Answer:
you should not do that unless you have a good reason to.
how important the role of valet and butler service in the hospitality
What is the best most effective way to add your savings account?
Explanation:
to put money in your savings account for college and Car a house and a.bunch of important stuff in life
what is bitcoin??????
Answer:
a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.
Explanation:
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use
PKI trust model that should be used, is a distributed trust model.
A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums. With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.Conclusively, we can say that PKI trust model that should be used is a distributed trust model.
Learn more from:
https://brainly.com/question/14837773
A restaurant is interested in learning about the food preferences of people living nearby to the restaurant and intends to use survey data to help decide which new items to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?
a. Cleaning a data visualization to remove unwanted patterns.
b. Iteratively creating visualizations to ask and answer new questions.
c. Cleaning data to remove inconsistencies.
d. Filtering the data to look at the responses from only certain groups.
Answer:
answer is d
Explanation:
i got it right in code.org
Answer:
A. Cleaning a data visualization to remove unwanted patterns.
Explanation:
While cleaning data in its raw format can be an important part of the Data Analysis Process, the visualizations are not cleaned and/or altered but rather they are interpreted to discover what patterns exist in the data.
*If one is in search of a pattern, why would one clean or alter the pattern they have been provided, self-sabotage.*
where is the scroll bar located inside a web browser?
The Scroll Bar is the narrow space in your browser window just to the right of the content area.
what is the answer ??
Answer:
2nd answer is braille printer1st one is MICR .80percent sure 20 percent not
[tex]▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ { \huge \mathfrak{Answer}}▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ [/tex]
1. Correct choice - MICR
MICR characters are written using oxide of Iron.
2. Correct choice - Braille printer
Braille printer is the device used to give output which can be read by visually impaired people.
You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?
A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above
(10pts)
Drag the tiles to the correct boxes to complete the pairs. Match the conversion systems with their steps. To convert a decimal fraction into its hexadecimal form to convert a hexadecimal number into its decimal form to convert a binary number into its hexadecimal form to convert decimal fraction into its hexadecimal form Divide each digit on the right side of the decimal point by the sum of different powers of 16. ArrowRight Use the decimal number system as an intermediary. ArrowRight Divide the left side of the decimal by 16, and multiply the right side by 16. ArrowRight Use repeated division and multiplication.
Answer:
1
Explanation:
Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
Answer:
</p><p>
</p><p>days1(); // calling function days1()
</p><p>
</p><p>function days1() // function days1
</p><p>
</p><p>{
</p><p>
</p><p>var week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",
</p><p>
</p><p>"friday"," saturday"];
</p><p>
</p><p>var i;
</p><p>
</p><p>for (i=0;i<7;i++) // iterating over the loop
</p><p>
</p><p>{
</p><p>
</p><p>document.write(" The number of days in a week :" +</br>);
</p><p>
</p><p>document.write( week[i] + "</br>" ); // print the number of days
</p><p>
</p><p>}
</p><p>
</p><p>}
</p><p>
</p><p>
Output:
The number of days in a week :
sunday
monday
tuesday
wednesday
thursday
friday
saturday
Explanation:
In this program, we create a function days1().In this function, we declared an array i.e " week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.
Match the letter with the corresponding Workspace Area
Options :
-workspace settings
-options bar
-menu bar
-toolbar
The workspace areas described are editing tools of the photoshop program
The options described below are part of the Adobe Photoshop program for image and photo editing.
Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.
Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.
Menu bar: It is the bar located at the top (first row) in which we find different options such as:
FileEditionImageCapTextSelectionFilter3DViewWindowHelpToolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:
MoveMagnetic loopTrimDropperBrushDraftDegradedFeatherNote: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.
Learn more in: https://brainly.com/question/24964958
Which of the following best describes the original meaning of the term hacker?
Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer
Answer:
Dangerous cybercrimina
Explanation:
Answer:
Skilled computer user and computer virus developer
Explanation:
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Answer:
Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.
hi please help ASAP it's about html!
Create a HTML code for writing a web page for your school time-table.
Answer :-<html>
<head>
<title> Time Table </title>
</head>
<hrcolor = "red">
<hrcolor = "blue">
<body>
<table><tr = "7"><md = "7"><Period 1_></table>
</body>
</html>
[tex] \\ [/tex]
Answered by - ItzMaster
Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.
Answer:
Alan is a Maintenance Supervisor.
Explanation:
Answer:
printing plant manager
Explanation:
List 2 differences between routing messages and broadcasting messages
Answer:
Hub is an example of a broadcast device.
Switch is an example of a multicast device
Software is:
A. storage-related information technology.
B. programs that help hardware accomplish tasks.
C. the opposite of firmware.
D. all of the above.
Games for which of these devices have the lowest graphical quality and computing requirements? ASAPP!!!!!
A. PDAs
B.handheld consoles
C. tablets
D.smartphones
E. feature phones
Answer: A. PDAs
Explanation:
Personal Digital Assistants (PDAs) allowed for a user to carry out computational tasks such as calendars and planning in the time before smartphones. They were extremely useful to business people.
They did not however, have the best graphics for running games. This meant that any games on a PDS would be of pretty low graphic quality and require low computing requirements as well.
Answer:
A - PDA
Explanation:
PLATO
I will make you brainless Just answer this question!!!!
A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...
Answer:
6, 8,5,3,4,1,9,2,7
Explanation:
Just like that
Answer:
6, 8, 1, 3, 4, 2, 9, 5, 7
what safety do you need to have ready to start a device repair?
Answer:
Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.
Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.
Answer:
The answer is 2 and 4, please give brainliest award.
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities
grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities
A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.Conclusively we can therefore say that the hacker was a gray hat hacker.
Learn more from
https://brainly.com/question/15899195
In which phase of website design does the designer create a mock-up aimed at the target user? A. learning B. planning C. design D. development E. testing and delivering
Answer:
C. design
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.
In the design phase of a website design, the website designer create a mock-up aimed at the target user. A mock-up is a graphical representation or illustration of a graphic design and as such isn't responsive.
This ultimately implies that, a mock-up or model can be used by a website designer to illustrate or show the target user the look and feel of a website, so as to help these users have a better understanding of the specific elements and structure associated with it.
which email attachments are generally safe to open
Answer:
i would suggest not opening ones that start with bit . ly
Explanation:
pls mark brainliest
What is the difference between a filter and a Search Folder?
*manually & *on demand
Answer:
manually and on demand is correct
Explanation:
The water splashed all over the top of the car.
Answer:
e
Explanation:
Dry the car of i guess
how to install windows 11 on unsupported processor
Answer: You can't, if you anyway bypass the system, your device will run on risk.
Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.
(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)
Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.
hi bae systems applied to the relationship
What is LinkedIn?
A job search website
A virtual job fair
A recruiter website
Answer:
A job search website.
Explanation:
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav