2. Always look out for animals, especially at
A. intersections
B. railroad crossings
C. night, dusk, and dawn
D. 2:00 p.m.

Answers

Answer 1
The answer to this question is b, railroad crossings.
Answer 2

Answer:

At night, dusk and dawn is the most probably time to look out for animals

Explanation:

Intersections: at road intersections you should be looking out for vehicles or humans crossing to avoid collisions

railroads: you should be looking out for oncoming trains to avoid collisions as well

Night, dusk and dawn:  a lot happen at this times because visibility is extremely poor at this times and animals tend to move around by this times unnoticed so you should be more careful at this times and lookout for both human and animals

2:00 pm : this is in the thick of the day and you don't have to lookout for animals by this time  


Related Questions

Ask the user to input an integer. Print out the next three consecutive numbers. in python

Answers

Answer:

Explanation:

n = int(input("Enter Number : "))

print(n+1,n+2,n+3)

Answer:

In python, the code would be written as...

Explanation:

n = int(input("Enter Number : "))

print(n+1,n+2,n+3)

You are printing both the number and the next three consecutive numbers after that. which essentially your answer "n" plus the numbers that create the next number "n+1" = your answer plus 1, "n+2" = your answer plus 2, etc.

The stakeholders in a project who make the final decisions and provide the financing for the project are usually ____.

Answers

Answer:

Sponsor

Explanation:

The Sponsor or the financier is an executive within the organization, and he has the power to assign any required resources as well as take the decision related to the project as well as come up with the financial resources required for the project completion.

A(n) is a small bit of text separated from the rest of the paragraph at the top of a column or page. widow or orphane

Answers

Answer:

orphane

Explanation:

It is not important to keep financial records since they can all be found online.
OA. True
OB. False
Reset
Ne

Answers

Answer:

False

Explanation:

Due to the fact that financial records can be erased. Also, I believe it is a law to keep financial records when doing business but I'm not too sure.

Which function returns the least value of a given set of numbers or range of cells?
OA ROUND
OB. COUNT
OC. NOW
OD. MIN​

Answers

MIN returns the least value of a given set of numbers or range of cells

D. MIN​

Explanation:

In MS-excel there are many inbuilt functions are available. Each function is used to either select cell or series  of cells or return the value to specific value.

ROUND :- These is inbuilt function which returns  round value for selected cell or selected range cell.

=Round(5.6) returns 6.

COUNT: - These are inbuilt function gives count of selected range of cell.

=COUNT (a1-A10)

NOW: - In excel it is inbuilt function it returns date and time of the system

MIN :- In Excel it is inbuilt function give minimum value for selected range of cell . (Least value from range cells)

What is the recommended procedure for disconnecting an external hard drive to avoid losing data?
Disconnect the hard drive’s power supply, then remove the drive.
Instruct the operating system to eject the drive before unplugging it.
Use the Power button to turn off the computer, then remove the drive.
Wait until the drive stops spinning, then remove the drive.

Answers

Answer:

Instruct the operating system to eject the drive before unplugging it.

Explanation:

Answer: Its B

Explanation:

Does anyone know the answers to the AR test on Gathering Blue by Lois Lowery?

Answers

yes i do....................................................

You receive an e-mail from your manager letting you know that you need to add a field to the database. What should you do?

A - Start creating all fields from the beginning.
B - Insert a column into your database table.
C - Create a new database and export the existing data to the new database.
D - Link a new database to your old database

Answers

I think that it is A

Answer:

insert a column into your database ( C )

Explanation:

A database is an organized collection of important data. it is generally stored in a computer and access can be granted to users who have the necessary need to access them.

for complex databases they are designed using specific/formal designs and modeling techniques to make them unique information in a database can be retrieved ,manipulated and updated as well and this is mostly carried out Database Administrator. a database management system is used to manage recent/modern databases.

A database is used by companies or organization to keep good records of their data.

Inserting a column is the best way to add a new field because a column contains as "row and a column" inside it

will mark branyist

What occurs when information is copied from an internet source to another computer?

Transferring

Uploading

Downloading

Pasting

Answers

Answer:

Pasting

Explanation:

because when you cope and right click it says paste

Word Online works exact same as the downloaded Office 2016 version.
True
False​

Answers

Answer:

The Answer is false. They work similarly but quite differently on a lot of offerings from them. Office 365 and office.com are online version, and Office 2016 is a desktop version.

Explanation:

I am not going very deep into this but the facts I am mentioning will clarify your doubts.

Office 2016 offers so many ways to share a file even though we work offline on it We can email the document, share on social media as well as store on One drive. However, Office 365, and especially Word online does not allow any other sharing options than sending an invitation or sharing a link.

For Word Online you will need internet all the time, though you can work from anywhere, and even on any device. Word 2016 does not require internet, but provide a lot of analytics features and even data mining facilities when it is connected to the internet.

Watch out for Word online 2019 version, and office 2019 desktop version. They are awesome and provides AI features, and a lot more than 2016 versions, both desktop and online.

Match each vocabulary word to its definition. 1. downloading choose not to do something 2. lead time person who sends out unwanted e-mail 3. opt out how long it takes to receive an item after it is requested 4. spammer standard layout used as the basis to create new, similar items 5. template copying a file from a remote computer to your computer 6. tutorial self-paced instruction

Answers

Answer:

1. downloading:

                          copying a file from a remote computer to your computer

2. lead time:

                         how long it takes to receive an item after it is requested

3. opt out:

                        choose not to do something

4. spammer:

                         person who sends out unwanted e-mail

5. template:

                      standard layout used as the basis to create new, similar items

6. tutorial:

                      self-paced instruction

Explanation:

Downloading is simple phenomenon in which a computer in a network copies the desired data from other computer that also must have internet connection.Lead time can be defined as a time period between the initialization and completion of any production.Opt out can be defined as an option for not participating (in any kind of activity).Spammer can be defined as a person who sends spam messages or e-mails. These messages can be for promotion of any product or for any other reason. Spam messages are always unwanted.Template can be defined as a basic structure for designing a document or draft. Its a building block or cell.Tutorial is an introductory video made for giving instructions for any technical issue. It is used for training purpose as well as learning.

i hope it will help you!

What is the full form of SSO?
sole sign on
similar sign on
single sign on
special sign on

Answers

I’m pretty sure the second one.

Answer:

Single sign-on

creating a newsletter


Answers

This isn’t helpful considering no one knows what type of news letter you want

katherine has work experience of seven years as a graphic designer and photographer. she wants to now redirect her career to web technology. what kind of job is suitable for her, keeping in mind the kind of work experience she has? katherine can consider a job as a(n) _____

Answers

Web designer. She should start by learning HTML, CSS, and Javascript for frontend development.

Answer:

web developer

Explanation:

How long before a speech should you begin practicing?
a. 3 days
C. 1 week
b 5 days
d. 3 weeks

Answers

Answer:i think its c

Explanation:

The time before a speech should begin practicing is 1 week. The correct option is c.

What is practice?

Practice is the act of repeatedly practicing something to become better at it. The definition of practice includes performing in order to get better, carrying out, or engaging in a specific vocation.

So, after being called to the bar, you might practice law or piano scales. As a general rule, if you could end it in -ed or -ing or put to before it, it would be the verb.

A standard or set of recommendations recognized to result in positive results when followed are referred to as best practices. The best practices related to the execution or configuration of a task. Strict best practice standards may be established by a governing body or internal to a company.

Therefore, the correct option is C. 1 week.

To learn more about practice, refer to the link:

https://brainly.com/question/24313388

#SPJ6

What is 3NF in database design?

Answers

Answer:

The 3NF form is a "eliminate columns not dependent on the key" in the database design.

Explanation:

3NF form stands for third normal form says that it is necessary to remove all column that references to all related information that is not based on the primary key.

It is difficult to store data into one table to remove this problem we use the normalization, there are many forms in the normalization that are "1NF, 2NF, 3NF, and BCNF". The main purpose to use 3NF (normal form) in the database is to remove the data duplication.

David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted in the text. David should create a _____.

a.data entry form
b.graph
c.report
d.form letter

Answers

David should create a form letter

PASSAGE: The picnic had been scheduled for weeks in advance. The Morris family was looking forward to some fun and relaxation with friends. Mother Nature, however, didn't feel like cooperating with the family's plans. Dark clouds loomed on the horizon the entire morning. The family met some friends at the entrance to the park. While the kids started playing a game of catch, the adults worried about the possibility of rain. The sky began to darken and rumble as if a storm was about to break. Then, just as suddenly, the clouds parted and the sun shone through. Happy with this turn of events, the adults began setting up the picnic table and chairs.

Which event creates tension in the story?
A) Everyone arrived for the picnic.
B) The sky began to darken and rumble.
C) The sun shines through the clouds.
D) The kids start playing catch.

Answers

Answer:

B) The sky began to darken and rumble.

Explanation:

B) The sky began to darken and rumble.

It seems they have arranged it big. Hence, the money is not a problem. Any number of people can be invited,

The problem was certainly that the rain was about to come as sky turned dark and rumble. And hence, this answer as its what created tension.

Answer:

B) The sky began to darken and rumble.

Explanation:

The climax of the story (which creates the greatest moment of tension) is when The sky began to darken and rumble as if a storm was about to break. This suggests that something bad is about to happen.

Select the correct answer.
Which information is considered free for use?
O A. information involving mature adults
OB. information acquired by companies
O c. information shared on social networking websites
OD. information that is personal and sensitive
Reset
Next

Answers

Answer:

A

Explanation:

This Information involves informing the young youth about adult and mature life

Answer:

The Answer is C.

Explanation:

How to calculate checksum in information and technology

Answers

Answer:

It can be done using the software like MD5 & SHA Checksum Utility and Online Checksum calculator.

Explanation:

Suppose you are downloading the ISO file the checksum will be listed. And as you download your file, you will need the checksum calculator for verifying the integrity of the file.

Around 99.9% of the cases, you are not required to care for the checksum while you download the files from the Internet. Though, if you download something sensitive such as antivirus or the complicated software such as Tor, the good habit is to verify once the checksum since the hackers can inject the malware-infested versions of that critical software for gaining complete access to your system.

Many utilities are available for calculating the checksum, but only one or two are the best ones like MD5 & SHA Checksum Utility and Online Checksum calculator.

Install the first one on your computer.

This one is quite simple and very easy for using, you just need to click on the browse button for choosing your file, and automatically the hashes will be calculated for the MD5, SHA-512, SHA-1, and SHA-256.  THE MD5 is the shortest and the SHA-512 is most in length. And the lengthier the hash, the more secure it happens to be.

For the verification of the hash, you simply need to copy and then paste it over at the hash box, which is located at the bottom. Now click on the verify and it will then compare it with the generated hashes (4 in number) to check if there is a match. If it matches you are safe.

You can also use the Online checksum calculator if you want.

We can calculate the checksum on our own as well:

We want to send 32 bit message, and hence we devide it into m parts of k bits each such that mk= total size of data sent in bit, or whatever unit used.  

10101010101010101010101010101111

Divide above in four parts:

10101010

10101010

10101010

10101111

Now add first 2 and if 1 is carry over, add it to the resultant. Go on doing this till you get the final sum. And then take 1s complement

10101010

10101010

----------

01010100

      1

---------

01010101

10101010

------------

11111111

10101111

-----------

10101110

      1

----------

10101111  take 1s complement

01010000 (checksum)

Send four original parts and checksum to receiver

At receiver end:

all four parts are added, which will be same as previous, when we added them. Now add this to checksum, and take 1st complement, ad if everything is 0. It means our data ia original, and we need not worry.

10101111

01010000

-----------

11111111 take 1s complement

00000000

All are 0 hence the file is not corrupt and the original one sent.

