Jake is a 6-year-old boy. his mother wants him to learn scissor skills for improving his finger grip. so, she hands him several colorful papers and a pair of scissors. jake does not have difficulty understanding which object cuts the other. what is this type of reasoning called?

a.
analogical
b.
deductive
c.
common sense
d.
inductive

please answer so brainly doesnt get rid of it.

Answers

Answer 1

According to this, I think it is common sense.


Related Questions

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

A company will be able to obtain a quantity discount on component parts for its three products, X1, X2 and X3 if it produces beyond certain limits. To get the X1 discount it must produce more than 50 X1's. It must produce more than 60 X2's for the X2 discount and 70 X3's for the X3 discount. Which of the following pair of constraints enforces the quantity discount relationship on X3? a. X31 ? M3Y3 , X32 ? 50Y3 b. X31 ? M3Y3 , X31 ? 50 c. X32 ? (1/50)X31 , X31 ? 50 d. X32 ? M3Y3 , X31 ? 50Y3

Answers

The  pair of constraints enforces the quantity discount relationship on X3 is X32 ≤ M3Y3 and X31 ≥ 70Y3.

What is Relationship discount?

Relationship discounts especially on mortgages are known to be special loan terms that is said to be offered by financial institutions offer if a person have different types of accounts with them.

Note that The  pair of constraints enforces the quantity discount relationship on X3 is X32 ≤ M3Y3 and X31 ≥ 70Y3 as it best tell what it is about.

Learn more about  discount relationship from

https://brainly.com/question/10286547

#SPJ4

Which authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users and can be used together on the same network

Answers

The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:

TACACS+RADIUS

What is TACACS and RADIUS?

RADIUS is known to be a service that is set up so as to be able  authenticate and log in any person who is a remote network user.

Note that TACACS+ is  used in  the area of administrator access to network devices such as routers and switches.

Therefore, The authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users are:

TACACS+RADIUS

Learn more about authentication service from

https://brainly.com/question/14699348

#SPJ1

When an ages array is correctly initialized using the values {20, 30, 40, 50}, then the value of ages[4] is _______________________.

Answers

When an ages array is correctly initialized using the values {20, 30, 40, 50}, then the value of ages[4] is undefined.

Targeted attacks like spear phishing are:.

Answers

Answer:

type of phishing attacks that targets specific individuals or organizations typically through malicious emails. [tex]\sqrt{x} \alpha \beta \pi[/tex] 12345 [tex]\lim_{n \to \infty} a_n[/tex]

Targeted attacks like spear phishing are frequently employed in targeted assault campaigns to enter a someone's account or pose as that person.

What is spear phishing?

Spear phishing is defined as an email or other electronic communication scam that targets a particular person, group, or company.

It is lao defined as a kind of phishing assault that uses malicious emails to target particular people or organizations.

When an unsuspecting victim replies to a phony email demand for action, this is known as spear phishing.

Giving passwords, credit card information, clicking links to verify shipment details, or transferring money are examples of actions that fall under this category.

Thus, targeted attacks like spear phishing are frequently employed in targeted assault campaigns to enter a someone's account or pose as that person.

To learn more about spear phishing, refer to the link below:

https://brainly.com/question/24156548

#SPJ2

which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......

what is UTP in terms of network​

Answers

Answer: Unshielded bent match (UTP) could be a omnipresent sort of copper cabling utilized in phone wiring and neighborhood region systems (LANs). There are five sorts of UTP cables recognized with the prefix CAT, as in category each supporting a distinctive sum of transfer speed.

Explanation:

Write a function named count_case that takes a string as an argument and returns the count of upper case and lower case characters in the string (in that order). Any characters that are not letters should be ignored.

Answers

Answer:

def count_case(input): #create a function

 uppercase = 0 #declare variables

 lowercase = 0

 for x in input: #loop through user input looking at each letter

   if x.isupper(): #if letter is uppercase

     uppercase += 1 #increment the uppercase counter

   elif x.islower(): #otherwise if it is lowercase

     lowercase += 1 #increment the lowercase counter

 print(uppercase) #print uppercase count

 print(lowercase) #print lowercase count

string = input("enter string: ") #ask for user input

count_case(string) #run function

You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files

Answers

To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

What is a FTP server?

FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.

It is a basic thing in transferring or sharing files between two computer networks.

Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

Learn more about FTP server

https://brainly.com/question/27610307

#SPJ1

Using logic gates, design an active low chip select for the memory a 256
k memory device starting at address 48000016 in a 16 megabyte memory space

Answers

Answer:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

Explanation:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

What is one possible consequence of risky sharing

Answers

Answer:

B. Difficulty in your everyday relationships.

Explanation:

This is the only reasonable answer to this question.

Difficulty in your everyday relationships is one possible consequence of risky sharing, hence option B is correct.

How do relationships state risky sharing?

Risk sharing is the difficulty that you share with your partner to prevent the loss and make benefits. In companies for preventing risk, they deploy premium policies.

