Answer:
Economists address these three questions: (1) What goods and services should be produced to meet consumer needs? (2) How should they be produced, and who should produce them? (3) Who should receive goods and services? The answers to these questions depend on a country's economic system.
So the answer would be WHAT, WHY & WHO. Hope this helps
Explanation:
Guys please tell me which cable is this?
Answer:
That might just be an direct internet cable
Explanation:
Answer:
it looks like a baseball bat to me
Explanation:
because if you swing it at someones forehead they will go to the disney park
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs create a disaster recovery plan open online pop-up notifications post personal information online
One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.
What is malware?Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.
One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.
Learn more about Malware:
https://brainly.com/question/14276107
#SPJ1
Jeremy knows that there is a keyboard shortcut in Word, but he does not know what it is. What should Jeremy do to find out what the keyboard shortcut is?
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages.
The subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is URL Filtering.
What is URL filtering?The term URL filtering is known to function by looking at the similarities of all web traffic against a given URL filters.
Note that it is one that is made up of database of sites that users do access and as such, the subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is URL Filtering.
Learn more about subscription from
https://brainly.com/question/14073216
#SPJ1
If non-series-rated overcurrent devices (standard molded-case circuit breakers) are to be installed in the main switchboard, breakers with adequate ____ must be installed in the panelboards.
Breakers with adequate short-circuit must be installed in the panelboards.
What are these equipment about?Common Overcurrent Protection Devices (OCPDs) are known to be Breakers or fuses that are often used to protect the full unit from too much current.
Note that Equipment such as switchboards and panelboards are often installed in an electrical system and they have to be of adequate measure of short-circuit current condition.
Learn more about overcurrent devices from
https://brainly.com/question/14284905
A(n) _____ is an organization's management support system that combines many databases to improve management decision making. data mine information center data station data warehouse information network
A data warehouse is an organization's management support system that combines many databases to improve management decision making.
What is a management support system?A decision support system, executive information system, as well as the knowledge-based or expert system functional capabilities are known to be factors that are all integrated into an management support system.
Therefore saying that A data warehouse is an organization's management support system that combines many databases to improve management decision making is a true statement.
Learn more about management support system from
https://brainly.com/question/25491895
#SPJ1
As a student you would most likely use the ________ collaboration tool set because it is free and takes not time to learn. Group of answer choices maximum
Collaboration toolsets are the programs and apps that make the work more effective and creative. Students should use a minimal collaboration toolset.
What is a minimal collaboration toolset?A minimal collaboration toolset is a platform, application, or program that is free of cost and requires no time to learn. It is used in emails and other text platforms.
It shares content through email and shares document files. This minimal collaboration toolset uses all text but lacks voices and videos.
Therefore, the minimal collaboration toolset is the correct blank.
Learn more about the collaboration toolset here:
https://brainly.com/question/15176746
#SPJ1
A programmer used Scratch to create a program with three frog sprites. If a
user clicks any of the frogs, they make a "boing" sound and glide to a random
position in the stage panel.
In this scenario, what are two examples of an algorithm?
A. The combination of panels that compose the Scratch interface
B. The code that instructs the computer to move the sprite after it is
clicked
C. The user's decision about which frog to click
D. The code that generates a random location each time.
Answer:
D. The code that generates a random location each time.
Explanation:
An algorithm is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
An algorithm is needed to get a random location.
The code that instructs the computer to move the sprite after it is clicked and the code that generates a random location each time are examples of an algorithm in this scenario. The correct options are B and D.
What is algorithm?A set of instructions or rules that must be followed in order to complete a task or solve a problem is referred to as an algorithm.
The programmer in this scenario used Scratch to create a programme with three frog sprites that respond to user input by making a "boing" sound.
In this scenario, the combination of panels that comprise the Scratch interface and the user's decision about which frog to click are not examples of algorithms.
The panels that make up the Scratch interface are part of the programming environment, but they have no effect on the program's behaviour.
Similarly, the user's choice of which frog to click is a user input, but it does not form part of the algorithm that governs the program's behaviour.
Thus, the correct options are B and D.
For more details regarding algorithm, visit:
https://brainly.com/question/22984934
#SPJ7
The Director of your company is traveling out of the country with the company laptop. Which solution can assist with recovery in the event the laptop is stolen
Customer records containing names, addresses, phone numbers, and purchase histories would be most likely stored in: customer relational networks database management systems spreadsheets information processing networks transactional networks
Customer records are the personal information of the customer that is registered in a store. Customers' records in stores are stored in the database management systems.
What is a database management system?A database management system (DBMS) is a computer-based system that stores and manages the data stored by the users. It uses software to save, retrieve and run data-related queries.
DBMS is used to store and manage a large amount of information and allows users to manipulate them. This allows the users to interact and access the data of the customers.
Therefore, the customer's records are stored in database management systems.
Learn more about database management systems here:
https://brainly.com/question/4325836
#SPJ1
Besides the Game Engine, name and describe three other game development tools. Then, briefly compare and contrast these tools.
The three other game development tools are:
Level editing tools.Scripting tools.Modeling tools.What are Game development tools?A game development tool is known to bee any kind of specialized application that has been made to help assists or boast the creation of a game.
Conclusively, Note that those free game creating software written above can a person to start making their dream game among others.
Learn more about development tools from
https://brainly.com/question/11352260
13,Which hardware device is used in decoding the machine language version of an instruction in the Instruction Decode stage of the Fetch Execution Cycle
Program _______ graphically present the detailed sequence of steps needed to solve a programming problem.
Program Pseudocode graphically present the detailed sequence of steps needed to solve a programming problem.
What are Pseudocode?These are known to be a set of codes that a program has graphically depicted all of its sequence of steps that can be sued to handle a programming problem.
Note that Pseudocode is a form of artificial and man made informal language that is often used by programmers to create algorithms.
Learn more about Program from
https://brainly.com/question/153827
#SPJ1
20 Points!
Select the correct answer.
Look at this web page from the National Oceanic and Atmospheric Administration’s (NOAA) website. How does the page use contrast?
a web page on the NOAA website
A.
by providing a search box for users
B.
by using a consistent type of font for all text
C.
by using an image of an actual school of fish
D.
by using lighter font against a darker background
Answer:
By using lighter font against a darker background
Explanation: Contrast, the state of being strikingly different from something else in juxtaposition or close association! Or opposites for short!
Another word for asking a question of your data is to _____ it.
Answer:
query
Explanation:
Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology and will be at a disadvantage in life. What could you tell Cameron to reassure him that his sister will still be able to use technology?
___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker.
A type of social engineering where a hacker lures unsuspecting individuals to enter personal information into a website controlled by the hacker is phishing.
What is phishing?Phishing can be defined as a type of social engineering (cyber attack) which involves making an attempt to obtain sensitive user informations, especially by disguising one's self as a trustworthy entity in an electronic communication, which is usually over the Internet.
This ultimately implies that, a type of social engineering where a hacker lures unsuspecting individuals to enter personal information such as usernames, passwords and credit card details or bank account details into a website controlled by the hacker is called phishing.
Read more on phishing here: https://brainly.com/question/23850673
#SPJ1
In the following citation for a website, which detail is optional, according to
MLA style?
Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.
2014 .
A. Web.
B. 6 Mar. 2014.
C.
D. Home page
According to MLA style, the detail which is optional in the given citation for a website is: C. mapping link.
What is an information source?An information source can be defined as a system or medium through which information, knowledge and ideas may be gotten (generated) and used by an individual.
What are citations?Citations can be defined as references or links to all of the sources from which an author, writer, or researcher got his or her information from.
The characteristics of a MLA citation.Generally, MLA citation often comprises the following information:
Author's last name and first name.Title of source.Title of container.Other contributors.VersionThe name of the publisher.Publication date.Location.According to MLA style, the detail which is optional in the given citation for a website is mapping link.
Read more on citations here: https://brainly.com/question/8789070
#SPJ1
Complete Question:
In the following citation for a website, which detail is optional, according to
MLA style?
Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.
2014 .
A. Web.
B. 6 Mar. 2014.
C. Mapping link
D. Home page
which of the following is a benifit of googling yourself ?
Answer:
you are protecting yourself from identity theft
Which term best describes the set that makes up an algorithm?
A. Steps
B. Documents
C. Statements
D. Patterns
Answer:
A
Explanation:
An algorithm is a series of steps to get to a final result.
The term that best describes the set that makes up an algorithm is steps. The correct option is A.
What is algorithm?An algorithm is a set of step-by-step instructions that are followed in order to complete a specific task or solve a particular problem.
Each step in the algorithm is typically a distinct command or operation designed to accomplish a specific goal or modify a specific aspect of the data being processed.
Documents, statements, and patterns are not the best terms to describe the collection of elements that comprise an algorithm.
While an algorithm can be documented or described in written or visual form, the term "documents" does not adequately describe the nature of the instructions themselves.
Similarly, while an algorithm may be made up of individual commands or operations, the term "statements" does not convey the concept of a step-by-step process.
Finally, while an algorithm may contain repeating patterns or structures, the term "patterns" does not imply a linear sequence of steps that must be performed in a specific order.
