II. It will help to conserve energy
III. It will help to improve the quality of life.
Question 2:
I. It will lead to environmental pollution
II. It will lead to poor quality of products
III. It will deplete the natural resources and energy.
Explanation: Sustainable food choices are the various choices and decisions we make when choosing the various processes and activities required to produce,process and consume food with the aim of ensuring that energy is conserved, pollution is reduced or eliminated, energy and the natural resources in and around the environment are effectively utilised to help improve the quality of life and environmental. There are several negative consequences of not adopting sustainable food products which includes pollution, energy depletion, poor quality of life etc.
please answer this question
Answer:
The answer for this question is Kry+Ptography
Which activity is the best example of a negative habit that may result from
heavy computer and Internet usage?
A. Playing web-based games instead using social media
B. Shopping online in order to find a gift for a friend
c. Using apps for driving directions instead of using a paper map
O D. Avoiding local friends in order to play online games
SUBMIT
Answer:
D
Explanation:
Any of these is an example, but the most drastic would be D, Avoiding local friends in order to play online games
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions
Answer:
privilege escalation.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.
In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.
Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.
Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.
Complete the code.
import CSV
inFile = open('pets.txt', 'r')
myReader =
reader(inFile)
for item in myReader
print(item)
The complete Phyton code is given below:
Complete the code.
import CSV
inFile = open('pets.txt', 'r')
myReader =
reader(inFile)
for item in myReader
print(item)
exit()
Phyton is a high-level, object-oriented programming language. It is easy to learn its syntax and reduces the cost of program maintenance.
In the code above, the last line exit() was included to complete the code and to signal to the computer that that is the end of the instruction.
Please see the link below for more about Python Program:
https://brainly.com/question/12684788
Answer:
cvs.reader(inFile)
Explanation:
What is the difference btween a microcontroller a mini computer?
Minicomputers can be quite bulky. Just the CPU itself can weigh up to 90 pounds.
Minicomputers can be quite bulky. Just the CPU itself can weigh up to 90 pounds.Minis were designed to be less complex than mainframes but still provide multiple terminals for multiple users. However, many of these systems were still slower, had less memory and were unable to integrate into larger networks.
Minicomputers were primarily used for process control and performing financial and administrative tasks, such as word processing and accounting. Some machines were designed for medical laboratory and teaching aids.
Microcomputers are primarily used for word processing, managing databases or spreadsheets, graphics and general office applications.Explanation:
hope it helpsPlease help
what do data communications transmit data through?
Answer:There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at the same time over multiple channels.
Explanation:
The control unit and arithmetic logic unit are part of which hardware component?
O A. Blu-ray disc
B.
ROM
O C.
monitor
D.
CPU
O E
RAM
Answer:
The control unit and arithmetic logic unit are part of which hardware component IS CPU
CPU IS THE ANSWER
Explanation:
Answer: The answer to your question is CPU
Explanation:
Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)
Answer:
The expression is:
if widthOfBox % widthOfBook != 0
Explanation:
Given
Variables:
(1) widthOfBox and
(2) widthOfBook
Required
Statement that checks if (1) is divisible by (2)
To do this, we make use of the modulo operator. This checks if (1) is divisible by 2
If the result of the operation is 0, then (1) can be divided by (2)
Else, (1) can not be divided by (2)
From the question, we need the statement to be true if the numbers are not divisible.
So, we make use of the not equal to operator alongside the modulo operator
_______ and _______ are the logical statement.
in python write a code to find power (2 & -2)
Explanation:
b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments
Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS
Answer:
it providrd a shell for MS-DOS
Explanation:
It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.
what is the difference btween a microcontroller a mini computer?
Answer:
The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.
Answer:
The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.
Answer:
1) Yes, Publisher relation should have a publisherID primary key.
2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.
Explanation:
The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices
Answer: implicit
Explanation:
When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.
Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.
Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps
Answer:
Clear out any garbage file on the drive
Explanation:
Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.
Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.
These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.
The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.
