Answer:
Custom software is specifically for the company, according to the company's way of doing business, while Off-the-shelf software is readily available and not customized. Off-the-shelf software often falls short of meeting according to specific needs as there will be a lot of unused features in this software.
What is a Font? I need help please
Answer:
This is the answer, see which is best suited
How to do a screenshot on your android phone?
answers/w explanation. ✅
nonsense answers, will be reported.
Plus, no links.
Answer:
Take a screenshot
- Press the Power and Volume down buttons at the same time.
- If that doesn't work, press and hold the Power button for a few seconds. Then tap Screenshot.
- If neither of these work, go to your phone manufacturer's support site for help.
E SEQUENCE OF ACTIONS THAT ALLOWS YOU TO DOUBLE UNDERLINE A PIECE OF TEXT IN YOUR DOCUMENT IS: *
EDIT, INSERT, UNDERLINE, DOUBLE
FORMAT PARAGRAPH, UNDERLINE , DOUBLE
FORMAT, FONT, UNDERLINE STYLE, DOUBLE
FORMAT, FONT, SPACING, UNDERLINE STYLE, DOUBLE
Consider the binary number 1100.a) If you add a zero to the left of the number
(01100) does the value of the binary number change? Explain why or why not
with complete explanations
Answer:
no
Explanation:
The value represented by the added zero is 0·2⁴, which is of course 0.
In the unlikely situation where the binary number is only 4 bits wide, adding a value would be impossible.
What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and validating your research? Explain your answers.
what are the advantage and disadvantage of super disk,in point???
urgently
Answer:look over this
Explanation:
https://en.wikipedia.org/wiki/SuperDisk
list the steps on how to apply bevel and emboss to a layer
Answer: 2123
Explanation:
ok
what can be deployed to intercept and log network traffic passing through the network?
Answer:
Packet sniffers are protocol analyzers that can be deployed to intercept and log network traffic passing through the network.
Explanation:
the process of copying audio and/or video data from a purchased disc and saving it on digital media is called ____.
Answer:
The process of copying audio and/or video data from a purchased disc and saving it on digital media is called ripping.
Explanation:
Ripping is the process of extracting content from CDs, DVDs, disks, etc.
Provide 10 points for each question
What is Sophia (Robot) citizenship?
Why is Sophia (robot) a she and not a he
Features - what can Sophia (robots) do and not do, her limits
Public figure – why is she so popular in comparison to other robots
Events - name all events Sophia has spoken in
Controversy over hype in the scientific community – what are they
What is your opinion about Sophia, just a robot or human robot (explain your answer
with merits
Provide a legend of references and link it to each paragraph (cannot use Wikipedia
as a site) – foot note each references, even if it is in your own words
Answer:
1- Saudi arabia
Explanation:
write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it belongs to a seperator/container tags.
1. <div>
2. <h1>
3. <head>
4. <strong>
5. <p>
6. <html>
7. <hr>
8. <center>
9. <h3>
10. <em>
Answer:
Here!
Hope this helps. Please mark brainliest!
private void finishMap()
{
move();
turnLeft();
move();
move();
move();
takeBall();
takeBall();
turnLeft();
turnLeft();
move();
move();
move();
turnLeft();
}
}
for codeHS 1.5.5 mario karel what am i doing wrong?
Answer:
Where can I find Codehs answers?
You can view the solution for an assignment in multiple ways: Through the Assignments page.
...
To view solutions from the Assignments page:
Navigate to the Assignments page.
Click the '...' next to the assignment you wish to view the solution for.
Choose Solution and another page will open with the solution reference.
Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behavior of the code segment is described below. If rsvp is true, the code segment should store in option1 a string indicating the person’s attendance and food choice. For example, if rsvp is true and selection is 1, the following string should be stored in option1. "Thanks for attending. You will be served beef." If rsvp is false, the following string should be stored in option1, regardless of the value of selection. "Sorry you can't make it." Write the code segment below. Your code segment should meet all specifications and conform to the examples.
The code segment illustrates the use of conditional statements.
The execution of conditional statements is dependent on the truth value of its condition.
The required code segment is as follows:
if (rsvp == true && selection = 1){
option1 = "Thanks for attending. You will be served beef.";
}
else{
option1 = "Sorry you can't make it.";
}
The flow of the above code segment is as follows:
Check if rsvp is true and selection is 1; if yes, "Thanks for attending....." is saved in option1If otherwise, "Sorry...." is saved in option1The code segment submitted can be used for several programming languages such as Java, C++, C and C#.
Read more about similar programs at:
https://brainly.com/question/14166674
Identifica una necesidad que implique la reducción de los efectos perjudiciales relacionados al uso de los recursos energéticos.
Everything runs on energy. This includes all living things, as well as all the cars, houses, factories, lights, and appliances on which we depend. Every unit of energy we use costs us something, be it money or some other type of resource. So whenever we waste energy, we waste money or resources or both.
This is why we need to care about using energy more efficiently. Probably every one of us wastes energy in some way: by driving vehicles with a low fuel efficiency (getting less than 40 miles per gallon); living in poorly insulated houses; using energy-inefficient lighting and appliances; or leaving lights and computers on or motors running when we are not using them. Also, because our use of energy often has harmful effects on the environment, the more energy we waste, the greater is our ecological footprint.
We should also care about the sources of the energy we use. The use of any energy resource has an environmental impact. But our most widely used energy resources—nonrenewable oil, natural gas, coal, and uranium (which fuels nuclear power plants)—have large harmful environmental impacts. By shifting during the next several decades to greater use of renewable energy from the sun, wind, flowing water, and geothermal energy stored as heat in the earth's crust, we can greatly reduce these harmful environmental impacts.