Thus, the correct option is A.
For more details regarding algorithm, visit:
https://brainly.com/question/22984934
#SPJ7
When reconciling your bank statement with your checkbook, what should you
do first?
O A. Compare deposits.
•
B. Compare balances.
• C. Compare dates.
• D. Compare checks and withdrawals.
b All your transactions for the month may not be on your bank statement. Some transactions might have occurred too close to the statement date. Those transactions will appear on the next statement, but are already recorded in your check register.
A program has a class Potato , which is derived from the class Vegetable , which is derived from the class Food . This is an example of _______
You are writing an algorithm and want to tell the computer what to do if the
user does not perform an action. Which type of statement should you include
in your algorithm?
A. Return
B. When-if
C. If-else
D. And-or
Answer:
you are writing an algorithm and went to tell computer what to do If the return
The type of statement, i.e., if-else should be include in your algorithm. The correct option is C.
What is if-else statement?An "if-else" statement is a conditional statement that determines whether a particular condition is true or false and then executes different code based on the outcome of that evaluation.
An "if-else" statement could be used in the context of a user action to check whether the user has performed a specific action and then execute different code depending on whether the user has performed that action or not.
To exit a function and return a value to the calling code, use a "return" statement. A "when-if" statement and a "and-or" statement are not standard programming constructs and are rarely used in code.
Thus, the correct option is C.
For more details regarding algorithm, visit:
https://brainly.com/question/22984934
#SPJ7
A machine learning cloud application provides meaningful data with the company's local customer information and purchase history. The company considers this data sensitive. How should the company manage this data when interfacing with the cloud service
Cloud storage is a service prototype that stores the data on remote storage sources generally on the net. The company can manage the data by keeping data on the local storage.
What is local storage and cloud storage?Local storage is the storage place present in the system either in the hard drives or in the form of a solid-state drive (SSD). Cloud storage is the web storage platform that stores the data on the internet.
The cloud storage maintains, backs ups, and manages the files and folders stored on the cloud platform. Cloud storage is the virtual platform that is available to users based on the space needed.
Therefore, the data on local storage is managed when interfacing with the cloud system.
Learn more about cloud storage here:
https://brainly.com/question/17328624
#SPJ1
What is output by the following code?
for x in range (4):
for y in range (3):
print("*", end=" ")
print("")
Group of answer choices
* * * *
* * * *
* * * *
* * * *
* * * *
* * *
* * *
* * *
* * *
* * * * *
* * * * *
* * * * *
* * * * *
* * * *
* * * *
* * * *
Answer:
* * *
* * *
* * *
* * *
Explanation:
The inner loop will print 3 times *
For every outer loop, that 3 times * will be printed again => 4 times in this case
The end=" " is to add new line in each inner loop
1. The first Pong arcade game in the ______ is considered to be the start of modern video game industry
a) early 60s
b) early 70s
c) early 80s
d) early 90s
Answer:
B
Explanation:
The first pong game came out November 29, 1972
Which button on a desktop computer begins a reboot of the computer without power being removed from the computer's components?
Answer:
1. Click the Start button in the lower-left corner of your screen. You can also press the Windows key on your keyboard to open the Start menu.
2. Choose the Power icon.
3. When you click the power button, you will have the option to put your computer to sleep, restart it, or power it down.
Explanation:
Have a good day
The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.
802.11n standard uses multiple input/ MIMO technology.output (MIMO) technology to boost performance. Increases the speed of wireless local area network communications, as well as their dependability and range.
What is MIMO technology?Multiple-Input MIMO Many-Input, Multiple-Output is a wireless technology that uses multiple transmitters and receivers to carry more data at once. MIMO is supported by all 802.11n wireless equipment.
The technology enables 802.11n to achieve faster rates than goods that do not have 802.11n.
Thus, 802.11n standard used for boosting performance in MIMO technology.
For more details about MIMO technology, click here
https://brainly.com/question/14128610
#SPJ1
What is the primary difference between sort and filter?
Answer:
Filter only shows the messages that match a particular criterion
You have double-clicked a device in Device Manager to open its Properties window. Where can you find information about IRQs the device might use
To find information about IRQs the device might use, make alteration to the View menu option and then change it to Resources by type.
How do one find information about IRQs?The best way to see IRQ information in Windows is through the use of Device Manager.
Note that for one to be able to find information about IRQs the device might use, one has to makes some changes to the View menu option and then one can change it to Resources by type to be able to see the Interrupt request (IRQ) part.
Learn more about Device Manager from
https://brainly.com/question/869693
#SJ1