Answer:
Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.
Explanation:
Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.
Since Mavis is considering signing up for a hosted enterprise software solution for her small business, an advantage of the software is lower cost.
A hosted enterprise software solution is typically hosted off-site and in a private server that is owned by a third party. It's vital for organizations as it can be used in managing daily business activities.
The advantages of a hosted software model include reliable backup, reduction in IT costs, scalability of computing resources, etc. It is also necessary for managing critical business processes.
Read related link on:
https://brainly.com/question/25526416
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.
Answer:
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.
why are extensions necessary in scratch programming as a whole?
Present your opinions about using robots to help with household routines.
Answer:
I believe robots helping with household routines is great! Robots hold have great capability to assist senior 's. Robots can hand appropriate medicines to older adults on time. They can mop the floor super fat and super good. Additionally, there are robots that can lift people up and move them to a certain place!
Explanation:
Which is the proper way to call the function three circles?
Answer: d. three_circles()
Explanation:
what is cyber crime? is hacking is cyber crime
Answer:
Crime committed using computer networks.
Explanation:
well I don't think sooo..........
HOPE IT HELPS.......Answer:
Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.
Yes,hacking is a cyber crime.
u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory
Answer:
B
Explanation:
Dynamic Random-Access Memory
A company gives out bonuses based on the amount of income generated by their sales representatives per month. Once the income is greater than $5000 a bonus of 10% of the generated income is given to the employees. Read the income generated and print the bonus
The code block which calculates the bonus amount earned based on sales is written thus in python 3 ;
income = eval(input("Enter generated income : "))
#takes input for the amount of income made
bonus = 0
#initialize the bonus amount
if income > 5000 :
#if the income earned is greater than 5000
bonus = (0.1 * income)
#bonus earned is 10%
print("Your bonus is :", bonus)
#display bonus
A sample run of the program is attached.
Learn more : https://brainly.com/question/15437930
A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place
You should show your working.
Answer:
5 Kilobytes
Explanation:
5000 bytes ÷ 1000 = 5 kilobytes
Difference between web browser and search engine.
Answer:
A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.
Explanation:
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.
Answer:
True
Just look it up and put quizlet at the end of your question youll find it.
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project
Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.
Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.
Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.
Learn more : https://brainly.com/question/25531734
List down 5 elements of Multimedia
Answer:
text, image, audio, video, animation
Answer : The five elements of Multimedia are text, images, audio, video and animation.
Hope This Helps You.
Which command should you enter at the command prompt to display the current user's quota limits and disk usage?
uploaded ads give advertisers access to more inventory than responsive display ads. true or false?
Answer:
True
Explanation:
This is because of the fact that it allows the marketing industry rise to higher rates.
Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship
Answer:
censorship
Explanation:
censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
An electronic element that stores data by changing its resistance based on the current that has passed through it, similar to RRAM (Resistive Random Access Memory), is called a Memristor.
What is memristorThe term "memristor" is a combination of "memory" and "resistor," indicating its ability to retain information based on its resistance state.
Memristors are considered a fourth fundamental passive circuit element, alongside resistors, capacitors, and inductors.
Learn more about electronic element at
https://brainly.com/question/24977425
#SPJ2
What is monitor ?why it is necessary for computer system ?
Answer:
Monitor is an output device that displays information in pictorial or text form. A monitor usually comprises a visual display, some circuitry, a casing, and a power supply.
It is important as it allows for proactive response, data security and data gathering and the overall good health of a computer system.
who is the father of computer?
a.jeff bezos
b.cgarles babagge
c.micky pointe
d.marlos carten
Answer:
Explanation:
B.
"Depression is being colorblind and constantly told how colorful the world is.”
On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .
Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.
A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.
Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;
System softwareUtility softwareApplication softwareAn application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.
According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:
Social networkingDatingEntertainmentGamingNewsWeb browsingOn the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:
HealthExerciseReadingRelaxationEducationFind more information: https://brainly.com/question/14379808
Hey, can somebody convert this Pseudocode into a Python Program, I've been struggling to do so for a while.
Answer:
print("Enter a positive whole number: ")
NumberIn = int(input())
NumberOut = 0
Count = 0
while NumberIn > 0:
Count = Count + 1
PartValue = NumberIn % 2
NumberIn = NumberIn // 2
for i in range(1, Count - 1):
PartValue = PartValue * 10
NumberOut = NumberOut + PartValue
print("The result is: " + str(NumberOut))
Outputs:
Enter a positive whole number:
22
The result is: 1011
Enter a positive whole number:
29
The result is: 1111
Enter a positive whole number:
-1
The result is: 0
1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues
Answer:
well...
Explanation:
it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue
A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.
Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.
In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information. With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.Learn more : https://brainly.com/question/25682762
Cloud providers often charge their customers based on the amount of processing resources used, such as CPU usage. This practice is known as ________.
Platform as a Service (PaaS)
Define cyber law with its area
Answer:
Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements
Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.
How to fix common problem of a computer system?
the envelope method, notebook and pencil, and online software are all methods of ______.
Answer:
tracking your spending.
The envelope method, notebook and pencil, and online software are all methods of tracking your spending as per the given situation. The correct option is C.
What is software?A set of instructions, data, or programs used to operate computers and carry out specific tasks is referred to as software. It is the inverse of hardware, which describes the physical characteristics of a computer.
Inner needs to track spending in personal and business activities in order to know financial status and budget effectively with available funds.
Without tracking spending, there is a risk of waste and overspending on unimportant items.
The envelop method entails putting money in different envelops for each category of spending. At the end of the period, you can check the envelops to see how much money was spent in each category.
Keeping track of expenses requires a notebook and a pencil.
QuickBooks online software can be used to track how much an individual or business has spent.
Thus, the correct option is C.
For more details regarding tracking the spend, visit:
https://brainly.com/question/14511380
#SPJ5
Your question seems incomplete, the missing options are:
estimating your unexpected expensesplanning for your futuretracking your spendingunderstanding your current expensesYou can point your router to a DNS server for name resolution simply by configuring the ____ command.
You can point your router to a DNS server for name resolution simply by configuring the IP name-server command: IP name-server.
DNS is an abbreviation for domain name system and it refers to a naming database in which internet domain names or website URLs are stored and translated into their respective internet protocol (IP) address.
Hence, a domain name system (DNS) is used to connect a uniform resource locator (URL) or a web address with its internet protocol (IP) address.
In Computer Networking, when an IP name-server command is configured on a router, it enables the user the ability or opportunity to point it to a domain name system (DNS) server for name resolution or translation into an internet protocol (IP) address.
Read more: https://brainly.com/question/17273205