Which statement best explains how the main idea relates to taking notes?

The main idea is always included in effective notes.
The main idea is always easy to identify.
The main idea is rarely used as a title for notes.
The main idea is rarely identified by listening or reading

Answers

Answer 1

Answer:

The main idea is always included in effective notes.

Answer 2

Answer:

a

Explanation:

I did the quiz


Related Questions

Which device can perform both input and output functions?

Answers

Answer:

For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output devices. Devices for communication between computers, such as modems and network cards, typically perform both input and output operations.

Answer:

Modems and network cards, typically perform both input and output operations

Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g

Answers

The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.

We can arrive at this answer because:

Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.

In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.

More information:

https://brainly.com/question/7227504

Why do some computer systems not allow users to activate macros?
O Amacro can be used by only one person.
0 You must close all other programs to run a macro.
O The Word software does not work well with macros.
O Macros can carry viruses that can harm a computer.

Answers

Macros can carry viruses that can harm a computer.

Two categories of estimation mode

Answers

Answer:

The Standard Parametric Mode (SPM) and the Robust Parametric Mode (RPM) are two categories of estimation mode. These approaches turn the data distribution into an approximation normal distribution and then estimate the mode by using the probability density function of the estimated distribution as a guide.

Explanation:

Hope it helps:)

Should people who are able to break a hashing algorithm be allowed to post their findings on the Internet?

Answers

Answer:

Cyber security is a very important aspect of digital world. Without cyber security our sensitive data is at risk. Its very important that companies keep our system safe by spotting any security vunerabilities. SO ACORDING TO ME I DO NOT THINK THEY SHOULD BE ABLE TO POST THEIR FINDINGS ON THE INTERNET As it may contain viruses

Identify the false statement. a. When you use inheritance to create a class, you save time because you can copy and paste fields, properties, and methods that have already been created for the original class. b. When you use inheritance to create a class, you reduce the chance of errors because the original class's properties and methods have already been used and tested. c. When you use inheritance to create a class, you make it easier for anyone who has used the original class to understand the new class because such users can concentrate on the new features.

Answers

Uploading this answer for points please do not accept this answer thank you.

Which one of the following is small and portable?
• Server
• Notebook
• Mainframe
• Desktop

Answers

Answer:

server is small and portable

Fill in the blank with the correct response.

_____is considered a reliable source of free and trial software.

Answers

Shareware hope that helps

You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications. What are some sample questions you would ask the loan manager at a bank?​

Answers

As a knowledge engineer, it should be noted that some of the questions that should be asked include:

What do you expect in the loan application process?How is the loan going to be processed?What do you expect from the applicant to fund the loan?

A knowledge engineer simply means an engineer that's engaged in the science of building advanced logic into the computer systems.

Since the knowledge engineer has been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications, he should asks questions that will be vital for the loan process.

Learn more about engineers on:

https://brainly.com/question/4231170

A programmer will typically write a(n) _____ and pass it to the interpreter. Group of answer choices object method variable script

Answers

Answer:

Script

Explanation:

A set of code blocks which is written to solve a particular problem in a certain programming language and passed to the interpreter to run is called a script.

The script is program's body which is made up of codes written in accordance to the syntax of a certain programming language.

In other to execute the program written, it has to be passed to the interpreter, which run the script and produces an output.

Hence, the set of code written by a programmer is called the script.

Learn more :https://brainly.com/question/14364607

discuss with illustrations how to implement a simple home network ​

Answers

Answer:

How to Set Up a Home Network- Beginners Guide

Today almost every home and small office has a local network, and an Internet connection.

The home network or small area network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.

In this tutorial you will learn how you to build and setup a home or small area network and connect it to the Internet.

Explanation:

Choosing a Wired or Wireless Network

Do You Build a wired or Wireless Network? which is best?

Early (pre 2008) home networks were predominately wired networks.

Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages

Fast typically 100 Mbps to 10 Gbps

Secure and reliable.

Wired Network Dis-Advantages

Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.

Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.

Not so easy for visitors and mobile devices (laptops) to connect to.

Main Uses

It Is best used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).

What was the goal of the COMPETES Act of 2007?

Answers

Simply put, the goal was, "To invest in innovation through research and development, and to improve the competitiveness of the United States."

Answer:

Increasing federal investment in scientific research to improve U.S. economic competitiveness.

Explanation:

Hope this helps!

Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly. Each subset is assigned a cost of maintenance, which is directly proportional to the highest danger level of the road present in that subset. The engineer wants to select the smallest subset that keeps the towns connected directly or indirectly and that also has the lowest cost of maintenance. Develop an algorithm to find such a subset. Justify the correctness of your algorithm and derive its runtime.

Answers

Answer:

Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly.

How does a computer work?

Answers

Answer:

A computer is a Device that can run multiple applications at a time and access the internet where you can find online stores and more also used to make video calls and more.

A computer system works by combining input, storage space, processing, and output. ... It is known as Computer Memory that keeps the data into it. A computer uses a hard drive for storing files and documents. It uses two types of memory, i.e., internal memory and external memory.

the reasons why business processes are necessary in a company

Answers

What is a business process?

Before knowing why they are necessary, let me explain what a business process is to be clear so you can understand a little bit more before I get to the meat. When a group of people work together to accomplish a certain goal, the process is called a "business process." A participant is assigned a task at each step of a business process. To put it another way, it serves as the foundation for several related concepts such as business progress management and process automation

The importance of a business process.

In big firms, having a business process is a must, and the advantages of doing so are immediately apparent. Organizations are made up of processes, which allow them to streamline and maximize the utilization of resources at the same time.

Reasons to have a well-defined business processIdentify which tasks are the most important to your larger business goalsImprove efficiencyStreamline communicationSet approvals to ensure accountability and an optimum use of resourcesPrevent chaos from lurking and lingering in your daily operationsStandardize a set of procedures to complete tasks that really matter to your business and tie it togetherReduction of risks from BPM softwareElimination of redundanciesMinimized costsImproved collaborationImproved productivity so that means more moneyHigher efficiencyHigher compliance

Answer:

Key reasons to have well-defined business processes

Identify what tasks are important to your larger business goals. Improve efficiency. Streamline communication between people/functions/departments. Set approvals to ensure accountability and an optimum use of resources.

Write a program that lists all ways people can line up for a photo (all permutations of a list of strings). The program will read a list of one word names (until -1), and use a recursive method to create and output all possible orderings of those names separated by a comma, one ordering per line.

Answers

The solution is the recursive Python 3 function below:

########################################################

def allNamePermutations(listOfNames):

   # return all possible permutations of listOfNames

   if len(listOfNames) == 0 or len(listOfNames) == 1:

       # base case

       return [listOfNames]

   else:

       # recursive step

       result_list = [ ]

       remaining_items = [ ]

       for firstName in listOfNames:

           remaining_items = [otherName for otherName in listOfNames if

                                                                     (otherName != firstName)]

           result_list += concat(firstName,

                                              allNamePermutations(remaining_items))

       return result_list

#######################################################

How does the above function work?

As with all recursive functions, this one also has a base case, and a recursive step. The base case tests to make sure the function terminates. Then, it directly returns a fixed value. It does not make a recursive call.

In the case of this function, the base case checked listOfNames to see if it was empty or only had one name. If any of the conditions were satisfied, a new list containing listOfNames is returned.

The recursive step is where the function allNamePermutations() calls itself recursively. The recursive step handles the case where listOfNames has more than one item. This step first iterates over each name in listOfNames, and then does the following;

Gets a name in listOfNameGets a list of other names in listOfNamesCalls allNamePermutations() on the list of other names to get a list of permutation of the other names.

        (By first getting the list of other names before passing it into

         allNamePermutations(), we make sure the recursive step eventually

         terminates. This is because we are passing a smaller list each time

         we make the recursive call.)

Inserts the current name in front of each permutationAdds the results to the result list to be returned later

After the iteration, it returns the result list which will now contain all permutations of the names in the list.