In a relationship, if it observes difficulties in the relationship are shared with the partner it prevents their loss and makes benefits. This is the indiscriminate private information sharing by any person which relates to privacy.

In risky sharing if anyone shares your private information, address, image, and videos it is risky for you.

Therefore, difficulty in your everyday relationships is the result of risky sharing.

Learn more about risky sharing, here:

https://brainly.com/question/30565341

#SPJ2

Marie uses a CSS file to style the elements in her HTML document. What is the advantage of using an external CSS file to style HTML elements

Answers

The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

What is HTML element?

An HTML element is known to be an element that is said to be often defined by a start tag, its content, and an end tag.

Therefore, The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

Learn more about  HTML elements from

https://brainly.com/question/11569274

#SPJ1


E-mail messages create a
permanent record than other forms of business communications.

Answers

Answer:

Explanation:

Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.

For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.

A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.

The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.

Write the text of the program in Python.

Answers

Answer:

wow its quite long ill send it to you in a couple of days

how do you unblock sites on your computer

Answers

Answer:

you can't if it's a school computer you'd have to buy new parts for it

Explanation:

The FitnessGram Pacer Test is a multistage aerobic capacity test that progressively gets more difficult as it continues. The 20 meter pacer test will begin in 30 seconds. Line up at the start. The running speed starts slowly but gets faster each minute after you hear this signal *signal sound*. A sing lap should be completed every time you hear this sound. ding Remember to run in a straight line and run as long as possible. The second time you fail to complete a lap before the sound, your test is over. The test will begin on the word start. On your mark. Get ready!… Start.

Answer: you cant if your are on a school cumputer but if you are not just make a new profile with out any restrictions.

Explanation:

Car.py The Car.py file will contain the definition of a Car class. The Car class will hold information about the cars (make, model, year, and price). We will define the Car attributes as follows: make - string value representing the brand of the car (eg. Nissan, Tesla, Toyota, Ferrari). Your program must store this attribute in uppercase characters model - string value representing the model of the car (eg. Electra, Model3, Prius, Portofino). Your program must store this attribute in uppercase characters year - integer value representing the year of the car (eg. 2010, 2000, 1963) price - integer value representing the price value of the car (eg. 20000, 30000, 25000) You will write a constructor that allows the user to construct a Car object by passing in values for the make, model, year, and price. __init__(self, make, model, year, price) In addition to the constructor

Answers

The Car.py program is an illustration of constructors and classes in Python

Constructors are used to create the instant of objects

The program in Python

The program written in Python is as follows:

class Car:

make = ""

model = ""

year = 0

price = 0

def  __init__(self, make, model, year, price):

 self.make = make.upper()

 self.model = model.upper()

 self.year = year

 self.price = price

def display(self):

 print("Make = " + str(self.make.upper()))

 print("Model = " + str(self.model.upper()))

 print("Year = " + str(self.year))

 print("Price = " + str(self.price))

Read more about Python programs at:

https://brainly.com/question/26497128

#SPJ1

What is the need for computer programming?

Answers

Answer:

See Explanation

Explanation:

Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

Select the correct answer.
What unit of measure do videographers and lighting professionals use to measure color temperature?
A.
lux
B.
fahrenheit
C.
degrees
D.
kelvin

Answers

Answer:

B I think be is the answer

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usage make the world better?

Answers

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

What is internet?

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

https://brainly.com/question/13308791

#SPJ1

If you need to add more data between column a and column b, you should _____. click in column a and paste a column click anywhere in column a and use the insert column command click anywhere in column b and use the insert column command highlight a cell in column a; place your cursor on the border of the cell so it turns into a two-sided arrow, and drag.

Answers

If you need to add more data between column a and column b, you should    place your cursor on the border of the cell so it turns into a two-sided arrow, and drag.

How do I add more columns in Excel?

To input a single column in an excel one have to Right-click the full column to the right of where on want to add the new column, and then click on Insert Columns.

Note that If you need to add more data between column a and column b, you should    place your cursor on the border of the cell so it turns into a two-sided arrow, and drag.

Learn more about data from

https://brainly.com/question/5054742

#SPJ2

When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.

Answers

To ensure that one or several recipients cannot see the names of other recipients make use of the Bcc field,.

What is the email about?

To send emails to a groups one can make use of the Cc field. This is where a person input all of the addresses there, and then separated them by commas.

Note that to hide addresses, make use of the Bcc field, as no body will be able to see the addresses added in this field.

Learn more about emails from

https://brainly.com/question/24688558

#SPJ1

Help me with this two questions please

Answers

Answer:

1 is def... don't know about the other one though sorry

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. A layer 3 switch
b. An SDN controller
c. Storm control
d. A root port

Answers

The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

What is a layer 3 switch?

This is known to help make switch packets by looking at IP addresses and also MAC addresses.

Note that Layer 3 switches helps to separate ports into virtual LANs (VLANs) and carry out the routing between them and as such, The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

Learn more about  switch from

https://brainly.com/question/17245000

#SPJ4

A multinational bank has many branches. A bank has large volumes of financial data to be analyzed. Therefore, a
server will be useful in such a set up. In addition, a
topology is preferable in a bank because the number of employees will keep increasing.

Answers

Answer:

34tr4

Explanation:

34tg

Which subnet would include the address 192.168.1.96 as a usable host address?

Answers

The subnet for the address 192.168.1.96 will be 192.168.1.64/26.

What is a subnet?

The subnet in the host address is given as the logical subdivision or the partition of the IT network. It enables the computer systems to share the same internet.

The subnet for the address 192.168.1.96 will be 192.168.1.64/26. It is based on the increment with the octet it falls in.

Learn more about subnet, here:

https://brainly.com/question/15055849

#SPJ1

A(n) ___ provides abstract methods and no other code. a. abstract class b. interface c. polymorphic class d. base class

Answers

Answer:

Abstract class.

Explanation:

I think it’s this because, the abstract class has no body.

A company has dedicated a subgroup of its development team to coding the exception handling aspects of an application. what is the significance of exception handling?

Answers

Exceptional handling is the program handling in unexpected circumstances. Exceptional handling is significant as the functions showing errors could be corrected.

What is exceptional handling?

In coding exceptional handling is the method to correct the errors in the function of the application program so that it does not get crash resulting in the loss of the task of the end-user.

It can be corrected by blocking, catching the handler, and by throwing expressions. The exceptions should be handled so that abnormal termination of the application is prevented.

Therefore, exceptional handling is significant to prevent program termination.

Learn more about exceptional handling here:

https://brainly.com/question/13261436

#SPJ1

in multi-channel funnel reports, how are default conversions credited?

Answers

The Multi-Channel Funnels reports are generated from conversion paths, the sequences of interactions (i.e., clicks/referrals from channels) that led up to each conversion and transaction. In the reports, channels are credited according to the roles they play in conversions—how often they assisted and/or completed sales and conversions.

The two 1s in binary number ‘0100010’ do not have the same value. Explain why?

Answers

Answer:

The first 1 on the left is 32 and the 1 on the right is 2. Hence this 8 digits binary number represents 32 + 2 which is the decimal number 34

Explanation:

each 1 represents the number 2 powered by a different number, so starting at the further right, the first number with value 0 is representing 2^0 , the next on the left which is value 1 is representing 2^1 which is 2 and so on. So the other 1 further on the left will be 2^5  which is 32.

Every other digit that is zero is not taking any value, but if they were, they would all be taking values from 2^0 to 2^7 Take a look below:

0  0  1  0  0  0  1  0

      32             2

Other Questions
Guernica. the painting portrays the suffering of animals and people by violence. the shapes are blocky and unrealistic. who painted the image above? h. Phil,........... (who/whom/whose /to whom) I know from my childhood, married Kate, his classmate. (C Unit One-lesson Three"Making a Fist" Questions Read this excerpt from "Eleven".And maybe one day when you're all grown up maybe you will need to cry like if you're three, and that's okay. That's what I tell Mama when she's sad and needs to cry. Maybe she's feeling three.What do Rachel's actions reveal about her?A She makes plans for the future.B She is immature for her age.C She is sympathetic to others.D She is frustrated with her family. If f(x)=X-3, what is the value of f(-3)? A catalog with 625 pages has 6 pages with tables.What percent of the pages have tables?0.16%0.96%1.28%1.92% Find the length of side X in the simplest radical form of the rational denominator What is the approximate value of X?! Help ASAP please Identify the interaction used to describe each type of interdependence among organisms. having too many fish in a pond can limit the amount of food and space available. the cheetah population depends on the gazelle population for food. 64. If six black, five red, four white, and two green disks are to be arranged in a row, what is the number of possible color arrangements? A bus stops at a bus stop every 45 minutes. Once a person gets to the bus stio, what is the probability they will wait for no more than 20 minutes? How many 4-digit numbers are neither multiples of 2 nor multiples of 5? Teenegers were asked how many times a week they were reminded to do chores. The responses are shown in the graph. What is the mean of the number of times per week that they were reminded? Compare and contrast the left and right hemispheres of the brain, briefly describing their primary functions. Calculate the volume of 100. grams of oxygen gas (O) at 25.0C and a pressure of 1.25 atm. Because whitney felt she had only a grasp on the material presented in class, she decided to go to the teacher for additional help. dentists fill any within teeth with composite resin or porcelain; in layman's terms, these holes are called cavities. the teacher their study of plants with a research project on any plant-related topic the students chose. your feelings of toward margaret are getting in the way of what could be a great friendship. Margot has 8 kilograms of apples.how many liters Of apple juice can Margot make. How do l do this????? The Mesopotamians wrote on clay tablets. What did the Egyptians write on?A) cartonnageB) parchmentC) wax blocksD) smooth rocks Which word has the same prefix as preplanning? Two lines intersect at a point, forming angle 1, angle 2, angle 3, and angle 4.Angle 1 and angle 3 are vertical angles. Angle 2 and angle 4 are vertical angles.m angle1 = 70What is the measure of angle 2?O 20O 70O 90O 110