2. Because technology is always changing, there are new applications being developed constantly. (1 point)

true

false



3. What does it mean if something is a public domain? (1 point)

It is a work or invention that is the result of creativity, including manuscripts or design.

It is available for use by the public.

It has expected standards of behavior.

It has a license allowing the public to use images without paying licensing fees.

Answers

Answer 1
true because we need new tech
Answer 2

Answer:

2. answer is true

3. answer is It is available for use by the public


Related Questions

how long does the Splunk search job remain active

Answers

When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.

Including AND in an IF statement means more than one condition can be included in the statement. exactly one condition can be included in the statement. the result may be both true and false at the same time. a new spreadsheet is generated using only data that meets the conditions in the statement

Answers

A. Just took the test.

Answer:

more than one condition can be included in the statement.

Explanation:

For example, if your mom tells you:

"You can only go out tonight if you do your homework and clean up your room"

The word and in the if condition is used to add another condition to the existant one, so the use of the word and in If statements is used to add more than one condition to the statement.

12. Which of the following is CourseBit®? (1 point)

an online class focused on drawing for architectural purposes

a leading Moodle™ development and hosting provider that focuses on highly customized systems

an icon in Blender® that allows you to easily switch between screens

a widget with which all animators should be familiar



13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around? (1 point)

non-blocking

non-overlapping

non-modal

non-confrontational

Answers

12. Which of the following is CourseBit®? 
a leading Moodle™ development and hosting provider that focuses on highly customized systems

13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around?
non-overlapping

Hope this helps.

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Answers

I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in the outside, I suspect that there are a thousand of different things inside of it.

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. Zebrafish have more than ten thousand (10,000) of cells that have the look of the sun's prominences. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

Answer these questions and label each answer with the correct number.

1. List the stages in the technology design process.
2. What are prototypes used to test?
3. Why do engineers redesign a product after testing a prototype?
4. To whom do engineers communicate the solution?

Thanks!

Answers

1) Goals, specifications, model, and then public opinion about the product
2) Prototypes are used to test whether the product works like it is is supposed to, and for the public to be convinced that they are not wasting money on a product that does not work
3) Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product
4) Engineers communicate with the company that hired them, or the government if applicable.

he technology design process, like scientific inquiry, does not always follow rigid steps. Often, engineers follow a common process: They identify a need, research the problem, design a solution, build and evaluate a prototype, troubleshoot and redesign, and communicate the solution.

A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. ... A prototype is generally used to evaluate a new design to enhance precision by system analysts and users.

Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product

Engineers find solutions to the problems faced by the society . Once the solution has been devised the engineers communicate it to the laborers and the workers so the implement it on field or on the work stations.

What type of device is characteristic of an enterprise environment?

Answers

A workstation used at an engineering firm.

An encrypted vpn link guarantees that the other end of the vpn connection is secure.
a. True
b. False

Answers

A-True
I hope this helps! :)

Answer:

The correct answer is letter "B": False.

Explanation:

Encrypted Virtual Private Networks (VPN) encode information so that only one computer with the correct decoder can read it so use it. The fact that one VPN is encoded does not imply that the VPN from where other user attempts to use it is encoded and secure. At least the encrypted VPN is safe but the other end is not unless encoded.

When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. what is the order of steps involved in this autoconfiguration process?

Answers

1) The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2)  Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
3) Knowing the link-local address is unique, it configures the interface to use
    that address
4) The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it 

You have a usb storage device that you cannot get working. you have enabled all appropriate usb options in the latest 2.2 kernel but still cannot get your device working. what is most likely the source of the problem?

Answers

the device might have a problem eg: a faulty usb port , or maybe you stick requires 3.0 usb ports

References placed at the bottom of a page are known as _____.

Answers

sources, I don't think this is a computer question.
The references placed at the bottom of a page are known as citations. They are usually used to show were you have got evidence.

When a switch is closed, completing an lr series circuit, the time needed for the current to reach one half its maximum value is _____ time constants?

Answers

The answer is 0.693 .  When a switch is closed, completing an LR series circuit, the time needed for the current to reach one half its maximum value is 0.693   

e^(-t/T) = 0.5 
-t/T = ln(0.5) = -0.693 

If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, what will be the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent?

Answers

The answer is : CLIENT will have 7 records  AGENT will have 4 records.  If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent is CLIENT will have 7 records  AGENT will have 4 records.       

Two major B2B models are ________. Select one: a. Auctions and social commerce b. Catalogs and vertical markets c. Sell-side marketplaces and e-sourcing d. Outsourcing and horizontal markets

Answers

the answer could be a i might be wrong
Answer:

The major two B2B models are c. e-sourcing and sell-side marketplaces.

Explanation:

B2B is a business to business model which means the exchange of goods or services which happens between corporations or organizations but not with customers. It is providing services or goods online to other company. Example, a cyber-security firm providing online service to an e-commerce company as part of risk mitigation plan to avoid credit card fraud.

The advantage of such model is sustainable and high-profit margin from repeated clients.

One disadvantage is this model will be having a smaller number of customers.

You can upgrade a cpu by adding registers and cache memory to it.
a. True
b. False

Answers

False, to upgrade a CPU, you need to replace the CPU with a better CPU.

____ data updates in your destination document if there are changes to the source data
A) integrated
B) embedded
C) linked
D) field

Answers

I think its D (Field) I'm not sure but seems better than others.

How do you calculate the total voltage in a series circuit with more than one component?

Answers

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source.

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source. You can find total resistance in a Parallel circuit with the following formula: 1/Rt = 1/R1 + 1/R2 + 1/R3 +...

Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and characters until a match occurs is known as ________.

Answers

The answer is Brute forcing.

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Answers

The answer is DMNNAMSVR.  While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.

The expanded needham-schroeder protocol can be shortened to a 6-message protocol without loss of security by merely removing the 7thmessage. why is this true? (hint: the purpose of the 7thmessage is to prove to bob that he is talking to alice, but he already knows that. why?)

Answers

This is true since the ticket issued by KDC is enciphered by Alice's key, KAlice, so the one who can decrypt the fourth message and get the ticket to Bob is Alice only, which means that the one who is sending the ticket to Bob is Alice and nobody else.. (No one can get the ticket from the fourth message.)

Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

Answers

Answer:

Software as a Service (SaaS).

Explanation:

   SaaS has been a strong trend in the business world. It is an acronym for Software as a Service, which means in our language software as a service.

    That is, they are online applications that can be used on your computer, tablet or mobile phone simply and remotely.

    It is a program that is not installed and that is used as a service by connecting to the Internet.

    As a service, it means that the customer does not purchase a license for a product but the right to enjoy the service offered.

    Therefore, all work related to the software is in the vendor's hands.

    Making a product available in SaaS format is a way of distributing content or technology solution in a more accessible and secure way.

    Software as a service may also be known by other names, such as web-based, on-demand, or hosted software.

    Netflix is a notorious example of SaaS that has gained prominence worldwide.

the five steps in the fetch/execute cycle and how do they correspond to a restaurant

Answers

The five steps in the fetch/execute cycle are : 
1) Instruction Fetch (IF) - This starts with the moving from the memory to
     the control unit which is given by the program counter. The control unit
     can then access the data immediately from the memory.
2) Instruction Decode (ID) - what task the system has to do, where the
     results is to be stored and what operation is to be performed by which
     data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
    particular memory location.  The return of new data resulting from
    (EX) that is put back into memory.

_____ describes the way the components in a network interact.​

Answers

Logical Topology describes the way that components in a network interact.  Logical topology is the arrangement of devices on a computer  network and how they communicate with one another.  It describes how signals act on the network.  his type of topology is not interested in how devices on the network are connected but how they communicate with each other. 

A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.

What is the physical address of the logical address 8205?

Answers

 I don't understand your question, like what do you mean?

which of the following is not an advantage of using asynchronous data transmission

Answers

The following is not an advantage of using asynchronous data transmission :

a) Overhead of start and stop bits

b) False recognition of these bits due to noise on the channel

Answer:

Inexpensive software.

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier? (1 point)

virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos

Answers

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: social media

15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: connect people all around the world

Brittany is looking to advance in her current career. She is creating a plan to help strengthen and increase her skills. What question should she ask herself? What areas do I need to improve? What should I wear when I interview? When should I apply for a new job? Who do I know that can give me a better job?

Answers

Answer:

The correct answer is What area's do I need to improve.

Explanation:

This will help her alot

Answer:

A) What areas do I need to improve?

Explanation:

To strengthen her skills she needs to improve and be better.

Questions on blender
2. Which of the following is a special mode for making changes to a object? (1 point)

edit mode

mesh mode

landscape mode

drawing mode



3. Which of the following do extrusion tools duplicate while keeping the geometry connected with the original vertices? (1 point)

vertices

edges

faces

circles

Answers

I believe the answer for 2 is Edit mode and the answer for 3 is edges. But im not 100%. I hope this helps if not i hope you find the correct answer. 

should i get a razer phone or gpd win pls help!!?

Answers

I’m not sure what question you are asking

Which three states can be applied to switches using vlan trunking protocol (vtp)? select one:
a. transparent, server, and client
b. secure, transparent, and gateway
c. master, server, and client
d. open, closed, and active?

Answers

The answer is (A) transparent, server, and client

A switch can be configured in any of the above VTP modes.

Transparent: VTP transparent switches forward VTP ads that they receive out their trunk ports in VTP version 2. However, VTP transparent switches don’t participate in VTP.

Server: In this mode, you can create, modify and delete VLANs. You can also specify other parameters like VTP pruning and VTP version for the entire VTP domain.

Client: This mode behaves the same as server, but you cannot create, modify and delete VLANs on a VTP client.






In the launch of the Space shuttle Discovery what does "auto sequence start" mean?

Answers

The countdown clock before a rocket launches is one of the most remarkable timepieces in the world. As indicated by the "T-minus" mark, the hours and minutes tick down to launch. “Auto sequence start” is a breakdown of some of the big milestones leading up to that final moment. If there are no technical issues, at T-minus 31 seconds, the ‘go’ command will be given “Auto sequence start” which means the Ground launch sequencer will hand off primary control. It will be handed off to the shuttle’s onboard computers.

Other Questions
This world famous Spanish artist was known for Guernica, The Old Guitarist, the Blue Period, and Cubism They find pearls on their coasts, and diamonds and carbuncles on their rocks; they do not look after them, but, if they find them by chance, they polish them, and with them they adorn their children, who are delighted with them, and glory in them during their childhood; but when they grow to years, and see that none but children use such baubles, they of their own accord, without being bid by their parents, lay them aside, and would be as much ashamed to use them afterwards as children among us, when they come to years, are of their puppets and other toys. Utopia, Thomas More What is the central idea of this passage? The Utopians use pearls, diamonds, and carbuncles for trade. The Utopians use valuables to gain an advantage over other societies The Utopians give valuables to children, who treat them as toys. The Utopians allow only children to search for pearls, diamonds, and carbuncles. I NEED A CORRECT ANSWER AND I WILL GIVE AWAY BRAINLIEST! Given: KLMN is a trapezoid, KF =10 MF LK AKLMF = AFMN Find: KN Calculate the final pressure inside a scuba tank after it cools from 100c to 25.0c. The initial pressure in the tank is 130.0 atm PLEASE HELPRead the following quotation. Helping others is the key to happiness. Think carefully about this statement. Write an essay explaining your own ideas about the key to happiness. Be sure to clearly state your thesis organize and develop your ideas effectively choose your words carefully edit your writing for grammar, mechanics, and spelling A person who files a civil lawsuit against another party is called a In the nuclear transmutation represented by 168o(p, \alpha) 137n, the emitted particle is ________. in the nuclear transmutation represented by o(p, \alpha) n, the emitted particle is ________. a beta particle. a proton. an alpha particle. a neutron. a positron. What does jupiter have in common with the sun that the terrestrial planets don't? what differentiates jupiter from a star? Describe the disaster at Chernobyl. Which set of numbers can represent the lengths of the sides of a right triangle? Round to the nearest whole number.4, 4, 44, 6.93, 811.2, 16.2, 19.2 4/3, 3, 6/3 Which of the following statements BEST describes an underdeveloped country?A.Its economy has a high GDP per capita each year.B.The country has a healthy and growing economy.C.Many citizens in the country enjoy a high standard of living.D.Most citizens in the country live in poverty. Gay, lesbian, and bisexual teens tend to have their first serious relationship at a later age than heterosexual teens. this is due in part to What is the vertex of the quadratic function f(x) = (x - 8)(x - 2) which transformations are needed to change the parent some function to the sine function below? What are the costs and benefits of using solar energy The sum of the ages of two people is 32. The difference is their ages is 4. What is the age of the younger person ? How has the definition of culture changed over time? Factor \2x^2-11x+5=0 All insertion sequences (is elements) contain two features that are essential for their movement. what are these two elements?