The concat function is defined below

##################################################

def concat(name, listOfNameLists):

   # insert name in front of every list in listOfNameLists

   result_list = [ ]

   for nameList in listOfNameLists:

       nameList.insert(0, name)

       result_list.append(nameList)

   return result_list

#####################################################

If we run the sample test case below

####################################

name_list = ['Adam', 'Barbara', 'Celine']

allNamePermutations(name_list)

####################################

the following output is produced

[['Adam', 'Barbara', 'Celine'],

['Adam', 'Celine', 'Barbara'],

['Barbara', 'Adam', 'Celine'],

['Barbara', 'Celine', 'Adam'],

['Celine', 'Adam', 'Barbara'],

['Celine', 'Barbara', 'Adam']]

For another example of how to use recursion in Python, see the following example in the link below

https://brainly.com/question/17229221

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?

Answers

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

https://brainly.com/question/2780939

Viewing digital content

Answers

Digital Content Creation Platforms offer content subscription or pay-as-you-go services for organizations. ... By offering access to this media, Digital Content Creation platforms make it so that organizations can share media of social interest while still complying with copyright laws.

LIst types of computer process ?

Answers

Answer:

Transaction Processing.

Distributed Processing.

Real-time Processing.

Batch Processing.

Multiprocessing.

What is a storage device? Give one example of Primary magnetic storage, Primary optical storage and Portable storage.

Answers

Answer:

fácil solo ve a tu almacenamiento y aprende

Primary optical storage

True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.

Answers

Answer:

The answer is False.

Pre-Test: Players on EverQuest II encounter Pizza Hut stores and can even order a pizza in real life using an in-game command. This is an example of

Answers

EverQuest II case is an example of a transactional ad.

What is transactional ad?

A transactional advertisement is a method of completing a financial transaction through an advertisement, without the need for the user / buyer to travel to the store.

Why does the example classify as transactional ad?

The EverQuest II case is an example of transactional ad because they implemented a command for players to complete a transaction (the purchase of a pizza) through an in-game command without having to go to the pizza shop.

Learn more about videogames in: https://brainly.com/question/11274464

Name a type of malware designed to provide unauthorized, remote access to a user's computer​

Answers

Answer:

spyware

Explanation:

your welcome;)

Answer:

trojan horse

Explanation:

or just trojan

Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective



Quantitative



Mathematical



Qualitative

Answers

Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.

Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.

The collection of quantitative data offers the possibility of statistical analysis.

This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.

Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.

Learn more about quantitative data here: https://brainly.com/question/96076

g The reduced ISA consists of four instructions: What are those instructions and what does each instruction do

Answers

The ISA is run by some set of instructions. This instructions are;

1.  Arithmetic: This Instructions perform various Arithmetic functions

2. Logical:  This instruction often carryout Logical operations on one or more operands.

3. Data transfer: This handles the transfer of instructions from memory to the processor registers and then backward process again.

4. Flow control: These instructions helps in breaking the sequential flow of instructions and jumping to instructions at different locations.  

Instruction set is simply known to be a full combination /number of instructions that are understood by a CPU.

It is know as a machine code that is often written in binary, and shown by assembly language.

Learn more from

https://brainly.com/question/22740965

Discuss some of the reasons you feel that people have for either liking or disliking Excel

Answers

It depends on what you’re talking about liking or disliking like are you talking about food or people

Using WEKA software, answer the following questions based on the Phishing dataset provided.
a) Draw a simple confusion matrix (general one, not from WEKA) of the possible data scenarios for this
Phishing dataset. (0.5 Mark)
b) Draw a table that will outline the Accuracy, Precision, Recall, F-Measure, ROC Area of the following
Rules based algorithms; RIPPER (JRip), PART, and Decision Table (2 Marks)
c) Use Decision Trees algorithms (Random Forest, Random Tree) and Artificial Neural Network
(Multilayer Perceptrol) to compare with the results in part b) above. Do you have better prediction
accuracy with these in this dataset? (2 Marks)
d) What is your conclusion in these experiments pertaining to ML algorithms used? (0.5 Mark)

Answers

Answer:

This isn’t a difficult question, its a task

Explanation:

How exactly do I answer questions?

Answers

Answer:

If you mean this website, click the add answer button on the question

Explanation:

Where is RAM installed?

Answers

The CPU socket hope that helps

Answer: RAM is located in the central processing unit or CPU which is also called a processor. This is located inside the computer case on the motherboard.