However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.
Therefore option C is correct.
Know more about Disk Cleanup:
https://brainly.com/question/31937611
#SPJ6
How can data be calculated?
Answer:
Data can be calculated by solving an equation
Explanation:
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”
what will happen to the tools and equipment, if it is not store propely?
In the table below, identify the data type that would be most suitable for the second field.
Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number
Answer:
e num
Explanation:
Answer:
A
Explanation:
can someone's answer this
Answer:
See explanation
Explanation:
Required
The surface area of each shape
Triangle
[tex]Area = \frac{1}{2}bh[/tex]
[tex]b\to base; h \to height[/tex]
So:
[tex]Area = \frac{1}{2} * 23 * 21[/tex]
[tex]Area = 241.5m^2[/tex]
Square
[tex]Area = l^2[/tex]
[tex]l \to length[/tex]
So:
[tex]Area = 10^2[/tex]
[tex]Area = 100m^2[/tex]
Rhombus
[tex]Area =a^2\sin(\theta)[/tex]
[tex]a \to side\ length[/tex]
[tex]\theta \to any\ interior\ angle[/tex] (not given)
So:
[tex]Area =18^2\sin(\theta)[/tex]
[tex]Area =324\sin(\theta)[/tex]
Trapezium
[tex]Area = \frac{1}{2}(a + b)*h[/tex]
[tex]a,b \to parallel\ sides; h \to height[/tex]
So:
[tex]Area = \frac{1}{2}(18 + 23)*21[/tex]
[tex]Area = \frac{1}{2}*41*21[/tex]
[tex]Area = 430.5m^2[/tex]
Circle
[tex]Area = \frac{\pi d^2}{4}[/tex]
[tex]d \to diameter[/tex]
So:
[tex]Area = \frac{3.14 * 5^2}{4}[/tex]
[tex]Area = \frac{3.14 * 25}{4}[/tex]
[tex]Area = \frac{78.5}{4}[/tex]
[tex]Area = 19.625m^2[/tex]
COMP
Mention six characteristics of modern computers.
i.
ii.
iv.
Answer:
speed
storage capacity
reliability
accuracy
diligence
multitasking
What is the definition of WLAN
Explanation:
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.
stay safe healthy and happy.brain of the computer system is called
Answer:
central processing unit in short form CPU :)
Answer:
The Central Processing Unit(CPU)
Explanation:
The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results.
…….. and ……...are called binary digits. (Computer Science)
Answer:
Explanation:
0 and 1 are called binary digits.
here is your answer..
Input the time in hours. Calculate and print the time in minutes and seconds. [I hr = 60 minutes]
Answer:
The program in Python is as follows:
hrs = float(input("Hours: "))
mins = 60 * hrs
print("Minutes: ",mins)
Explanation:
This prompts the user for hours
hrs = float(input("Hours: "))
This converts to minutes
mins = 60 * hrs
This prints the minutes equivalent
print("Minutes: ",mins)
When using the “rule of thirds,” where should focal points be placed?
Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.
Have a nice day!
What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit
Answer:
it's D
Explanation: i had this question before and i got it right :)
Answer:
D. An initial deposit
Explanation: Hope this helps :)
different he launc.
in function are available with MS-Excel
Many
functions are available with MS-Excel..
1.count and sum
2.cell references
3.data and Time
4.text
5.lookup and reference
6.finanical
7.round
8.array formula
Jack regularly uses a wireless connection to access various networks as he travels around the world running his fashion line. Jack is able to access these Wi-Fi networks by using what?
Answer:
A Virtual Private Network, VPN connection
Explanation:
Virtual Private Network, VPN, is connection from a device to the internet which is encrypted and protected whenever such networks is established including on public networks. When a VPN is used third parties will not easily track or eavesdrop on the network or traffic data from the connection
In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production
post-production
development
distribution
Explanation:
There are five phases of film production and they include development, pre-production, production, post-production and distribution.
Answer:
pre-production
Explanation:
edg2021
Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.