Match each vocabulary word to its definition. 1. downloading choose not to do something 2. lead time person who sends out unwanted e-mail 3. opt out how long it takes to receive an item after it is requested 4. spammer standard layout used as the basis to create new, similar items 5. template copying a file from a remote computer to your computer 6. tutorial self-paced instruction

Answers

Answer 1

Answer:

1. downloading:

                          copying a file from a remote computer to your computer

2. lead time:

                         how long it takes to receive an item after it is requested

3. opt out:

                        choose not to do something

4. spammer:

                         person who sends out unwanted e-mail

5. template:

                      standard layout used as the basis to create new, similar items

6. tutorial:

                      self-paced instruction

Explanation:

Downloading is simple phenomenon in which a computer in a network copies the desired data from other computer that also must have internet connection.Lead time can be defined as a time period between the initialization and completion of any production.Opt out can be defined as an option for not participating (in any kind of activity).Spammer can be defined as a person who sends spam messages or e-mails. These messages can be for promotion of any product or for any other reason. Spam messages are always unwanted.Template can be defined as a basic structure for designing a document or draft. Its a building block or cell.Tutorial is an introductory video made for giving instructions for any technical issue. It is used for training purpose as well as learning.

i hope it will help you!


Related Questions

In what three scenarios would you want to use a slide presentation

Answers

Maybe if you're doing a report on a certain topic, or if you're doing some sort of Business Presentation, or... I don't know man, there's probably lots of answers. If you've got Answer choices, let me know.

I need help answering answers for my work

Answers

Answer:

The answer to the first question is exactly what you have mentioned. Details are:

    1. "C" Get more sleep.

     2. "A" Keep the payoff in mind.

     3. "A" and definitely, as no parent is going to think against the bright future of a child.

And they do so much for the child, and without ever thinking about any profit. Also, they are doing the purest job, and they come even ahead than a Postman and a teacher. Hence, I am not bothered even a little and confirmed that the fourth part which is not shown is definitely not an answer.

Explanation:

The answer to the first question is exactly what you have mentioned. Details are:

    1. "C" Get more sleep.

     2. "A" Keep the payoff in mind.

     3. "A" and definitely, as no parent is going to think against the bright future of a child.

And they do so much for the child, and without ever thinking about any profit. Also, they are doing the purest job, and they come even ahead than a Postman and a teacher. Hence, I am not bothered even a little and confirmed that the fourth part which is not shown is definitely not an answer.

rendering is a combination of the technical and the artistic. Explain this statement.

Answers

Rendering is a combination of the technical and the artistic.

Basically artistic is images which contains media image or video in the digital format when we do the analysis through computers or desktop.

Further on the images or video we need a set of computer program to do the more analysis for our specific outcome this is term is called rendering.

It is combination of both artistic and technical.

Mostly these methods are used for medical report for patient to do further analysis to care out for future treatment.

Even bio metric images are used on this methods.

Program on automorphic number

Answers

Answer:

The program to this question can be given as:

Program:

#include<iostream>//header file.

using namespace std; //using name namespace

void number(int n) //define function

{

int temp,s,c=1; //define variable.

temp=n; //holding value in temp variable.

s=n*n; // calculate square.

while (n!=0) //loop

{

//calculating value.

c=c*10;  

n=n/10;

}

if(s%c==temp) //if block

{

cout<<"Automorphic Number"; //print message.

}

else //else block

{

cout<<"Not Automorphic Number"; //print message.

}

}

int main() //main method

{

int n; //define variable n.

cout<<"Enter a number :"; //message

cin>> n; //input value.

number(n); //calling function.

return 0;

}

Output:

Enter a number :5

Automorphic Number

Explanation:

An Automorphic number is a value in which the square end has the same numbers as a number itself. The explanation of the above program as follows:

In the above automorphic number program, we define a function that is "number()" in the function, we pass variable n that is integer. Inside a function, we define a variable that is "temp, s, and c". The temp variable is used to for copy the number, s, and c variable is used for calculating the automorphic number. In the function, we define a loop that is "while loop" it entry control loop, in loop we define a conditional statement that checks that the calculated value which holds variable s and temp value is equal or not if condition is true, it will print "Automorphic Number" else it will print "Not Automorphic Number". Then we define the main method in the method we define a variable n and take value-form user and pass value to function then we call the function.