What does the Snap to grid setting do?
A. Makes objects line up with the grid lines exactly
B. Makes the grid show up while players are playing the game
C. Adds an object to a game that keeps track of players' high scores
D. Locks backdrop objects so you don't accidentally change them

Answers

Answer:

A. Makes objects line up with the grid lines exactly. In short, it is a backstage of the objects that need to be shown on the screen. And the object is being picked from there in the required manner. We cannot ensure a backstage without an invisible grid, and this is the snap to the grid, as being explained above, It has a huge application, and is very important in its domain,

Explanation:

Snap which is intended for the grid(Snap to grid) is a function code that manages the images and files without any human intervention. It makes use of an invisible grid to put in line various items on to the computer screen, alongside the vertical and horizontal lines.

Answer:

Snap to grid is a computer function used to organize files or images automatically. It uses an invisible grid to line up the items on the screen along perfect horizontal and vertical lines

Explanation: In Shorter terms it would be, A)

Select the correct answer.
In which phase does the development team check the project for error handling capabilities?

A , design
B, testing and delivery
C, development
D, maintenance

Answers

Answer:

B

Explanation:

engineers design and carry out test cases and evaluate exit criteria (by following the scope set in the planning phase). They create bug reports describing detected defects and report to the stakeholders on the test findings and the completion status. Testing may be repeated to check for errors.

what type of computer needs a systemthat will take up little space​

Answers

MAC is a computer that needs a system that takes up a little space.

Explanation:

MAC is short for Macintosh Operating System. MAC is developed and owned by Apple Inc.

The MAC operating system is a graphical user interface and supports high-performance graphics. Generally, the MAC is used for designing purposes because of the high multimedia management capabilities.

MAC comes in handy while working on projects that deal with graphics building, and management plus people also make use of MAC in blogging.

Which components exist in the contextual tab for tables called Design? Check all that apply.​

Answers

Final answer:

The 'Design' contextual tab for tables includes components for applying 'Table Styles', enabling 'Table Style Options', and customizing 'Shading and Borders' to enhance the visual aspect of tables.

Explanation:

The contextual tab for tables called Design in Microsoft Office applications like Word and Excel includes multiple components aimed at enhancing and customizing the appearance of tables. Some key areas in this tab are:

Table Styles: Options to apply predefined styles to the table, which can include combinations of shading, bordering, and color schemes designed to make tables more visually appealing and readable.Table Style Options: Checkboxes that allow users to quickly toggle certain style features, such as header and total rows, banded rows or columns, and the display of first or last columns specially formatted.Shading and Borders: Features to customize the background color behind cells (shading) and the lines that define the edges of cells and boundaries of the table (borders).

These components help users to quickly and easily modify the design and format of tables inserted into their documents or worksheets.

Which statement identifies a limitation of models?

Models may be oversimplified.
Models describe scientific observations.
Models represent all aspects of an object.
Models are always accurate depictions of a system.

Answers

Answer:  Models may be oversimplified. The problem with the model is definitely this, that they are not fully self explanatory. You are certainly going to find that not all the information can be fetched from them. And hence for the complete information one needs to wait for the project to take its real shape. And only then we can find out the complete details of the project. Hence, the above answer.

Explanation:  Various natural phenomenon can be missing from the model due to oversimplification. And hence most complex aspects of the system remains hidden, till the model is transformed into a real project.

The scientific observations are always described the best way, and the model is certainly up with all the aspects of ab object. Also, they are highly accurate. Hence, the above answer.

Models may be oversimplified, this statement identifies a limitation of models. The correct option is a.

Models have the potential to be oversimplified, failing to adequately represent the complexity of systems in the actual world. While models are useful for understanding and forecasting phenomena, in order to manage them, they frequently involve simplifications and assumptions.

This can result in inaccurate or faulty depictions of the real system. Although models' level of depth may not include every feature of an object or process, their goal is to characterise scientific data and anticipate outcomes.

