what seemingly useless item can be of social, ecological or commercial value?

Answers

Answer 1
Earrings. They do nothing practical, but they provide social value by making you look more attractive.
Answer 2

Some seemingly useless item can be of social, ecological or commercial value is money, behavior, death etc.

What is something really useless?

A useless item are known to be things that are said to be rubbish.

They are items that is useless, of no value. Some  useless item can be of social, ecological or commercial value is money, behavior, vehicles etc.

Learn more about commercial value from

https://brainly.com/question/25528419


Related Questions

Explain the main concept of Artificial Neural networks (ANN) as a set of layers that starts with an input layer that has sensors and the output layer that gives the predicted result (predictions) with hidden layers in between based on the ANN architecture and its specific type of application Knowledge One Individual Practical Assignment

Answers

Artificial Neural networks is a computational tool that is made up of a let of processing elements that takes in inputs and deliver outputs using a predefined activation codes.

What are the layers in an artificial neural network?

There are 3 Artificial olfactory sense and recognition system that are found in ANN.  It is made up of:

An input layer.An Hidden layer.An Output layer.

Note that these layers above help to tell more about the Artificial Neural networks (ANN).

Learn more about  Artificial Neural networks (ANN) from

https://brainly.com/question/25653113

Name three things that get information into a computer?​

Answers

Answer:

Input devices do that. Three are the keyboard, a mouse, and a trackball.

Explanation:

What command is used to list at jobs that are scheduled for execution?

Answers

The command that is used to list at jobs that are scheduled for execution is The at command.

What is the at command?

This is known to be a kind of  a Linux command-line utility. It function mainly to book down a job for future execution.

Conclusively. This kind of utility is one that reads commands from standard input and them bind them together into an at job, which can only be executes only once at a time.

Learn more about command  from

https://brainly.com/question/25808182

What command allows the root user to create a crontab file for the user jdoe?

Answers

The command allows the root user to create a crontab file for the user jdoe is As root, execute crontab -e jdoe.

What is the command in crontab?

The crontab command is known to be that often submits, make some editing, lists, or delete cron jobs.

Note that A cron job is a type of command that is often aided or  run by the cron daemon at  a consistent and scheduled times.

Conclusively, The  As root, execute crontab -e jdoe command will give room for the root user to create a crontab file for the user named jdoe.

Learn more about command form

https://brainly.com/question/25243683

Look at the lines that say health, dental, and retirement which statement below is accurate

Answers

The statement that is accurate is that Those lines represent insurance and retirement plans that Hope funds directly from her paycheck.

What is a retirement plan?

A retirement plan is known to be a type of plan that has been set up to take handle all the needs of a post-retirement days.

This was designed to help a person have a stress-free life. A retirement savings plan is one that helps to  your money to grow and care for your  life.

See full question below

Look at the lines that say HEALTH, DENTAL, and RETIREMENT. Which statement below is accurate? Those lines represent taxes that Hope paid to the Federal government b. Those lines represent taxes that Hope paid to the state government Those lines represent benefits that the employer is paying to Hope in addition to her wages d. Those lines represent insurance and retirement plans that Hope funds directly from her paycheck

Learn more about  retirement plans from

https://brainly.com/question/12143528

Which programming term describes the value that is passed to a method when called
so that the method knows what to do?
A parameter
An argument
A function
A variable

Answers

The programming term that describes the value that is passed to a method when called so that the method knows what to do is an Argument

What is an  Argument?

An argument in Programming are variables used to specify a value when you want to call a fuhnction which provides the programs utilizing more informathion.

A bettrer understanding is as follows:

create a function, pass in data in the form of an argumentProgram utilizes more information from the value of the argument.

For example

Say you want to create a function that describes how much money you're having; We can use artgument to descriptive as possible.

Before now, the function may have looked like:

string howMuchmoney() {

    return "so much money";

Modifying  the function prototype and implementation to take a string argument, it becomes

string howMuchmoney(string amount);

Change your return statement to:

return amount + "money";

Add a string to the parentheses where you call the function:

howMuchmoney("tons of")

Learn more in using Argument here:https://brainly.com/question/6067168

What is the binary of the following numbers
10
6
22
12

Answers

You can use this table to help you!