Would appreciate brainly <3

Other Questions
Graph the system of equations. Then determine whether the system has no solution, one solution, or infinitely many solutions. If the system has one solution, name it.y=2x+1y=x-2one solution; (3, 5)infinitely manyno solutionone solution; (5, 3) PLEASE ANWSER THIS!!which is the best definition m of pitch? A: pitch is how high or low a sound isB: pitch is how loud a sound isC: pitch is how well a sound travels through a medium solve pls brainliest How do you translate "to be on a trip" or "out of town"?tre la campagnetre en voyagetre la plagetre au coucher du soleil help me please!!!!!!!!!!! President Donald Trump believes that large international organizations exist to push liberal viewpoints.Which of the following BEST explains how the author's perspective is different? *A. The author believes that large international organizations make countries less secure.B. The author believes that large international organizations are not important for solving global challenges.C. The author believes that large international organizations are important for dealing with big challenges.D. The author believes that large international organizations usually advocate for conservative viewpoints. HALPPPPP At the first step upon the cold surface, Buck's feet sank into a white mushy something very like mud. He sprang back with a snort. More of this white stuff was falling through the air. He shook himself, but more of it fell upon him. He sniffed it curiously, then licked some up on his tongue. It bit like fire, and the next instant was gone. This puzzled him. He tried it again, with the same result. The onlookers laughed uproariously.What does this excerpt reveal about the setting of the story?1It is a work site with dangerous equipment.2It is a tourist destination with unfamiliar sights.3It is a more heavily populated town than Buck has ever seen.3It is a colder climate than Buck has ever experienced.NO LINKS PLZZZ Notice that the bond strength for lithium bonded with any of the anions is larger than the bond strength of potassium bonded with any ofthe same anions. Propose a scientifically sound explanation for this.Select one:O a. Lithium comes before sodium or potassium alphabetically, so its bond will be stronger.O b. Sodium and potassium are essential for human metabolism, so they should not bond as strongly with anions.Oc. Lithium is the smallest cation, so bond length is shorter creating a tighter bond.Od Lithium is the only cation with a +1 charge.Check 25-5x=15-2x+10-3xWhat does x = and does it have one solution or infinite or no solution 10 points: The bookstore has 2 women's magazines and 8 other magazines. What percentage of the magazines at the bookstore are women's magazines? 10 points if solved, will give brainliest to the correct answer. Simplify the following expression.77.63 + 8.6 A. 78.49 B. 16.363 C. 163.63 D. 86.23 g What are the dimensions that will maximize the area of the window if you have 20 ft total for the perimeter of the window Thirty students were sent home for a week with a video game to play. Some were sent home with video game A, others with game B. The number of hours they spent playing the game is recorded below. Which game has a higher median number of hours, and how much higher is it than the median number of hours for the other game Brainliest if correct The video mentioned that there are two types of seismic waves that occur in the ground during an earthquake, primary (Pwaves) and secondary (s waves). What important differences are there between P waves and S waves? Solve the equation. Enter your answer in the box. V27 How did the Jacksonian Era improve the political lives of average Americans?Please help! I will give brainiest if it is not a link or random answer. Five stars to all who try. Question is worth 20 points to get more help. Thank you! Use the slope formula and state what is the slope of a line with the following two points: (-2, 7) and (8, -9)? Matrix fractions 1/2+2/6. I don't understand the steps in this. There are many uses for permanent magnets and temporary magnets like an electromagnet. Electric appliances with electric motors use magnets to turn electricity into motion. Other examples include electric toothbrushes, fans, lawnmowers, and anything else containing a motor.Magnets are used to hold doors closed, such as in refrigerators, kitchen cabinets and others. Magnets are also used to read and write data on a computer's hard drive or on old-fashioned cassette tapes. There are more magnets in headphones and stereo speakers which help to turn stored music back into the sounds you can hear.In summary, magnetism is another property of some kinds of matter. There are two poles to a magnet, the south pole and the north pole. Like poles repel and unlike poles repel. There are two different kinds of magnets, temporary and permanent. A temporary magnet can be made by using electricity. All magnets contain an invisible electromagnetic field which surrounds the magnet. There are many uses for magnets, from holding doors closed to helping music sound better with the magnets inside of speakers.Based on the information provided above how would you describe a magnet?