It is crucial to understand that models do not always represent reality perfectly or accurately, and their limits should be taken into account when evaluating their findings.

Thus, the correct option is a.

For more details regarding models, visit:

https://brainly.com/question/33240027

#SPJ3

Your question seems incomplete, the probable complete question is:

Which statement identifies a limitation of models?

a. Models may be oversimplified.

b. Models describe scientific observations.

c. Models represent all aspects of an object.

d. Models are always accurate depictions of a system.

Jargon is:
O
A. the text that goes into the presenter notes section of a slide
presentation.
O
B. language that includes terms that only a select few can
understand.
O
C. the main point of your slide presentation,
O
D. another way to describe good communication.

Answers

Answer: The answer would be "B" - language that includes terms that only a select few can understand

Explanation:

Jargon is language that includes terms that only a select few can understand. The correct option is B.

What is communication?

Communication is defined as the act of giving, receiving, and sharing information – in other words, talking, writing, listening, and reading.

Good communicators pay close attention, speak or write clearly, and respect opposing viewpoints.

Communication in our daily lives helps us build relationships by allowing us to share our experiences and needs, as well as connect with others.

It is the essence of life, allowing us to express our emotions, share information, and share our thoughts. We must all communicate.

Jargon is a specialized language used by a group or profession. It's a common form of shorthand among experts, and when used correctly, it can be a quick and efficient way of communicating.

Thus, the correct option is B.

For more details regarding Jargon, visit:

https://brainly.com/question/3702410

#SPJ5

1. What is the central idea of the section "Service Record." Use two text details to
support your answer.​

Answers

Answer:

Service record is the record that is used to track the record of service of the employ in an organization.

Explanation:

The idea behind the service record is to maintain the whole detail of record of the person during his employment including, personnel information,  record related to his promotions and posting, salary record etc.

define token. Give examples of 5 tokens in any programming language​

Answers

Tokens and its examples:

Token is data type and it is behavior or categorized types. Basically most of programing language will have all five tokens data types and they are.

Operators.ConstantsReserve wordsSeparatorsIdentifiers

Operators: - such as mathematic operations such as example: - “+”,”-“

Constants: - which used with CONST in vb.net or #define in c programming language, such as example: - 400,200.

Reserved words:- if , then are all used for if condition where if and then are reserved used in programming language for specific purpose.

Separators: - it used with write a procedure or function, in c languages “()” or “()” in vb.net sub and end sub.

Identifiers: - end user to define variable with data type class and store the value in the programming languages, such as amt = 0, rate=10.5.

When the track changes icon is active, the icon will appear ___ .

Answers

Answer:

The answer to the given question is "yellow in color".

Explanation:

In the given question the answer is "yellow in color" and the description of the Task changes icon can be given as:

Task changes icon is a part of the Microsoft word. This icon is on the Review tab.  Task changes are an editing command that is used for creating an authorized document and it also provides a facility to make changes to the document.

when we move our mouse on this icon it will appear in yellow. That's why the answer to this question is "yellow in color".

Answer:

Yellow when active grey when inactive.

Explanation: If I'm correct your four options are

grey in color

highlighted light green

yellow in color

in bold

So When Track Changes is turned on, the icon will turn yellow. It will return to gray when the feature is turned off.

Arrange the stages of a digital forensics investigation in sequence.

collection
presentation
readiness
analysis
review

Answers

Answer:

Collection

Analysis

Readiness

Presentation.

Explanation:

Collection: The action or process of collecting someone or something.

"The collection of data."

Analysis:  This is the detailed examination of the elements or structure of something.

Readiness: It is a state of being fully prepared for something.

Presentation: This is the giving of something to someone, especially as part of a formal ceremony.

The arrangement of stages of a digital forensics investigation in sequence are:

CollectionAnalysisReadinessPresentation

What is the forensic investigation?

In a forensic investigation, all tangible evidence related to a crime is gathered and examined in order to draw conclusions about a suspect.

The act or practice of gathering someone or something. "The gathering of information."