When we rely more on renewable energy sources, most of which depend on energy from the sun, we are following one of nature's three scientific principles of sustainability that have sustained life on the earth for about 3.5 billion years. Some scientists argue that by following these principles, we will have a better chance of preserving our species, cultures, and economies than we will if we ignore them.
There is a great deal of evidence that certain human activities, in violation of these principles, are degrading the earth's life support system. In these activities, we are wasting huge amounts of energy and relying on environmentally harmful energy resources. The good news is that, by observing the earth's scientific sustainability principles, we can still enjoy many of the benefits of today's affluent societies without wasting so much energy and money, and we can reduce our harmful environmental impacts.
Who was your first video game crush? Be 100% honest!
Answer:
princess peach
if you double the force of and object what happens to the acceleration
Answer:
As we increase the force on an object the acceleration increases proportionally. Since the mass does not change as the acceleration increases, we can say that force is equal to acceleration
this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.
Answer:
A
Explanation:
Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
What is content filtering ?Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.
As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.
Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
To learn more about content filtering , visit
https://brainly.com/question/13129235
#SPJ2
will economists be replaced by artificial intelligence?
episodic memory is the memory system that holds what kind of information?
Answer:
This is a particular type of memory that stores autobiographical data about a person. It keeps in itself knowledge about where, when, with whom certain events happened. The episodic memory definition in psychology appeared relatively recently - in 1972 by the Canadian experimental psychologist Endel Tulving.
Explanation:
Answer:
Episodic memory is a person's memory of a specific event. Because each person has a different perspective and experience of an event, their episodic memory of that event is unique. Episodic memory is a category of long-term memory that involves the recollection of specific events, situations, and experiences.
Explanation:
difference between nintendo switch and switch lite
Answer:
thank you sa point labyu stay safe
Answer: The switch lite is the one you can't dock onto your tv and is mostly used for handheld purposes, also you can't take off the controllers.
Explanation:
what 3 types of data can be entered in a spreadsheet
Answer:
data, labels and formulas
The three types of data that can be entered in a spreadsheet are Number data, Text data and Logical data.
We are given that;
The spreadsheet
Now,
Number data: This includes any kind of numerical values, such as integers, decimals, percentages, dates, times, or phone numbers. Number data can be used in calculations and formatted in different ways.
Text data: This includes any kind of characters, such as letters, words, sentences, or symbols. Text data is used for labels, headings, names, or other information that is not numerical.
Text data cannot be used in calculations, but can be formatted in different ways.
Logical data: This includes only two possible values: TRUE or FALSE. Logical data is usually the result of a test or comparison, such as whether a condition is met or not.
Logical data can be used in formulas and functions that involve logical operators or conditions.
Therefore, by spreadsheet the answer will be Number data, Text data and Logical data.
To learn more about spreadsheet visit;
https://brainly.com/question/31511720
#SPJ6
what to do if you forgot your locked notes password
Answer:
what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.
i hope this helps :D
when is not appropriate to be funny in a headline
Answer: I it is something serious like the death of a person then you should not be funny
consider a system for temperature measurement consisting of an integrated temperature sensor (electronic component sensitive to temperature) and an amplifier of the voltage signal produced by the sensor. the sensor has a voltage output and linear characteristic between -10 degrees and 20 degrees; at 0 degrees it is 1 v and increases by 0.1 v for each degree of temperature. it is required to determine the mathematical relationship that links the system output (represented by the amplified voltage) to the input (represented by the temperature of the environment in which the sensor is immersed) and to represent this relationship by means of a graph.
Answer:
ZOO WEE MAMA
Explanation:
ZOO WEE MAMA
What is a special kind of block that can only give two responses?
A.
forever block
B.
conditional block
C.
loop block
D.
Boolean value
Answer:
A. forever block
Explanation:
u dont need a explaination
wap to sore two different variable a and b resoectively. Calculate sum
Answer:
Input : x = 10, y = 20;
Output : x = 20, y = 10
Input : x = 200, y = 100
Output : x = 100, y = 200
Explanation:
Pls give ME A BRAINLAIST
Which type of element is a line break?
Answer:
<BR> element
Explanation:
you can resize a row in a table by dragging the ____.
Answer:
desk
Explanation:
You need more backround information i dont know what u talking about
100 POINTSSSSSSS!!
Intellectual property laws were created because _____.
A. people have a right to their own intellectual property
B. people have no value for their own intellectual property
C. people have to get permission to own their intellectual property
D. people have to sacrifice their own intellectual property
Answer:
D
Explanation:
edg 2021
Answer:
A. people have a right to their own intellectual property
Explanation:
I was correcting my keyboard since the arrows had a qwerty swap, but I looked at the settings and realized I needed to change it, but I deleted the keyboard file and my keyboard stopped working, so I panicked. I'd be dead if my father saw the keyboard. What do i need to reinstall it?,,,
Answer:
Hi,
Try this linkhttps://certified.windowserrorhelp.com/automatically-update-device-drivers/?headline=%20Keyboard%20Drivers&logo=keyboard&gclid=CjwKCAjw5c6LBhBdEiwAP9ejG1lZr9EYilcRFp3KfYydybYMNfbWAC9-1cwynalo6vDN9R7D452qORoCC9cQAvD_BwE
Then download the thing.I promise it is secure.Explanation:
It helps reinstall and install driver updates for windows computers. Based on the way you talked about your keyboard it seems like you have a laptop. The link above will help you re-install and automatically update your keyboard driver. If you have a Mac or other Apple Computer you didn't delete it because Apple hardware has non-removable Drivers for their laptops. in this case there is probably a 3 party source affecting this, such as, heaven forbid, a virus, a corruption of internal storage, or a short circuit.