Answer:

10 = 00001010

6 = 00000110

22 = 00010110

12 = 00001100

9.3 code practice

Write a program that creates a 4 x 5 array called numbers. The elements in your array should all be random numbers between -30 and 30, inclusive. Then, print the array as a grid.

For instance, the 2 x 2 array [[1,2],[3,4]] as a grid could be printed as:

1 2
3 4
Sample Output
18 -18 10 0 -7
-20 0 17 29 -26
14 20 27 4 19
-14 12 -29 25 28
Note: the numbers generated in your program will not match the sample output, as they will be randomly generated.

pls help

Answers

The program is an illustration of arrays; Arrays are variables that are used to hold multiple values of the same data type

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   //This declares the array

   int myArray[4][5];

   //This seeds the time

   srand(time(NULL));

   //The following loop generates the array elements

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       myArray[i][j] = rand()%(61)-30;

   }    

   }

   //The following loop prints the array elements as grid

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       cout<<myArray[i][j]<<" ";

   }    

   cout<<"\n";

   }

   return 0;

}

Read more about arrays at:

https://brainly.com/question/22364342

A set of processes and procedures that transform data into information and knowledge is
a.
Computer system
b.
Business system
c.
Database system
d.
Knowledge system
e.
Information system

Answers

Answer:

the answer is information system

A set of processes and procedures that transform data into information and knowledge is an Information system, which is the correct answer that would be an option (D).

What is the information system?

Information system(IS) refers to systematic, social, and technical, organizational systems that obtain, process, store, and distribute information. Information systems are made up of four components from a socio-technological standpoint: task, people, structure (or roles), and technology.

A computer information system is a system that processes or interprets data that is made up of people and computers.

The term is also used in more limited contexts to refer only to the software used to run a computerized database or to refer only to a computer system.

Thus, a set of processes and procedures that transform data into information and knowledge is an Information system.

Hence, the correct answer would be an option (D).

To learn more about the Information system click here:

https://brainly.com/question/28945047

#SPJ2

Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).



Answers

This is big sorry I can’t do it

[ASAP] Choose the tool that best matches each description.

___ is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on. In contrast, the ___ library uses native objects, so that applications built with it will look like other apps on that platform.

1. Kivy
2. BeeWare​

Answers

BeeWare​  is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.

What is BeeWare used for?

Others re:

In contrast, the Kivy library uses native objects, so that applications built with it will look like other apps on that platform.

The BeeWare framework is known to be a kind of open-source network that is known to be a reliable Python program that helps  developer with some amount of tools that are used  for coding.

Based on the above,  BeeWare​  is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.

Learn more about library from

https://brainly.com/question/1348481

#SPJ1

what is the name of the extension used to save publisher

Answers

Answer:

PUB

Explanation:

PUB IS THE NAME OF THE EXTENSION USED TO SAVE PUBLISHER

Try it
Which phrases best describe plagiarism? Check all that apply.
presenting someone else's words as if they were your own
using someone else's idea without giving him or her credit
quoting and citing information as a reference or source
using an idea you found online and claiming it as your own
presenting your own original ideas

Answers

Answer:

Using Someone else's idea without giving him or her credit

Explanation:

In My Opinion

Answer:

124 :)

Explanation:

A team member who does not feel comfortable disagreeing with someones opinion in front of the team would most likely come from a

Answers

Answer:

discussions and decisions made about public policy

Explanation:



Computer A uses Stop and Wait ARQ to send packets to computer B. If the distance between A and B is 40000 km, the packet size is 5000 bytes and the
bandwidth is 10Mbps. Assume that the propagation speed is 2.4x108m/s
a) How long does it take computer A to receive acknowledgment for a packet?
b) How long does it take for computer A to send out a packet?

Answers

The time that it takes the computer to receive acknowledgment for a packet is 0.1667 seconds. The time it takes to send out a packet is  4 x 10⁻³seconds

1 The acknowledgment time for the packet

speed =  2.4x108m/s

Distance = 40000 km,

Time = distance/ speed

= 40000 x10³/ 2.4x10⁸m/s

= 0.1667

The time that it take is 0.1667 seconds.

b. Number of bytes = 5000

5000x 8 = 40000bits

10 mbps = 10000 kbps

10000 kbps = 10000000

packet size / bit rate = 40000/10000000

= 4 x 10⁻³seconds to send a packet out

Read more on computer bandwith here: https://brainly.com/question/27020560

6. Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.

Answers

Answer:

Reporting period hours Timesheet Due Name 44260 Period Start 44228 Period End 40965 Summary Balances Date Completed 43722 Week # 1 Period Start Period End Worked

What is Word's default color for highlighting text?
O orange
O gray
O yellow
O blue

Answers

Answer:

Yellow.

Explanation:

Yellow is typically the color but you can always manually change it.

Answer:

yellow

Explanation:

On the home tab of the ribbon the default color for highlighting text and tool is yellow

A set of activities that performs across the organization creating as output of values to the customer
a.
Business process
b.
Customer process
c.
Quality process
d.
Software process
e.
Integrated process

Answers

the correct answer is A : Business Process

Identify three (3) general-purpose computing devices and write a short (no more
than one page) essay explaining in detail the computing process

Answers

The three (3) general-purpose computing devices used around the world are:

Desktop computersSmartphoneTablet

What is computing?

Computing refers to a process which involves the use of both computer hardware and software to manage, analyze, process, store and transmit data, so as to complete a goal-oriented task.

In Computer technology, a general-purpose computing device is a type of computer that can perform most common computing tasks when provided with the appropriate software application. Thus, three (3) general-purpose computing devices include the following:

Desktop computersSmartphoneTablet

Read more on computing here: https://brainly.com/question/19057393

6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

This week, we have covered network management which include topics such as System message log, SNMP, Netflow, QoS, VPN, and default gateway redundancy. Discuss one feature you would implement in your network and how you use it.

Answers

There are lot of system network. I would love to implement the use of VPN in my network.

What is a gains of implementing a VPN?

The use of VPNs is one that helps a person to have a better form of total security, it also make performance better, remote access, anonymity, an others.

Conclusively, Note that the use of VPN can be  affordable as it is cheap and it can prevent hackers  having access to your data or system.

Learn more about VPN from

https://brainly.com/question/25554117

ICT4AD was meant to modernize the civil service through E-governance implementation.

Explain why you believe that this policy has achieved or not achieved this goal?

Answers

ICT4AD work through E-governance implementation fail as a result of:

Lack of Infrastructure. High cost of running its affairs as it needs  huge public expenditure. Issues with Privacy and Security and others.

What is the aim of e-governance?

The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of  fast administration of services and information.

Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.

Learn more about civil service from

https://brainly.com/question/605499

PLS HELP In VPython, finish the code to draw a horizontal axis.

origin = vector (0, 0, 0)
axis = cylinder(pos=origin, axis=vector(________)

options are (50, 0, 0), (0, 50, 0) and (0, 0, 50)
its NOT (0, 50, 0)

Answers

Use the knowledge in computational language in python to write a code that draw a horizontal axis with vectors.

How to define vectors in Python?

In Python it is possible to define a vector with characters, forming a word, that is, a string of characters, which is abbreviated as "string". To do this, you can assign it as a constant or read the data as a word.

So in an easier way we have that the code is:

mybox = box(pos=vector(x0,y0,z0),

           axis=vector(a,b,c)

length=L,

height=H,

width=W,

up=vector(q,r,s))

See more about python at brainly.com/question/18502436

Sorry for being late, but the answer is...

50, 0, 0

PROOF:

Intro to Computer Science:
A zero-tolerance policy means that if the employee violates the policy, they will be _____.
promoted
fired
warned
reprimanded

The correct answer is: fired :)

Answers

When a employee violate a zero-tolerance policy they’ll be fired!

A zero-tolerance policy means that if the employee violates the policy, they will be fired. Thus, the correct answer is option B.

What is a Zero-tolerance policy?

A zero tolerance policy is one that penalizes every violation of a stated rule. People in positions of authority are prohibited by zero tolerance policies from exercising discretion or changing punishments to fit the circumstances subjectively. They must impose a predetermined punishment regardless of individual guilt, extenuating circumstances, or history.

Zero tolerance policies are studied in criminology and are used in both formal and informal policing systems worldwide. If an employee violates the policy, there will be no tolerance and they will be fired.

Therefore, a zero-tolerance policy means that if the employee violates the policy, they will be fired.

To learn more about zero-tolerance policy, click here:

https://brainly.com/question/27293242

#SPJ2

A desktop is one kind of computer. Name two other kinds?​

Answers

Answer:

Notebook, supercomputer.

Explanation:

Notebooks are laptops, usually low performance.

Supercomputers are the best performing computers in the world.

Answer:

super computers and mainframe computers

Explanation:

these computers were used way before desktop computers

The algorithm solves the problem
of size n by recursively solving
sub-problems of size n – 1, and
then combining the solutions in
Q(n) time.

Answers

Looking at the question on algorithm above, the correct answer is: [tex]O( {2}^{n} )[/tex]

What is algorithm?

Algorithm refers to a sequence of instructions that have been well-defined which helps to solve specific problems. Algorithm is used in computation.

The recurrence relation is:

T(n)=2.T(n-1)+c , n>0

T(n)=1, n=0.

Considering the back substitution method,

T(n) = 2kT(n-k)+ 2k-1c+....+20c

Substitute n-k=0

Therefore, we will have:

T(n) = 2nT(0)+ 2k-1c+....+20c

T(n) = [tex] {2}^{n - 1} + 1[/tex]

T(n) = [tex]O( {2}^{n} )[/tex]

Learn more about algorithm on https://brainly.com/question/24953880

Complete the sentence.

Times New Roman, Courier New, Arial and Verdana are all examples of _____.

1. web-safe colors
2. web-safe fonts
3. formatting templates
4. accessible fonts​

Answers

Answer:

web-safe fonts

Explanation:

Because if you look at the different fonts they are all readable

Answer: 2. web-safe fonts

Explanation: got it right on edgen

Write a function named count_vowels that accepts two arguments: a string and an empty dictionary. The function should count the number of times each vowel (the letters a, e, i, o, and u) appears in the string, and use the dictionary to store those counts. When the function ends, the dictionary should have exactly 5 elements. In each element, the key will be a vowel (lowercase) and the value will be the number of times the vowel appears in the string. For example, if the string argument is 'Now is the time', the function will store the following elements in the dictionary: 'a': 0 • 'e': 2 'i': 2 'o': 1 'u': 0 The function should not return a value.

Answers

The function that counts the number of times a vowel exist in a string is as follows:

def count_vowels(string, dictionary):

    vowels = 'aeiou'

    dictionary = {}.fromkeys(vowels, 0)

    for i in string:

         if i in vowels:

              dictionary[i] += 1

    return dictionary

print(count_vowels("trouble", {}))

Code explanation.

The code is written in python.

we defined a function named "count_vowels". The function accept a string and an empty dictionary.Then. we store the vowels in a variable vowels.The dictionary is used to store the key value pair i.e the vowels and the number of times they appear.We looped through the string.If any value in the string is in vowels,  we increase the dictionary values by 1.Then, we return the dictionary.Finally, we call the function with it parameters.

learn more on function here: https://brainly.com/question/27219031

what is an example of fibre optic cable

Answers

Answer:

printing cable

Explanation:

is a cable used to transfer information from a computer to the printer in packages

In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North America. They taxed goods such as sugar and tea and even placed a tax on the printing of documents. These actions angered the colonists, who thought that taxation was unfair since they had no representation in the British government. For this reason, a group of colonists dumped hundreds of chests of tea from Britain into Boston Harbor in 1773, in what became known as the Boston Tea Party. As a result, England passed a series of harsh new laws to punish the colonists, further angering them. The Continental Congress met to voice the colonists' grievances, and eventually, on July 4, 1776, the colonists declared their independence from Britain.

Answers

Answer:

Taxes and other laws imposed on the colonies led the colonists to declare independence from England.

Explanation:

During the British government, laws taxes, and other laws increased in the colonies which led the colonists to declare independence from England.

How colonists declared their independence from Britain?

As a result, the British were forced to deploy a large army in North America on March 22, 1765, the British parliament passed the Stamp Act.

Which aimed to raise money by levying a tax on all legal and official papers and publications that were being distributed across the colonies. The Stamp Act angered the American colonists, which moved fast to oppose it.

A direct appeal to Parliament was virtually difficult due to the colony's extreme distance from London, the heart of British politics.

Therefore to raise money and increase taxes and laws colonists declared their independence on 4 July 1776 from Britain.

Learn more about the British government, here:

https://brainly.com/question/2848503

#SPJ5

Other Questions
Which of the Earths spheres is made up of the Earths crust and the land on its surface?A.the atmosphereB.the hydrosphereC.the lithosphereD.the biosphere Use the graph of the rational function to complete the following statement. If research indicated that panic disorders result from a hormonal imbalance in the endocrine system, this would most clearly give added credibility to Summarize the two oaths. What is the main difference between the two? Howimportant is that difference? What are the implications of swearing an oath to anindividual leader rather than to a nation Why do artist use Different types of Brashs in there art A rectangular piece of metal is 10 inches wide and 14 inches long.a. What is the perimeter?b. What is the area? !need to finish test by 2:20! Why did Jefferson Davis believe that Southern states had the right to secede from the Union, leading to the Civil War? Secession was specifically allowed in the Constitution. President Abraham Lincoln had banned enslavement in the United States. It was their right to remove an unjust government. The Founding Fathers intended it to happen eventually. Here, if you help me ill give you 100 points and brainlyist. This is worth way less than 100 points, but im a awesome person :D Earth rotates on its tilted axis _______________ an Earth day. The moon rotates on its axis approximately once per _____________. The moon orbits Earth approximately once a ____________________. Earth-moon system orbits the sun once a _______________________.Solar energy _____________ off the side of the moon that faces the sun and can travel to Earth. Solar energy travels in a straight line from the sun and hits different parts of the curved Earth at different ___________ - more direct at the __________________ and less direct at the ________________. un classeur contient des feuilles de couleurs diffrents les deux tiers des feuilles sont blanches le un sixieme des feuilles sont bleues et 12 feuilles restantes sont jaunes determiner le nombre des feuilles dans le classeur Darnell has 3 pies. He gives each of his five friends 3/8 of a pie.How much pie does Darnell have left? Can you explain how you got your answer? follow the instructions and transform the affirmative sentence to negative sentence in vise versa.1.the teacher is sometimes strict.(use not always)2. he did not stay for many weeks in Mumbai.(use few)3. only he could come up with such a plan. (use no one but)4. you have always treated her unfairly.(use never)5. there was no one present who did not chair for her. (begin with everyone)6. Kabir is not a strong as asif.(use stronger) this is khan academy and i need help what is shaken baby syndrome Please helpYour friend is taking images from all over the internet without giving credit to the sources. He tells you that its no big deal, and no one will know or care anyway. Help your friend by explaining why it is important to follow copyright laws when photos are needed. What was the result of Mandelas trial for conspiracy? HELPPPPPPPPPPPP This figure is made up of a rectangle and parallelogram. What is the area of this figure? Enter your answer in the box. Do not round any side lengths. units Coordinate plane with axes labeled x and y. A closed figure is formed by a parallelogram and rectangle. The vertices are negative 10 comma 2, negative 7 comma 3, negative 1 comma 3, 1 comma negative 3, negative 2 comma negative 4, and negative 4 comma 2. Suppose the graph represents the plans for a fence that Tara isbuilding for a new city dog park. Each unit on the graph represents12 yards. After studying the plans, Tara decides to build a fence thatencloses a smaller area. If Tara dilates Rectangle ABCD by a scalefactor of 0.75, and fencing costs $6.39 per yard, how much will shespend on fencing? why can't canada prime minister run for the country as a dictator Arrange the events about the Persians in the order they happened, beginning with the earliest event. You may arrange it by using just the sentence's letter, or the entire sentence.A. Cambyses fails in his attempt to capture Kush.B. Persia is defeated by Greece.C. Cyrus the Great conquers the Medes and the Lydians.D. Darius the Great extends the Persian empire into Europe and to India.E. Persia takes control of Mesopotamia.