Analysis: This is the close investigation of a thing's constituent parts or structural makeup.

The state of being totally ready for anything is called readiness. Giving something to someone, particularly as part of a formal ceremony, is known as a presentation.

Therefore, the stages of a digital forensics investigation in sequence are:

CollectionAnalysisReadinessPresentation

To learn more about the forensic investigation, refer to the link:

https://brainly.com/question/13073221

#SPJ2

Other Questions
An airplane 30,000 feet above the ground begins descending at the rate of 2000 feet per minute. Assume the plane continues at the same rate of descent. Write an equation to represent the height of the airplane in feet above the ground f(x) in relationship to time in minutes x An electromagnetic wave is propagating in the positive x direction. At a given moment in time, the magnetic field at the origin points in the positive y direction. In what direction does the electric field at the origin point at that same moment?a. Positive xb. Negative xc. Positive yd. Negative ye. Positive zf. Negative z Under which of these market classifications does each of the following most accurately fit? i. A supermarket in your hometown. ii. The steel industry. iii. A Kansas wheat farm. iv. The commercial bank in which you or your family has an account. v. The automobile industry. How would the photographer use the polarizing filter to find out the direction of polarization of the light coming from the blue sky? Her only reference is the polarization axis of the filter. Imagine that you are an entrepreneur, making designer t-shirts in your garage. Your total cost (in dollars) is given by the equation TC = 300 + 10Q, where Q represents the number of t-shirts you make. Your fixed cost is $______, and your marginal cost is $______. Desmosomes connects keratinocytes to each other. Why is this important? What is the value of x?6x - 33x + 6Enter your answer in the box.5x An upscale organic foods grocery store chain is implementing an information system that will enable it to add same-day home delivery of groceries to its customers. This is an example of:Question 2 options:A) business process redesign.B) rationalization of procedures.C) organizational change.D) paradigm shift.E) automation. An ice cream factory makes 350 quarts of ice cream in 2 hours. How many quarts could be made in 36 hours? What was that rate per day? In humans, MITOSIS directly accomplishes all of the following EXCEPT A. growth B. production of 4 haploid gametes from a single diploid parent cell C. repair of damaged tissues D. development of organs E. production of 2 diploid daughter cells from a single diploid parent cell Barbie and Ken have been best friends for decades. They have a routine where they sit on a front porch to "talk." However, after they talk about the weather, they tend to not say much of anything. What stage does this relationship appear to be in? how would i distribute 2.5(-y+2) The ages of five friends are 20,31,28,31 and 25. How many of the friends are older than the average (arithmetic mean) age? What is one example of how interest groups often work to shape policythrough the courts?OA. Bribing lawyers to represent one side less effectivelyOB. Lobbying judges while a case is being heardOOC. Ensuring that decisions cannot be appealed to the Supreme CourtD. Paying legal fees for people who file lawsuits that align with thegroup's goals A rectangular garden measures 5m by 7m. Both dimensions are to be extended by the same amount so that the area of the garden is doubled. By how much should the dimensions increase You have responded to a report of an abrupt collapse of a middle-aged man at a local office building. Your BLS assessment shows the man is unresponsive, not breathing normally, and has no carotid pulse. This condition is most likely caused by and treated with: Bubba is a shrimp fisherman who can catch 4,000 pounds of shrimp per year. Bubba is considering hiring his cousin Bobby to work for him. Bobby can catch 3,000 pounds of shrimp per year. If Bubba hires Bobby, what will be the total output of his shrimp business? 24.3 ounces for $8.76 or 32.6 ounces for $16.95 I need to use the unit rate to answer this questions and I'm really bad at this. In advertising, a common tactic is to pose an attractive female model next to, or leaning against, or holding the product. These women usually say nothing, but are simply there as an attractive background for the product. This use of women in advertising is an example of: A. personal sexism. B. sexual harassment. C. gender stereotypes. D. matriarchy. In "the negro speaks of rivers" what does the poet imply about the durability or dignity of his people when he refers to the great age of rivers.