Fill in the blank with the correct response.

Software designed to deliver text, graphics, video, and sound on the Internet/web is called a ____​

Answers

Answer:

website

Explanation:

website is software that is used to deliver the mentioned things on the internet.

how to write assembly code for flow chart

Answers

Why in assembly???

Don't get me wrong assembly is a very powerful low level programming language but it is difficult and the programs written in it are long and require deep understanding of embedded programming. It also fluctuates (it's syntax changes) on different processor architectures so the program compatibility with OS or computer itself is hard to reach. Don't try to write assembly code unless you really know what you are doing, instead choose higher level programming language like C or C++ that supports low level functionally which I'm assuming you need since you talk about assembly.

How to calculate checksum in information and technology

Answers

Answer:

It can be done using the software like MD5 & SHA Checksum Utility and Online Checksum calculator.

Explanation:

Suppose you are downloading the ISO file the checksum will be listed. And as you download your file, you will need the checksum calculator for verifying the integrity of the file.

Around 99.9% of the cases, you are not required to care for the checksum while you download the files from the Internet. Though, if you download something sensitive such as antivirus or the complicated software such as Tor, the good habit is to verify once the checksum since the hackers can inject the malware-infested versions of that critical software for gaining complete access to your system.

Many utilities are available for calculating the checksum, but only one or two are the best ones like MD5 & SHA Checksum Utility and Online Checksum calculator.

Install the first one on your computer.

This one is quite simple and very easy for using, you just need to click on the browse button for choosing your file, and automatically the hashes will be calculated for the MD5, SHA-512, SHA-1, and SHA-256.  THE MD5 is the shortest and the SHA-512 is most in length. And the lengthier the hash, the more secure it happens to be.

For the verification of the hash, you simply need to copy and then paste it over at the hash box, which is located at the bottom. Now click on the verify and it will then compare it with the generated hashes (4 in number) to check if there is a match. If it matches you are safe.

You can also use the Online checksum calculator if you want.

We can calculate the checksum on our own as well:

We want to send 32 bit message, and hence we devide it into m parts of k bits each such that mk= total size of data sent in bit, or whatever unit used.  

10101010101010101010101010101111

Divide above in four parts:

10101010

10101010

10101010

10101111

Now add first 2 and if 1 is carry over, add it to the resultant. Go on doing this till you get the final sum. And then take 1s complement

10101010

10101010

----------

01010100

      1

---------

01010101

10101010

------------

11111111

10101111

-----------

10101110

      1

----------

10101111  take 1s complement

01010000 (checksum)

Send four original parts and checksum to receiver

At receiver end:

all four parts are added, which will be same as previous, when we added them. Now add this to checksum, and take 1st complement, ad if everything is 0. It means our data ia original, and we need not worry.

10101111

01010000

-----------

11111111 take 1s complement

00000000

All are 0 hence the file is not corrupt and the original one sent.

Does anyone know the answers to the AR test on Gathering Blue by Lois Lowery?

Answers

yes i do....................................................

It is not important to keep financial records since they can all be found online.
OA. True
OB. False
Reset
Ne

Answers

Answer:

False

Explanation:

Due to the fact that financial records can be erased. Also, I believe it is a law to keep financial records when doing business but I'm not too sure.

1) Using the density equation d=m/V: What is the density of a piece of metal with a mass o
87.6g and a volume of 11.2cm??​

Answers

Answer:

density= 7.8214 g/cm^3

Explanation:

Mass = m = 87.6 g

Volume = V = 11.2 cm^3

density = m/v

            = 87.6 g/ 11.2cm^3

            = 7.8214 g/cm^3

In what order does the Cascade look at factors to determine which CSS rule to follow?

Answers

Final answer:

The CSS Cascade prioritizes rules based on importance ('!important'), specificity of selectors, and lastly, the order of the source. The most important and specific rule that appears last is applied in case of conflict.

Explanation:

In CSS, the Cascade refers to the algorithm that determines which rules apply to elements in the document tree. When multiple rules could apply to an element, the Cascade considers several factors to decide which rule takes precedence:

Importance: The '!important' annotation overrides other declarations.Specificity: A measure of how specific a selector is. More specific selectors override less specific ones.Source Order: If two rules have the same importance and specificity, the last one declared in the CSS will take precedence.

When the Cascade processes these factors, it first checks for the use of '!important'. If this is not present, it then compares the specificity of the selectors. Finally, if there is still a tie, it uses the source order to determine which rule should be applied to the element.

I can't get my images to come through on my HTML coding. What am I doing wrong?!

Answers

Answer:

You might not be referencing or point to the actual path to the image file. Check the Image Source.

Explanation:  

Your Image might not display if you miss the actual image source.

What is 3NF in database design?

Answers

Answer:

The 3NF form is a "eliminate columns not dependent on the key" in the database design.

Explanation:

3NF form stands for third normal form says that it is necessary to remove all column that references to all related information that is not based on the primary key.

It is difficult to store data into one table to remove this problem we use the normalization, there are many forms in the normalization that are "1NF, 2NF, 3NF, and BCNF". The main purpose to use 3NF (normal form) in the database is to remove the data duplication.

Jamie works as receptionist for a small business. Fridays are always a challenge on the phone, since the front entrance sees a lot more customer traffic. Jamie's communication challenge is due to which factor?

effective communication
ineffective communication
barriers to communication
workplace communication

Answers

Answer:Effective communication

Explanation:

Answer:

Effective communicarion

Explanation:

What is another word for violation

1. Infringement
2 domain
3. Copyright
4. Derivative

Answers

Answer:

Infringement

Explanation:

The others are incorrect

Liam made a list of terms that each student needs to know and placed it on the first slide. He then asked a series of questions
on the next ten slides. The terms on the first slide would help answer the questions on the subsequent slides. Liam wanted the
first slide to act as a home page by adding an action button that took him to that slide after each question was asked on the
other slides. How would he add the home action button?

Answers

Final answer:

Liam can add a home action button in PowerPoint by inserting an action button shape and hyperlinking it to the first slide on each slide where the button is needed, making navigation in the presentation straightforward and efficient.

Explanation:

Liam wants to create an interactive presentation by adding an action button that links back to the first slide, which serves as a home page. To do this in PowerPoint, he needs to insert an action button on each slide that requires it. Here are the steps Liam can follow:

Go to the slide where you want to insert the home action button.Select the 'Insert' tab at the top of PowerPoint.Click on 'Shapes' and choose the 'Action Buttons' at the bottom of the dropdown menu.Select the home icon or any other icon that you'd like to use for the home button.Draw the shape on your slide.When prompted, select 'Hyperlink to:' and choose 'First Slide' from the list of options.Click 'OK' to create the hyperlink.Repeat these steps for each slide where you need the home button.

By linking the button to the first slide, students can easily navigate back to the terms necessary for understanding the questions on subsequent slides. This organization method makes the presentation efficient and user-friendly.

The blank one is a close up of what logo?

Answers

Answer:

These are company brand logo

Explanation:

These are company brand logo, and you will find it on all products of that company, plus generally you will find them on each page of their website as well as mobile application.

write c program to check character is alphabate or not?​

Answers

Lookup the isalpha() function in the C standard library, this function will check and return non-zero for alphabetic characters.

What is the recommended procedure for disconnecting an external hard drive to avoid losing data?
Disconnect the hard drive’s power supply, then remove the drive.
Instruct the operating system to eject the drive before unplugging it.
Use the Power button to turn off the computer, then remove the drive.
Wait until the drive stops spinning, then remove the drive.

Answers

Answer:

Instruct the operating system to eject the drive before unplugging it.

Explanation:

Answer: Its B

Explanation:

What is the full form of SSO?
sole sign on
similar sign on
single sign on
special sign on

Answers

I’m pretty sure the second one.

Answer:

Single sign-on

Space Technology
Warm-Up Active
0
Identifying Technological Advancements
Warm-Up
Put these events in the correct order.
First cellular phone
Microprocessor invented
iPhone released
World Wide Web created
First computer (ENIAC)
created
invented

Answers

Answer: first computer, microprocessor, cellular phone, worldwide web, iPhone

Explanation:I just took it

Answer:

first computer, microprocessor, cellular phone, worldwide web, iPhone

Explanation:

1. The global economy involves trading between people from different _____

2. A country that ____

products buys them from foreign sellers.

3. A country that _____

products sells them to foreign buyers.

4 A trade _____

is governmental restriction on international trade.

5. The value of a country's currency in relation to another country's currency is

the _____

6. The goal of fair trade is for producers in poor nations to earn sufficient ____

7. Entrepreneurs can benefit their local economies by hiring ______

employees.

8. The goal of sustainability is to improve human life and the______

Answers

Answer:1 countries

Explanation:

15
Select the correct answer.
What is the phenomenon called when a camera itself accurately controls the exposure in the image?
A.
aperture priority mode
B.
shutter priority mode
C.
automatic shutter bracketing
• D. automatic exposure bracketing
E. aperture secondary mode

Answers

Answer:

D

Explanation:

"Itself accurately controls the exposure in the image"

Automatic Exposure Bracketing

Final answer:

The phenomenon where a camera controls the exposure is called Programme Auto, where it selects the ISO, shutter speed, and aperture. Aperture Priority and Shutter Speed Priority are semi-automated modes where the photographer has more control over certain settings.

Explanation:

The phenomenon when a camera itself accurately controls the exposure in the image is known as Programme Auto. This mode is fully automated, where the camera selects the ISO setting, the shutter speed, and the aperture to achieve the correct exposure.

Unlike Aperture Priority and Shutter Speed Priority, which semi-automate the exposure settings, Programme Auto makes all decisions for the photographer, ensuring an optimal exposure for the given conditions.

In Aperture Priority mode, you select the ISO and the aperture, and the camera selects the correct shutter speed. In Shutter Speed Priority, you select the ISO and shutter speed, while the camera selects the aperture.

Under the 911 lifeline law:

A. You are required to bring someone suffering alcohol poisoning to the hospital

B. You can report alcohol poisoning without fear of legal consequences

C. You will be prosecuted if anyone you're drinking with experiences alcohol poisoning

Answers

Final answer:

Option B is correct: the 911 lifeline law allows individuals to report alcohol poisoning without fear of legal consequences to encourage seeking urgent medical attention for those in need.

Explanation:

Under the 911 lifeline law, option B is correct: You can report alcohol poisoning without fear of legal consequences. The law provides limited immunity from charge, prosecution, or penalty for minors who seek medical assistance for someone experiencing alcohol poisoning. It is meant to encourage individuals to seek help for others without the hesitation that fear of legal trouble might cause.

Alcohol metabolism takes time, and it's important to note that only giving the liver enough time to fully metabolize the ingested alcohol can prevent alcohol toxicity. This means that the various myths like drinking coffee or taking a shower do not accelerate the process. According to medical guidelines, a legally intoxicated person with a Blood Alcohol Content (BAC) of 0.08 will need approximately five hours to become sober.

It is also critical to understand that severe alcohol intoxication may include seizures, aspiration pneumonia, injuries, and low blood sugar, which reinforces why the 911 lifeline law is crucial in potentially life-threatening situations.

A binary operation is defined by a*b=ab if a*2=2-a find a​

Answers

Answer:

Value of a is [tex]2/3[/tex]

Explanation:

A binary operator is an operator that is applied to two or more operand like Subtract(-),Add(+),Multiply(x),Divide([tex]/[/tex]).

To find possible values of a

replace * with 'x' multiply operator in the provided operation.

so now the expressions in [tex]axb=ab\\2a=2-a[/tex]

[tex]2a + a = 2\\3a =2\\a=2/3[/tex]

So the possible value for a is [tex]2/3[/tex]

suppose that f(x)=4x-1 and g(x)=-2x+5. For which values of x is f(x)>0?​

Answers

Answer:

f(x) = 4x -1

Consider the scenario when f(x) =0,

4x-1=0

x=1/4

Hence when x is more than 1/4, f(x) will be more than 0. This can be observed too by drawing a linear graph.

Explanation:

Which components exist in the contextual tab for tables called Design? Check all that apply.​

Answers

Final answer:

The 'Design' contextual tab for tables includes components for applying 'Table Styles', enabling 'Table Style Options', and customizing 'Shading and Borders' to enhance the visual aspect of tables.

Explanation:

The contextual tab for tables called Design in Microsoft Office applications like Word and Excel includes multiple components aimed at enhancing and customizing the appearance of tables. Some key areas in this tab are:

Table Styles: Options to apply predefined styles to the table, which can include combinations of shading, bordering, and color schemes designed to make tables more visually appealing and readable.Table Style Options: Checkboxes that allow users to quickly toggle certain style features, such as header and total rows, banded rows or columns, and the display of first or last columns specially formatted.Shading and Borders: Features to customize the background color behind cells (shading) and the lines that define the edges of cells and boundaries of the table (borders).

These components help users to quickly and easily modify the design and format of tables inserted into their documents or worksheets.

Im getting hit offline can someone help or give me some advice

Answers

Answer:

What do you mean bro?

Explanation:

Answer:

Change your IP then

Explanation:

Without them knowing your real IP they can't "hit you offline" use a vpn

The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
process called?
Brainstorming
Encoding
Decoding
Transforming

Answers

Answer:

Decoding is the technique used to convert an electrical signal into an understandable message. This process is used in receiver side.

Explanation:

In telecommunication, Decoder is used to to interpret the message sent by transmitter in to an understandable message. This process is called decoding

When the track changes icon is active, the icon will appear ___ .

Answers

Answer:

The answer to the given question is "yellow in color".

Explanation:

In the given question the answer is "yellow in color" and the description of the Task changes icon can be given as:

Task changes icon is a part of the Microsoft word. This icon is on the Review tab.  Task changes are an editing command that is used for creating an authorized document and it also provides a facility to make changes to the document.

when we move our mouse on this icon it will appear in yellow. That's why the answer to this question is "yellow in color".

Answer:

Yellow when active grey when inactive.

Explanation: If I'm correct your four options are

grey in color

highlighted light green

yellow in color

in bold

So When Track Changes is turned on, the icon will turn yellow. It will return to gray when the feature is turned off.

Other Questions
A myocardial infarction is a heart attack.Please select the best answer from the choices provided. Which of the following best describes the results of Dr. Sneed's study on volunteering and hypertension? a.The risk of developing hypertension is positively correlated with number of hours spent volunteering. b.The risk of hypertension is lower only for people who volunteer more than 200 hours per year. c.Volunteering has a minimal, if any, effect on rates of hypertension. d.The risk of developing hypertension is negatively correlated with number of hours spent volunteering. Bread production involves the production of carbon dioxide bubbles to make the bread dough rise. These carbon dioxide bubbles occur as a result of yeast cells undergoing ___.A. alcoholic fermentationB. cellular respirationC. anaerobic respirationD. lactic acid fermentation 2 and 1/7 :(15a)= 5/14 :(0.8) PLEASE HELP MEEEEEE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!________ tiene la mochila. La maestra La escritura El escritorio El chico Researchers who examine how the people who own the media influence cultural life typically are conducting textual analysis A competency evaluation measure which presents a hypothetical vignette about a defendant and uses 22 items to assess a defendants understanding of the legal system and reasoning abilities in legal situations is called the (02.01)The ratio of X's to O's is 12 over 9. . Use the image below to determine another ratio for X's to O's: Image with 12 Xs and 9 circles. The 12 Xs are broken down so that there are 4 Xs 3 times and the circles are broken down so that there are 3 circles 3 times. 3 over 4. 9 over 12. 4 over 3. 9 over 4. yan is running on a track that is of a km long. She can run 4 laps in 12minutes. What is her speed in km per minute? What is the dependent variable in this experiment On December 1, Miser Corporation exchanged 6,000 shares of its $25 par value common stock held in treasury for a parcel of land to be held for a future plant site. The treasury shares were acquired by Miser at a cost of $40 per share, and on the exchange date the common shares of Miser had a fair value of $50 per share. Miser received $18,000 for selling scrap when an existing building on the property was removed from the site. Based on these facts, the land should be capitalized at at what amount? Mr. Seider, a shareholder in the Greenfield Corporation, owns 9 comma 000 shares of their common stock, which represents 32% of the outstanding common stock of Greenfield Corporation. Mr. Seider receives a 10% stock dividend. After the stock dividend, what is Mr. Seider's ownership in Greenfield Corporation's common stock? write (-3, 5) and (-2, -6) standard form The head of institutional research at a university believed that the mean age of full-time students was declining. In 1995the mean age of a full-time student was known to be 27.4 years. After looking at the enrollment records of all 4934 full-time students in the current semester, he found that the mean age was 27.1 years, with a standard deviation of 7.3 years. He conducted a hypothesis of H0: = 27.4 years versus H1: < 27.4 years and obtained a P-value of 0.0020. He concluded that the mean age of full-time students did decline. Is there anything wrong with his research?A. No, the hypothesis test was conducted correctly, and the correct conclusion was made.B. Yes, a P-value only indicates the likelihood of getting a result as extreme or more extreme as the one found, the head of institutional research needs to include a confidence level.C. Yes, the head of institutional research has access to the entire population, inference is unnecessary. He can say with 100% confidence that the mean age has decreased.D. Yes, the head of institutional research stated the hypotheses incorrectly; a left-tailed hypothesis test was conducted instead of a two-tailed test. As a manager for XYZ Company. you are assigned to resolve a conflict between two departments of your organization.Both parties have equal power. Both the parties are under time pressure to resolve the conicts You also realize that theparties lack trust/openness for problem solving.If instead of equal power. the other department had considerably more power than yours, what would your best conictresolution style be?A. ForcingB. YieldingC. AvoidingD. CompromisingE. Problem-solving Read the passage from "The Storyteller. (Links to an external site.) The children moved listlessly towards the aunts end of the carriage. Evidently her reputation as a storyteller did not rank high in their estimation. In a low, confidential voice, interrupted at frequent intervals by loud, petulant questionings from her listeners, she began an unenterprising and deplorably uninteresting story about a little girl who was good, and made friends with every one on account of her goodness, and was finally saved from a mad bull by a number of rescuers who admired her moral character. "Wouldnt they have saved her if she hadnt been good? demanded the bigger of the small girls. It was exactly the question that the bachelor had wanted to ask. "Well, yes, admitted the aunt lamely, "but I dont think they would have run quite so fast to her help if they had not liked her so much. "Its the stupidest story Ive ever heard, said the bigger of the small girls.Which statement best explains the situational irony that occurs in the passage? The aunt expects the children to laugh at the story, but they do not. The children expect their aunt to tell a funny story, but she does not. The children do not like the story, even though it is very interesting. The aunt tells a story with a moral, but the children ignore the lesson. Omaha Steaks sending e-mail coupons for items customers have purchased previously, and mailing slick pictures of gourmet steaks and meal packages to addresses that have received orders in the past is an example of _______.A) sales promotionB) direct marketingC) personal sellingD) advertising If the expected inflation rate increases and the natural rate of unemployment remains constant, then _______.A. the long-run Phillips curve shifts rightward and the short-run Phillips curve shifts rightward.B. neither the long-run Phillips curve nor the short-run Phillips curve shifts.C. the short-run Phillips curve shifts upward and the long-run Phillips curve does not shift.D. the long-run Phillips curve shifts rightward and the short-run Phillips curve does not shift. Why did United States citizens feel that Japanese Internment camps were justified during WW2? (-5, -20), (9,9)Slope