Answer:
The idea is page should be fixed and cannot be scroll. Header and footer always stick to top and bottom. the middle part is content which is scroll-able only. contents should not be overlapped by header and footer. Layout should work with different type of devices and screen.
Explanation:
among the 4 cables ,shielded,unshielded,coaxial,fibre optics,what do you think is the most convenient or most prefer to use.why?
Answer:
You can use fibre optics
Explanation:
Because it is speed than other wires, it is also cheaper.
An agile team has which two characteristics? (choose two. ).
A SAFe Agile teams are often known to be Scrum Master and Product Owner. An Agile team characteristics are:
A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value.A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value.
A SAFe Agile team is a cross-functional group as they are made up of about of 5-11 people who set apart, build, test, and deliver an increment of value in a short time box.
Agile team are known to be cross functional as they can define, build , test and Deploy.
See full question below
An Agile team has which two characteristics? (Choose two.)
A) A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value
B) A stand-along unit of individuals who do not require input fro other teams to complete their tasks
C) A large group of individuals who all work together to create value for the client
D) A group of dedicated individuals that work in phase-gate steps to complete their PI Objectives
E) A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value
Learn more from
https://brainly.com/question/24390635
Which feature in early networks made aggregating threat intelligence difficult?.
Considering the computing troubleshooting historical records, the feature in early networks that made aggregating threat intelligence difficult is "Point Solution."
What is a Point Solution?Point Solution is a term used in engineering and computing processes that involve the use of tools or machines to solve one issue or problem at a time within operations.
This situation leads to time-consuming and complicated means of solving multiple problems in operation.
Present Methods of solving aggregating threat intelligenceToday there are various means or formats for solving these problems which include the following:
STIX/TAXII, JSON, XML,PDF, CSVHence, in this case, it is concluded that the correct answer is "Point Solution."
Learn more about Point Solution here: https://brainly.com/question/17748237
where on a computer is the operating system generally stored?
The operating system on a computer is generally stored at hard disk.
Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.
An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.
The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.
Learn more about Interrupt here:
brainly.com/question/29770273
#SPJ6
In older languages, you could leave a selection or loop before it was complete by using a ____ statement
Answer:
D) go to
Explanation:
A) next
B) go next
C) loop
D) go to
D) go to is correct answer
(Hope this helps can I pls have brainlist (crown)☺️)
How to translate a word file with goole translator.
Answer:
Use the translation websiteClick "Browse your computer". A file selection dialog will pop up. Select the file. Select the translation languagePress 'translate'!Note: The document translation option will only show on medium and large screens
Can you make a phone app with angular?.
Answer:
yes
Explanation:
Write a program to output 3 lines of text with the following information:
Student's first and last name:
Class:
Born in:
Answer
Answer:
C LANG
#include <stdio.h>
// function main begins program execution
int main( void )
{
printf( "student's first name" );
} // end function main
PYTHON
student's name=''
born_date=''
class=''
print ('')
Explanation:
create an sql database rows and Columns then use sql commands to call any specific data if so :
(you have a complet database of students data)
SELECT born_date
FROM students
//(Call all students born_date )
//you can specify
********,*********
to create an sql table
CREATE TABLE students (
name char,
born_date int,
class int,
);
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Answer:
thunderbold proly
Explanation:
Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
Answer:
(a) page = 3; offset = 13
(b) page = 41; offset = 111
(c) page = 210; offset = 161
(d) page = 634; offset = 784
(e) page = 1953; offset = 129
The page numbers and offsets for the following address are:
page number 3, with an offset of 13.page number 41, with an offset of 47.page number 210, with an offset of 641.page number 634, with an offset of 496.page number 1953, with an offset of 49.To find the page numbers and offsets for the given address references, we need to perform some calculations based on the page size.
Assuming a 1-KB page size (1 KB = 1024 bytes), use the following formulas:
1. Page number = Address reference / Page size
2. Offset = Address reference % Page size
a. 3085:
Page number = 3085 / 1024 = 3
Offset = 3085 % 1024 = 13
Address 3085 is on page number 3, with an offset of 13.
b. 42095:
Page number = 42095 / 1024 = 41
Offset = 42095 % 1024 = 47
Address 42095 is on page number 41, with an offset of 47.
c. 215201:
Page number = 215201 / 1024 = 210
Offset = 215201 % 1024 = 641
Address 215201 is on page number 210, with an offset of 641.
d. 650000:
Page number = 650000 / 1024 = 634
Offset = 650000 % 1024 = 496
Address 650000 is on page number 634, with an offset of 496.
e. 2000001:
Page number = 2000001 / 1024 = 1953
Offset = 2000001 % 1024 = 49
Address 2000001 is on page number 1953, with an offset of 49.
Learn more about offset here:
https://brainly.com/question/32088531
#SPJ3
with the ________ delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.
Cloud Computing is simply known to be a type of computing. Software-as-a-Service (SaaS) delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.
Software-as-a-Service (SaaS) is simply define as a type of cloud computing vendors that gives software that is particular to their customers' needs.It is the most used service model as it gives a broad range of software applications. It also gives web-based services to its user.
Learn more from
https://brainly.com/question/14290655
a ________ uses electronic memory and has no motors or moving parts.
Answer:
a to uses electronic memory and has no motors or moving parts.
Explanation:
brainliest me and follow ty
If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect three function call direct continuous
If, in a recursive solution, function A calls function B which calls function C, this is called Indirect recursion.
A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.
Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.
Learn more about recursion here:
https://brainly.com/question/3169485?referrer=searchResults
What does angularfirestoremodule. Enablepersistence() do.
What is the question
there is nothing clear stated here
Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built
Answer:
Iterative
Explanation:
is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.
unlike tv or newspaper ads, internet communications are interactive, and consumers can choose which messages and information they receive. for this reason, company web offerings can be tailor-made for the ________.
Companies often engage the services of Advertising firms to market their products. Company web offerings can be tailor-made for the consumers.
Advertising agencies are firms that makes, plan and handle the advertising needs of any business. They are known for handling negotiations creating tailored marketing campaigns.A lot of agencies do not want to talk about pricing until they know what you can afford to spend.
Tailored content are delivered experiences that speak directly to customers.
This agencies uses their connections and resources to make one's campaign successful and cost-efficient.
Learn more from
https://brainly.com/question/23477855
___1. What is the first thing you should do if you received a package?
a. count the number of items c. accept it immediately then leave
b. check out the whole package d. check for the delivery receipt
________2. What should you do with the copy of your request for inspection?
a. return to the delivery man c. dispose it immediately
b. keep the copy of your request letter d. do not accept the letter
________3. What form is used to request for tools and equipment to be used for a
particular job written instruction to perform a work?
a. job order / order forms c. inventory of Materials forms
b. borrower’s forms d. purchase requisition
All variables are----------------------------------------------- help please
Answer:
variables are any characteristics that can take on different values, such as height, age, species I think
Answer
A variable basically works as a "placeholder" for anything that might change a majority of the time.
Examples
In science one may call a factor in a experiment that is subject to change a variable.
In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.
In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.
In a complex formula, how does excel determine which calculation to perform first?.
In a complex formula, the way excel determines which calculation to perform first is that; It follows the order of operations.
When carrying out calculations in excel, if we don't bracket certain operations, excel will use the order of operation called BODMAS to determine which operation to carry out first.
For example, if excel wants to solve 3 × 4 + 7 - 2;
The acronyms in BODMAS stand for;
B - Brackets
O - Orders (powers/indices or roots)
D - Division
M - Multiplication
A - Addition
S - Subtraction
Now, it means that the first action it will perform is Bracket while the last will be subtraction.
In our example, excel will first use the multiplication sign to get;
(3 * 4) = 12
Then addition; 12 + 7 = 19
Then subtraction; 19 - 2 = 17
Read more on BODMAS at; https://brainly.com/question/16788360
A(n) _____is a small application that cannot run on its own but can be used with other software products.
Answer:
emulador
Explanation:
it need apps to run
A shared feature is a small application that cannot run on its own but can be used with other software products.
What is software?A device's running programs, scripts, and applications are collectively referred to as "software" in this context. It can be compared to the variable component of a computer, whereas the invariable component is the hardware.
Application software and system software are the two main subcategories of software. System software and application software are the two categories of software. System software is employed to direct operations as well as a computer's internal processes and hardware components.
Therefore, a little program known as a shared feature can be utilized with other software items but cannot be used independently.
To learn more about software, refer to the link:
https://brainly.com/question/1022352
#SPJ5
Choose the response that best completes the following statement.
"If you're not sure if you should be on a site or signing up for a profile, ________."
ask permission
consider the outcome
don't say it online
use the 5-second pause
Answer:
probably the 5 second pause
Six months ago, you purchased a new laptop. Since then, you notice that the battery life has been steadily going down. When it was new, and full charge lasted about three hours. Now your lucky to get two hours before the battery charge level drops the 5%. What should be your first step to correct the problem?a. Calibrate the batteryb. Replace the power meter chip on the batteryc. Clean the contacts on the batteryd. Buy a new battery
Answer:
A. Calibrate the battery
Explanation:
It is unlikely that the battery has deteriorated significantly in the timespan of six months. The laptop is likely being shut down due to inaccurate battery levels to protect the laptop. Battery calibration will ensure accurate battery information is reported.
________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup
Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.
Definition of Structured Programming Technique.This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.
Configurations of Structured Programming Technique.Structured Programming Techniques generally takes three structures body which include the following:
IF THEN ELSE DO WHILESequenceHence, in this case, it is concluded that the correct answer is option B. "Structured."
Learn more about programming techniques here: https://brainly.com/question/17180300
Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system.
Answer: Open-source CRM
The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done.
The first part of a data packet that comprises the source and destination addresses of a network is called a: header.
In Computer networking, the transmission control protocol/Internet protocol (TCP/IP) model refers to a standard networking protocol that allows network devices and host computers to interconnect and communicate with one another over a network, especially through the transmission of data packets and an Internet protocol (IP) address.
Generally, an IP address is typically designed and developed to hold information about data packets. Thus, a header is the information at the beginning of a data packet that comprises the source and destination addresses of a network.
In conclusion, a header is the first part of a data packet that comprises the source and destination addresses of a network.
Read more on header here: https://brainly.com/question/20629962
Independence Day celebration in school paragraph
Answer:
We celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform
Explanation:
please Mark my answer in brainlist
Vhat is the result when you run the following program?
rint(2 + 7)
rint("3+ 1")
4
O an error statement
2+7
o
4
0
9
3 + 1
Answer:
4
Explanation:
You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need
Answer:
You will use a secure connection
Explanation:
You need VPN so that your IP cant be tracked which will help hackers to find you
A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.
What is Secured connection?A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.
A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.
VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.
Learn more about Secured connection here:
https://brainly.com/question/25556545
#SPJ2
Modems communicate data by using which method?.
Considering the modem technology, Modems communicate data by using Radio frequency method.
What is Radio frequency method?The radio frequency method in modem communication allows modems to communicate or transfer data through wireless over a distance of tens of kilometers.
The essence of Radio frequency in modemsWith radio frequency, modems can easily communicate without telecommunication or satellite network operators. It usually performs at 300 MHz to 900 MHz range.
Hence, in this case, it is concluded that the correct answer is the Radio frequency method.
Learn more about modem technology here: https://brainly.com/question/9617717
it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT
Ansgokublue
Explanation: