Answer:
D
Explanation:
A & B are not consequences
C is a consequence but not directed towards you but your friends
What is ergonomic in computer and technology
Answer: Interaction with technology
Explanation: Computer ergonomics is the study of how we interact with our computers. Scientists that study computer ergonomics, attempt to find solutions to strain, fatigue, and injuries caused by poor product design or workplace arrangement. Their goal is to create an overall comfortable and relaxed workplace environment.
Software designed to facilitate conversation between a computer and a human end user is called?.
Answer:
User interface
Explanation:
I believe this would be referring to a user interface (or UI).
User interface is defined as a Software designed to facilitate conversation between a computer and a human end user.
What is the User interface?The user interface (UI) of a device is the point of human-computer contact and communication. Keyboards, Display displays, mice, and the look of a desktop are all examples of this.
An interface in computing is a common boundary that allows two or more distinct components of a computer system to communicate information.
It is also the method through which a user interacts with a program or a website. A user interface is a piece of software that is meant to enable communication between a computer and a human end user.
Therefore, it is user interface.
Learn more about the User interface, refer to:
https://brainly.com/question/28351003
#SPJ2
The advantage of using a spreadsheet is:
Group of answer choices
Calculations can be done automatically
Changing data automatically updates calculations (as long as Excel is not set to calculate manually)
More flexibility
All of the above
because it's a good thing
Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use
The technology that Isabella should use to strengthen the security of her organization's networks is Network access control (NAC).
What is Network access control (NAC)?Network access control (NAC), is popularly known to be network admission control. This is said to be a kind of process that is known for hindering unauthorized users and devices from having any kind of access to any private network.
Note that the use of this Network access control (NAC) can help Isabella should to strengthen the security of her organization's networks.
Learn more about network engineer from
https://brainly.com/question/26563535
Which two statements accurately describe this computer program? Click all that apply.
A. Clicking the green flag is the event that triggers the cat to move.
B. The code is written in C++, a block-based programming language.
C. The programmer refused a module to make the cat move and make noise.
D. There are two sprites, wearing cat and butterfly costumes.
Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.
What is Computer program?
Instructions must be expressed clearly and precisely since computers can only understand particular instructions or commands in the language that the user is programming them in.
Some computers require users to develop programs using blocks while others demand text-based languages since not all computers can comprehend the same things.
In contrast to computers, your acquaintance would be able to read beyond any spelling and grammar mistakes or request clarification if your handwriting was illegible if you opted to write down the instructions for them.
Therefore, Clicking the green flag is not the event that triggers the cat to move, as the orange "event" block says to trigger when the sprite is clicked, and this is not C++.
To learn more about Computer programe, refer to the link:
https://brainly.com/question/14618533
#SPJ7
Consider the following three classes class A{. }; class B{. }; class C : public B, virtual public A{. }; What is the order of invocation of constructors when an object of class C is instantiated?
The order of construct in the C++ programming language with the addition of the class instantiate is Class C, Class B, and Class A.
What is class instantiate?In the computer language, class instantiate is given as the addition or the creation of the new class. The new class construct in the language helps in the creation of the new object.
In the C++ language, the order of constructor is given in top to bottom. The construct order will be:
Class CClass BClass ALearn more about class instantiate, here:
https://brainly.com/question/9866466
#SPJ1
ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the _______
ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.
What is ERP (Enterprise Resource Planning)?The Enterprise Resource Planning or ERP is the software which is used by the organization to manage its essential elements such as sales, marketing, accounting etc.
The cloud used to manage this sensitive data is called the Cloud ERP.
Cloud ERP is the system which runs on the cloud platform of a vendor.This system allow the customers and organization to store and manage their sensitive data.ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.
Learn more about the Enterprise Resource Planning here;
https://brainly.com/question/14635097
#SPJ1
Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 KB, 4 KB, 20 KB, 18 KB, 7 KB, 9 KB, 12 KB, and 15 KB. Which hole is taken for successive segment request of
Answer:
um uwu
Explanation:
Help me pls :)):)))))))))))))
Answer:
26.6 miles per gallon
Anyone know an "unblocked" alternative of giggl, or hyperbeam, maybe discord for a school chromebook while i wait during class since i'm literally finished with everything, or can you tell me how to unblock things on the chromebook.
You can get a VPN via the place where you get on your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend Adguard VPN. You can create an account for free.
All data and bookman accounts will now start to be deleted from your Chromebook. You can now use your Chromebook without any limitations once you've finished.
What are the ways to unblock things on the Chromebooks?This makes sure that neither other users nor unauthorized individuals may access your data by removing the Chromebook's hard drive and reading it. A Chromebook's “owner” is the first person to log in, and they have the option to control who else is permitted to log in if they so decide.
A VPN can be obtained from the same location where you download your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend AdGuard VPN. You can create an account for free.
Therefore, On your Chromebook, it is not possible to transfer owner permissions to another account.
Learn more about Chromebook here:
https://brainly.com/question/23567863
#SPJ5
How are data organized and manipulated in a database?
Answer:
What is Data Manipulation? Data manipulation refers to the process of adjusting data to make it organised and easier to read. These commands tell the database where to select data from and what to do with it.
Explanation:
You are performing digital forensics in an enterprise that recently experienced a security breach. You successfully retrieved all volatile data, and your next focus is hard drives. How should you collect evidence from the hard drives without tainting any evidence
How should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.
What is mirror image backups?Mirror image backups can be defined as a type of backup that enables you to backup all the document or items that you have on your computer hard drive.
Mirror image backup is vital because it enables you to have the same copy of all the data or information that is store on your hard drive.
Therefore how should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.
Learn more about Mirror image backups here:https://brainly.com/question/21465714
what should i do if my earbuds keep dying and not charge fully to where i get 2 minutes out of them
Answer:
Check the chord that plus into the case because it might need fixing. Buy a new cord or a new case. Or call apple customer service, and tell them the earbuds will not charge and they may give you a free pair! Be sure to make them feel like they are about to loose a customer and but still be sweet and respectful. If none of that works, you might have to buy a new pair :(
Explanation:
Good luck! and i hope this helped <3 Brainliest please? :)
Which of the following is an example of reducing? (waste management)
- printing on both sides of a piece of paper instead of just one
-processing use paper into new sheets of paper
-writing a report about the benefits of reusing paper
-emailing a document instead of printing and mailing it
Answer:
emailing a document instead of printing and mailing it
how to select whose salary is between 1000 and 2000 in Microsoft access what is its criteria
Answer:
Hey
In the query design view, go to criteria and choose the cell you want to put criteria on. type
>1000 AND <2000
Do network packets take the shortest route?
Answer:
The packet will take a shorter path through networks 2 and 4
Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?
The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.
Explanation:
Windows is a GUI Operating System, what is the other type?
Answer:
If you are looking for a different type of GUI operating system then :
Linux or mac
if you are looking for a different type of operating system (non-GUI):
Command-line interface
Explanation:
Please help me on this it’s due now
Using a vehicle like a car, truck, train, ship, or aircraft, goods transport is the movement of any kind of cargo or products.
What is Transporting Goods?There is a distinction between local and distant traffic. Local traffic is defined as the movement of products when the shipper and recipient are physically close to one another and the vehicle can make daily trips back to its starting place.
On the other hand, in long-distance traffic, the goods is moved over considerable distances.
Transport of goods, such as the distribution of industrial materials, the distribution of fuel and gas, the distribution of money, the distribution of food and beverages, the distribution of medical, health, and sanitation supplies, the distribution of primary needs.
Therefore, Using a vehicle like a car, truck, train, ship, or aircraft, goods transport is the movement of any kind of cargo or products.
To learn more about Transport, refer to the link:
https://brainly.com/question/29851765
#SPJ7
Select the correct answer from each drop-down menu.
David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive
platforms can David use for this presentation?
David can use an interactive
for his presentation.
or a?
The interactive platform that David can use for his presentation is the Powerpoint (Windows) platform.
What is Powerpoint?Microsoft PowerPoint is an interactive platform (software) that can be used to create dynamic presentations.
Microsoft PowerPoint can be used to generate images, tables, and different types of graphics.
These images can be supported by multiple types of information (even financial information), which enables to show interactive presentations.
Learn more about interactive presentations here:
https://brainly.com/question/17173901
question in the attached img. pls help me thank you in advance
Answer:here you go miss
Explanation:
1.A title bar is a graphical user interface (GUI) component of a software application or Web page.
2. A menu bar is a row or strip of menu items titles that, when clicked, display dropdown menu of other items or commands.
3. The toolbar, also called bar or standard toolbar, is a row of buttons, often near the top of an application window, that controls software functions.
4. Apache Axis (A pache e X tensible I nteraction S ystem) is an open-source, XML based Web service framework.
5. A status bar is located at the bottom of Internet browser windows and many application windows and displays the current state of the web page or application being displayed.
6. VCB box Type in value and press Enter to apply the
value to the active tool (no click required).
What were the requirements to be an accountant 15 years ago? And what are the requirements now.
Answer:
Back then:
The first step is to determine your state's educational requirements for taking the CPA Exam. Recent grads usually need to have earned 150 college credits in order to sit for the CPA Exam. After obtaining the required amount of college credits, many students enroll in a CPA Review course just prior to sitting for the CPA Exam.
Now:
Aspiring accountants need a bachelor's degree in accounting or business to begin work in the field. A bachelor's degree usually takes about four years and 120 credits to complete. Those with an associate degree might enter the field as bookkeepers or accounting clerks.
Explanation:
Which tab can help start a query? Create External Data File Home
The Create, External Data, File and Home tabs are in Microsoft Office Access
The Create tab can help to start a query
How to determine the tab?
There are several tabs in Microsoft Office Access.
Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.
The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.
Read more about database at:
https://brainly.com/question/518894
Answer:
Its A Your Welcome
Explanation:
paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy
Answer:
I hope it helps you
Explanation:
Pls do let me know if any doubt
The most popular productivity suite in the world is microsoft office. please select the best answer from the choices provided t f
Statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
What is productivity suite?productivity suite is a collection of programs desgined for the computer whcih has a word processor, presentation creater and spreadsheet creater.
Types of productivity suite-
Computer based productivity suite- This type of productivity suite are need to be installed the program on the computer, which can be work offline mode too.Online productivity suite- Online productivity suite are availeble on the internet and can be use whenever required without preinstallation.Microsoft office 365 is the best and the oldest productivity suite. Most of the people are familier with this suite and it is most popular productivity suite in the market.
Thus, the statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
Learn more about the productivity suite here;
https://brainly.com/question/2764685
How would a user ensure that they do not exceed the mailbox quota?
The user can select a mailbox that does not have a quota.
The user can flag the items as Junk Mail.
The user can just move items to the Deleted Items folder.
The user must empty items from the Deleted Items folder or Archive items.
Answer:
I don't know about this one
You are pricing out a new laptop for a user. You decided to go with a traditional hard disk that has a cache of flash memory. Which type of disk are you purchasing
Answer:
A hybrid drive
Explanation:
Its called a hybrid drive because it combines two different kinds of storage, SSD and HDD. SSD is a solid state drive and it has no moving parts. It is much faster than a HDD and is more reliable but these benefits come at a trade off of a higher price per gigabyte. HDD is a hard disk drive and works by reading a spinning disk to get information. This kind of disk is usually used because of its low price/gb. This makes it an excellent option for getting lots of storage at a cheap price. A hybrid drive combines the best of both worlds by using a small SSD as a boot drive to start up a computer because it is much faster, and uses an HDD as the main storage drive with lots of space.
You use trace precedents for a cell containing a formula. What indicates an error in the precedents used?.
When you use Trace Precedents for a cell containing a formula, an error in the precedents used would be indicated by a red tracer arrow.
What is Trace Precedents?Trace Precedents can be defined as cells or groups of cells in Microsoft Excel that is used to review and determine which ones affect the value of an active cell.
IGenerally, when you use Trace Precedents for a cell in a spreadsheet document containing a formula, an error in the precedents used would be indicated by a red tracer arrow, which is displayed between the dependent and precedent cells.
Read more on cells here: brainly.com/question/26053797
Please help me on this it’s due now
Answer:
All of the above because all the other factors are needed to be considered
Packet analysis can also help _____ understand protocol and application behavior to see how routines behave, as well as help determine if it is the application OR the network that is causing slow response times.
Packet analysis can also help developers to understand protocol and application behavior to see how routines behave.
What is the Packet analysis about?Packet analysis is known to be a tool that can help a lot of developers to be able to have a lot gains from understanding protocol and application behavior to see how routines behave.
Conclusively, Packet analysis can be used to know or determine when an application or a given network is having or leading to slow response times.
Learn more about packet analysis from
https://brainly.com/question/6962155
#SPJ1
Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = null; int total = 0; inputstream = new fileinputstream("data. txt"); infs = new scanner(filebytestream); while(xxx){ total = total + infs. nextint(); } system. out. println("total: " + total); group of answer choices inputstream. hasnextint( ) total != 0 infs. hasnextint( ) infs. eof( ) == false
Answer:
total+ infs . nex (xxx){total}
Explanation:
this is correct theres nothing wrong