Answer:
c
Explanation:
the planning stages is one of the first stages of a project. this means that you would be determining parts of the project not revising or recounting. You also reflect on projects after they are completed
Answer:
prevent set-backs
Explanation:
some others can be project initiation, project planning, project execution, project monitoring and control, and project closure. Hope it helps you! If it does it would be appreciated to be marked brainliest
Formula for adding values of cells A9 to A15 is
Please answer fast
Answer:
This is my opinion. ^_^
You need to sum a column or row of numbers, let Excel do the math for you. Select a cell next to the numbers you want to sum, click AutoSum on the Home tab, press Enter, and you're done. When you click AutoSum, Excel automatically enters a formula (that uses the SUM function) to sum the numbers.
The formula to add the values of the cell A9 to A15 is =SUM(A9:A15)
What is a cell in excel?Cells are the boxes that appear in the grid of an Excel worksheet such as this one. On a worksheet, each cell is identified by its reference, the column letter and row number that intersect at the cell's location.
This cell is in column D and row 5, so it is designated as cell D5. In a cell reference, the column always comes first.
The formula combines values from 9 to 15 columns or rows.
The Sum keyword is used to add any number of values together and calculate their total.
The ":" symbol indicates the range that must be added together. Another method of adding is to simply select the values to be added and then select auto sum- then sum.
Thus, =SUM(A9:A15) is the formula for adding values of cells A9 to A15.
For more details regarding excel, visit:
https://brainly.com/question/3441128
#SPJ6
Which one of these is not an area of AI? Computer vision/image, recognition Voice recognition, Robotics, Web design
Answer:
Computer vision/image
SOMEONE PLEASE HELP ME PLEASE!!!!!!!!
Answer:
Brainstorm and begin sketching new oven designs
SOMEONE PLEASE HELP ME FAST PLEASE!!!
Answer:
I think it the first one
Explanation:
Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against fiber optic cable. What is your solution for this problem?
Answer:
10G Ethernet
Explanation:
These are the options for the question;
A) 10BASE Ethernet
B) Gigabit Ethernet
C) Fast Ethernet
D) 10G Ethernet
From the question, we are informed about instance of my company deciding to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against fiber optic cable. In this case my solution for this problem is getting
10G Ethernet. Ethernet can be regarded as traditional technology that connects devices in LAN(wired local area network) as well as WAN(wide area network) which allows them to have communication with each other through a protocol, this protocol is reffered to as common network language, it also be regarded as rules. 10 Gigabit Ethernet which is a technology ofgroup of computer networking that enables transmission of Ethernet frames at high rate of 10 gigabits per second. Therefore, 10G Ethernet is the solution since we need
the fastest possible speed.
The following image is the basic syntax for a python function definition
def fuctionname( arguments ) :
statement1
statement2
statement3
A. True
b.False
LMK ASAP PLEASE
Answer:
A. True
Explanation:
You didn't post the image, but if the statements on your image are indented, the answer to this problem is A.
Answer:
This is true, the python language follows these syntax orders.
What is Identity Theft?
A criminal accessing your personal info to pretend to be you.
Someone stealing your drivers license.
Leaking personal information online.
Stealing your username for log on.
rebecca smith was the top scorer in a women’s professional basketball league
Answer:
awesome
Explanation:
HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
Which of the following is an example of a Boolean Operator?
A. HTML
B. SEO
C.
D. BUT
c is
TITLE
Answer:
HTML?
Explanation:
That looks like the best answer, correct me if I'm wrong ^^U
what is the size of 4th generation of computer and what language does they use?
Answer:
Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth-generation language (4GL), Fourth-generation computer programming language
(brainliest please)
Explanation:
The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this generation, time sharing, real time networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.
Fourth Generation
The main features of fourth generation are −
VLSI technology used
Very cheap
Portable and reliable
Use of PCs
Very small size
Pipeline processing
No AC required
Concept of internet was introduced
Great developments in the fields of networks
Computers became easily available
Some computers of this generation were −
DEC 10
STAR 1000
PDP 11
CRAY-1(Super Computer)
CRAY-X-MP(Super Computer)
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this
Answer:
Phishing
Explanation:
A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.
In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.
Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly complex and has many independent components (e.g., creating mail merge documents is very different from formatting a letterhead), she should:
Answer:
teach the assistant bits and pieces of the program.
Explanation:
Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."
This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.
Who finds the exact web server that hosted the website by looking in a huge database of internet addresses
Answer:
The ISP - Internet service provider
Explanation:
The internet service provider ISP finds the exact web server that hosted the website by looking in a huge database of internet addresses.
An internet service provider (ISP) is a company that provides internet connection and services to individuals and organizations.
how are you going to preserve cultural heritage you social practices even when using ICT ?
Answer:
Cultural heritage is central to protecting our sense of who we are.
It gives us an irrefutable connection to the past – to certain social values, beliefs, customs and traditions, that allows us to identify ourselves with others and deepen our sense of unity, belonging and national pride.
Answer:
In Slovenia, an interactive geographic information system shows information about important natural areas. Since 2008, the system is available online also via an interactive map. The Slovenian Register is one of the most comprehensive and advanced tools in the EU, and can serve as an inspiration for other countries and regions aiming to improve digitisation of natural and cultural heritage.
Source: CD-ETA E-bulletin
Cheers! :)
The material (text, pictures) to be put into a document is called________________
Please help me
ME ARMY HALPPP!
Answer:
Inline (my guess)
Hope this may help u
Write a program that takes a single integer input from the user and stores it in a variable. Your program should increase the value of this variable by one three times, printing "number is now " followed by its value each time, then decrease it by one three times, again printing "number is now " and the value each time
Answer:
Question is answered using python:
num = int(input("User Input: "))
for i in range(3):
num = num+1
print("Number is now "+str(num))
for i in range(3):
num = num-1
print("Number is now "+str(num))
Explanation:
This line prompts user for input
num = int(input("User Input: "))
The following iterates from 1 to 3
for i in range(3):
This increments user input each time
num = num+1
This prints the value of num after increment
print("Number is now "+str(num))
The following iterates from 1 to 3
for i in range(3):
This decrements the value of num
num = num-1
This prints the value of num after decrement
print("Number is now "+str(num))
The internet and intranet have many different uses.
Explain what is meant by the intranet.
Answer:
Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.
Answer:
internet-The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
Intranet- A system of computers inside an organization that makes it possible for people who work there to look at the same information and to send information to each other.
Primary functions of lighting are sufficient light to...
make things sound good
power the cameras
feed the crew
create 3 dimensional on 2 dimensional tv screens
Answer:
I would say, a guide to use for studying.
Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHING!!!HELP PLZ!!
Explanation:
You may try opening the Brainly website using your browser's incognito mode. In other words,
Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.
However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.
in Kakegurui at the end of the what happens
Answer:
ok
Explanation:
မင်းငါ့ကိုငိုနေတာကိုမလိုချင်တဲ့လူငယ်များရဲ့ဆူနာမီကိုမကြည့်ချင်ဘူး
Answer:
me tiamo kisses me ddeee
Explanation:
Fill in the blank: PMML, PFA, and ONNX are __________________. 1 point Open standards for predictive model serialization, exchange, and deployment. Codes for getting rid of undesired data or models. Robots that are plotting to take over the planet. Passwords for some super-secret system. Abbreviations for machine learning algorithm names.
Answer:
Option A: Open standards for predictive model serialization, exchange, and deployment.
Explanation:
PMML which is also known as Predictive model markup language, is basically an open interchange format for predictive models.
ONNX which is also known as the Open Neural Network Exchange Format is simply an open format that is used to support the storing and porting of predictive models spanning across libraries and languages.
PFA which is also known as Portable format for Analytics is used to provide a platform for analytic applications to explain and exchange predictive models that are produced by analytics and also machine learning algorithms.
From the definitions of PMML, PFA, and ONNX above, we can see that they are all used for predictive model arrangement and exchange.
Thus, the correct answer is option A.
Which of the following statements is true?
O Secondary storage stores data for short periods of time.
O A hard drive is an example of secondary storage.
O The CPU holds instructional data for programs.
Audio data is saved to a computer's CPU.
The statement true for the secondary storage device, is that hard drives are the example of secondary storage. Thus, option B is correct.
What is a secondary storage?A secondary storage in the computer system is given as the non-volatile form of the storage media that has the ability to form the storage without being connected to power.
The secondary storage can be of solid state, optical and magnetic storage devices. Hard drive is the example of magnetic secondary storage devices. Thus, option B is correct.
Learn more about secondary storage, here:
https://brainly.com/question/86807
#SPJ2
What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)
Answer:
There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.
n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.
Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.
Explanation:
what is low level language
Answer:
The language which is spoken by low aged people is called as low level language
Answer:
A low level language is a language with few layers between itself and actual machine code.
Assembly is an example of a very low level language, where you're giving direct instructions to the processor. C is often called a fairly low level language as it gets compiled very directly into machine code.
By contrast, high level languages have many more layers between themselves and the processor. Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system. Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.
Josh is searching for information online about the conservation status of blue jays. He enters the phrase blue jays and most of the results are about the baseball team. What can he do to get the specific results he wants?
Answer: specify the bluejay bird
Explanation:
by specifically mentioning it is birds he wants that Is the results he will get
If Josh wants to get the specific information in the context of the conservation status of blue jays, then in that case can add birds in the search bar along with the name of blue jays.
What are blue jays?Eastern North America is home to the beautiful blue jay, a bird of prey that belongs to the Corvidae family. It inhabits the majority of eastern and central America; some eastern populations might be migratory.
Breeding populations can be found all over southern Canada; resident populations can also be found in Newfoundland, Canada. Blue Jays are renowned for their brilliance, intricate social structures, and strong familial ties.
It is believed that their love of acorns contributed to the proliferation of oak trees following the last glacial period.
Learn more about blue jays from here:
https://brainly.com/question/3034695
#SPJ2
Ziad tells his son Marc: " This year my age is triple yours, but in 10 years, it will be the double". Find their ages.
Answer:
Ziad age would be like 30
Explanation:
10x3=30
Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?
O References
O Referential Integrity
O Autocorrect
O Data Source Binding
Answer:
B
Explanation:
edge :p
true false.
(c) In Animate, only one layer
can be activated at a time. ( )
PLZ HELP ME IN MY STUDY
Answer: true
Explanation:
Which of the following best describes the purpose of an IP address?
Answer: C
Explanation:
Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.
Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.
which member of the Jackson family was the spokesperson for the Psychic Friends Network.
Answer:
La Toya Jackson
Explanation: