PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *

Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.

Software used for professional print publications such as posters, books, and email newsletters is called a: *

Professional software
Word processing software
Desktop program
Desktop publishing software

Which of the following criteria does NOT determine the credibility of a source? *

How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author

The process of finding a solution to a difficult or complex issue to make it easier is known as *

problem
problem-solving
input

A series of actions taken in order to solve a particular problem is known as the____________ *

process
problem
input
output

A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *

problem
output
algorithm
input

Which is the third step in the problem-solving process? *

Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem

A list of sources you used when writing a scholarly article on a specific subject is known as a: *

intellectual-property
credibility
bibliography
trademark

Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter

Which of the following is NOT a writing style format for academic purposes? *

Times New Roman
American Psychological Association
Modern Language Association

The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *

plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *

SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.

say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.

Answers

Answer 1

Answer: 1 Definition of the problem

        2 Desktop publishing software

        3 The gender of the author

4 problem-solving

5 input

6 algorithm

7 Select the most effective solution

8 credibility

9 All of the above

10 American Psychological Association

11 copyright

12 agree that there are fewer emerging jobs

sell goods and services as we’ve never been able to

Explanation:


Related Questions

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

what is the first thing you should do when you open a savings account

Answers

Answer:

Compare your options. There are many financial institutions that offer savings accounts. .

Explanation: PLS MARK BRAINLIEST

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

what is the version number for mysql returned from port 3306

Answers

Answer:

For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.

what is the best protection method for sharing pii

Answers

Answer:

What is the best protection method for sharing (PII)? Digitally sign and encrypt the email..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do

Answers

Answer:

You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.

Hope this help please give the brainliest award would be much appreciated.

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described

Answers

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has been initialized and contains at least two elements.

Answers

Answer:

[24, 35, 9, 56 Approach #3: Swap the first and last element is using tuple variable.

2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.

Answers

Answer:

ok.... ..............

Can someone help me please?

Answers

Answer:

ummm this is hard i think answer is 5 robuk am pro

Explanation:

cuz me say soo

what is the set of events that occurs between the moment you turn on the computer and the moment you can begin to use the computer

Answers

Answer:

Booting

Explanation:

Booting is the process that occurs when you press the power button to turn your computer on. During this process (which may take a minute or two), the computer does several things: It runs tests to make sure everything is working correctly. It checks for new hardware.

What component uses thermal paste to attach the heat sink?

Answers

Answer:

Thermal compound is the answer

True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.

Answers

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

There are different kinds of true statement.  Visual Studio is not a part of Unity is a true statement.

Is Visual Studio a part of Unity?Visual Studio is known to for  Mac Tools and also for Unity is said to be part of  the installation of Visual Studio for Mac.

You can verify the type of Visual Studio differs for Mac and other product.

Learn more about Visual Studio from

https://brainly.com/question/4925305

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?​

Answers

Answer:

Just get it right and don't get stressed

Explanation:

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:

coding word scramble

ICOAIPAPLTSN- a software program for end users

AADT- processed information

RAAEHWRD- physical parts of computer system

MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible

Answers

application, data, hardware, programming

The decoded words for the coding word are:

ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - Programming

What is coding words?

In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.

Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.

Read more about coding here:

https://brainly.com/question/26134656

#SPJ3

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

Dữ liệu trong 1CSDL được lưu trong

Answers

Answer:

ha ano daww??

Explanation:

??? btw thanks for the points

Review the items below to make sure that your Python project file is complete. Once you have finished reviewing your variables.py assignment, upload it to your instructor.1. Make sure your variables.py program prints the following things, in this order:a) Hello world!b) Spamc) Eggsd) SpamEggse) Spam Eggsf) Spam Eggsg) 7 9h) 20i) 13j) 5k) 13l) 10.8m) 2.72. Make sure that you have saved your program. TIP: If there is an asterisk before the file name in the variables.py text editor window, you need to save your work.

Answers

Answer:

print('Hello world!')

print('Spam')

print('Eggs')

print('SpamEggs')

print('SpamEggs')

print('Spam Eggs')

print(7)

print(20)

print(13)

print('5k')

print(13)

print('10.8m')

print(2.72)

Explanation:

Integers and floats don't need quotes, but if you want to combine it with a string, then you need a quote. Hope that this solution is what you are looking for!

a modem is required for ________________ internet access.

Answers

Broadband I believe!

import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()

Answers

Answer:

Export ariana grande fort nite skin

Answer:

I M P O R T P I C K L E

Explanation:

Other Questions
It is..orange ( Add an artificial) how many species of finch are there in the galapagos? PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:1. Software used to search a database using keywords or phrases entered by the user.A) Navigation TrackingB) NetworkC) Search EngineD) Ethernet Cable2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly. A) Antivirus application B) Ethernet cable C) Computer virus D) HTML 3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers. A) ModemB) USBC) Intranet D) Desktop Interface4. software that the owner maintains exclusive control over how it is modified and distributedA) proprietaryB) navigation trackingC) SpywareD) operating system5. set of principles that help users determine what is right or wrong in regards to computers.A) modemB) HTMLC) navigation trackingD) Computer ethics6. spyware that manages all of the installed applications and hardware on a computer or device. A) Computer virusB) operating systemC) citationD) HTML7. physical components of a computer system such as computer, mouse, or modem.A) softwareB) Network C) browserD) hardware8. A malicious software program that spies on the user and share the information with a third-party. A) antivirus applicationB) malwareC) spywareD) Desktop interface9. icons and menus on the computer that allow the user to interact with the operating system. A) Desktop interfaceB) intranetC) navigation trackingD) Computer ethics10. A tool that provides directions using satellitesA) asynchronous communicationB) navigation trackingC) Ethernet cableD) HTML11. A restricted private network used by organizations to communicate. A) asynchronous communicationB) navigation trackingC) intranetD) browser12. content that is not owned by any individual or company that is free to use. A) networkB) proprietaryC) Desktop interfaceD) public domain13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computerA) Cable InternetB) Computer virusC) public domainD) operating system 12. content that is not owned by any individual or company that is free to use. A) networkB) proprietaryC) Desktop interfaceD) public domain13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computerA) Cable InternetB) Computer virusC) public domainD) operating system A student is studying Earth's Layers. She is trying to determine how temperature and density change from one layer to another. Which relationship that exists between Earth'sSversed the student mostly findThe temperature of Earth's layers decreases with depth while density increases with depthThe temperature of Earth's layers increases with depth while density decreases with depthThe temperature and density of Earth's layers decrease with depthThe temperature and density of Earth's layers increase with depth 31) Which propaganda technique does the author of the article use?A) bandwagonB)stereotyping7C) logical appealcD)emotional appeal PLEASE HELP PLEASE PLEASE HELP PLEASE Why do you think Jefferson wanted the world at large to understand Americas plight independence? Define the words offense and defense in flag football In 486, the king of the defeatedthe last Roman commander.A. FranksB. TurksC. Arabs do private schools in california require vaccinations Day 1 Values and beliefsWhat is the difference between a value and a belief? what does buey mean in spanish What is the relationship between number of electrons on the outer energy levels andgroups? Why did I get this wrong. Can you provide correct answers? Can u guys help me with #5 and 6 please? What word best describes the theme of the poem?The poem is called "Icaruss Flight"FreedomFearWisdomInsight a nurse is caring for a 55-year-old postoperative client. the client returns to the icu after surgery intubated and mechanically ventilated with a salem sump nasogastric tube, a foley catheter, and a picc line in place. based on the nurses knowledge of the most common hospital-acquired infections, which apparatus is most important to remove first? Find the equation for the line shown SOMEONE HELP ME WITH THE HW ILL MARK YOU BRAINLY Working conditions in English factories, the hours you work, opportunities for breaks, the average wages workers are paid, safety on the job, ages of those you work with (including children), health and healthcare, and what you will do when you are too old to workYour thoughts on the problem:Some solutions:Types of laws that might be passed to address your concerns, including measures that factory owners should take to improve conditions, or steps the government could take to protect workers and insure better living conditionsYour thoughts on the problem:Some solutions:Ideas you have for improving urban life such as city planning, technological innovations, sanitation, schools, hospitals, and law enforcementYour thoughts on the problem:Some solutions:How the governments actions can affect Englands future, including the health, education, and welfare of its citizensYour thoughts on the problem:Some solutions: