1) A ______ is a block of code that when run produces an output.


2) A _________ represents a process in a flowchart.

Answers

Answer 1

1) A function is a block of code that when executed produces an output.

2) A rectangle represents a process in a flowchart, signifying a specific task or operation within the overall process.

1) A function is a block of code that when run produces an output.

A function is a reusable block of code that performs a specific task. It takes input, performs operations, and produces an output. Functions help in modularizing code, improving code reusability, and enhancing readability. By encapsulating a specific task within a function, we can easily call and execute that code whenever needed, producing the desired output.

2) A rectangle represents a process in a flowchart.

In flowchart diagrams, different shapes are used to represent different elements of a process. A rectangle is commonly used to represent a process or an action within the flowchart. It signifies a specific task or operation that is performed as part of the overall process. The rectangle typically contains a description or label that indicates what action or process is being performed. By using rectangles in flowcharts, we can visually represent the sequence of steps and actions involved in a process, making it easier to understand and analyze.

learn more about code here:

https://brainly.com/question/20712703

#SPJ11


Related Questions

When you instruct a computer or mobile device to run an application, the computer or mobile device answer its software, which means the application is copied from storage to memory?

Answers

I believe loads

not for sure what the question is

a binary number is an integer made up of only 0s and 1s. for example, 110111101 is a binary number. what is the smallest binary number divisible by 225?

Answers

The smallest binary number that is divisible by 225 is 1110001000.

A binary number is an integer that is made up of only 0s and 1s. It is a numeral system based on the binary system. The decimal system, which is based on 10, is what we use every day. The binary system, on the other hand, is based on 2. Any integer in the decimal system can be converted to the binary system with ease. Decimal numbers are translated to binary numbers by converting the decimal number to a binary number system by representing it in the powers of 2. The method of repeated division by 2 is used to convert decimal numbers to binary numbers. Given 225 is a 5 × 3 × 5 × 3. So, for any number to be divisible by 225, it must be divisible by 5 × 5 × 3 × 3. For the number to be divisible by 5, the last digit of the binary number must be 0.

Learn more about binary: https://brainly.com/question/29365412

#SPJ11

Ryder has discovered the power of creating and viewing multiple workbooks. ​ ​ Ryder wants to use a layout in which the workbooks overlap each other with all the title bars visible. Ryder opens all of the workbooks, and then he clicks the View tab on the Ribbon and clicks the Arrange All button. What should he do next to obtain the desired layout?

Answers

Answer:

Click the Cascade option button

Explanation:

Based on the description of what Ryder is attempting to accomplish, the next step that he needs to do would be to Click the Cascade option button. This option will cause all the windows of the currently running applications to overlap one another but at the same time show their title bars completely visible in order to let the user know their open status. Which is exactly what Ryder is attempting to make as his desired layout for the workbooks. Therefore this is the option he needs.

Part A
First, go watch this Ted Talk given by a teenage girl, Ilana, on the positive and negative effects of technology on teenagers. Now, open a word processing document and answer the following questions:

Identify three arguments or claims that Ilana made during her talk.

Did she include sufficient evidence to back up her arguments?

Was there any irrelevant information that she talked about?

How does Ilana’s talk contribute to the bigger topic of technology being both beneficial and harmful? (i.e., did she add any new information or perspective to the topic?)

Submit your word processing document using this unit’s dropbox.Part A
First, go watch this Ted Talk given by a teenage girl, Ilana, on the positive and negative effects of technology on teenagers. Now, open a word processing document and answer the following questions:

Identify three arguments or claims that Ilana made during her talk.

Did she include sufficient evidence to back up her arguments?

Was there any irrelevant information that she talked about?

How does Ilana’s talk contribute to the bigger topic of technology being both beneficial and harmful? (i.e., did she add any new information or perspective to the topic?)

Submit your word processing document using this unit’s dropbox.

Answers

Technology can make us either redundant or more productive.

What are the positive and negative effects of technology on teenagers?

In the twenty first centuty, there have been an abundant growth of technologies in the world. In fact, the advance in technology is so rapid that it is very difficult to keep up the pace.

Unfortunately, the advance in technology has also come along with some adverse effects such as the inability of people to perform simple tasks that we could perform before without the help of gadgets.

In the positive side, the gadgets that technology have brought does make our work easier helping us to be more productive.

Learn more about technology:https://brainly.com/question/9171028

#SPJ1

Multirotor drones are a type of _______ aircraft.

a. recreational

b. manned

c. lighter-than-air aircraft

d. heavier-than-air

Answers

Answer:

C. lighter-than-air aircraft

Explanation:

A multirotor is a rotorcraft with more than two lift-generating rotors. An advantage of multirotor aircraft is the simpler rotor mechanics required for flight control.  Multirotor drones are used by hobbyists so it could be recreational, but mostly it's used in radio control aircraft so not recreational. It's unmanned so it's not b. If not a or b it has to be c or d. Most of it's airborne time is it being lighter-than air. I'd choose c.

who is the best valorant character

Answers

Answer:

Chamber

Breach

C tier

Explanation:

a network packet contains two kinds of information. What are they?

Answers

Answer:

Connectionless and connection oriented information

Explanation:

There is wireless and wired information in a network so...

Answer:

control information and user data

Explanation:

i just answered it

Miguel, your system administrator, warns you of a new virus threat. This particular virus changes forms to avoid detection by antivirus software. What type of virus is it?

Answers

Answer:

I think it is Polymorphic virus.

please help me with Educational Technology pt.3

please help me with Educational Technology pt.3

Answers

Answer:

D

Explanation:

Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) PENCIL AND PAPER ONLY. SHOW ALL YOUR WORK CLEARLY. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied. In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit. The following Book class is used to represent books and print information about each book. Each Book object has attributes for the book title and for the name of the book's author. public class Book private String title; private String author; public Book (String t, String a) title = t; author = a; public void printBookInfo() System.out.print(title + ", written by " + author); (a) The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator that is used to represent the name of the illustrator of a picture book. The PictureBook class also contains a printBookInfo method to print the title, writer, and illustrator of a picture book. Consider the following code segment. PictureBook myBook = new PictureBook ("Peter and Wendy", "J.M. Barrie", "F.D. Bedford"); myBook.printBookInfo(); The code segment is intended to print the following output. Peter and Wendy, written by J.M. Barrie and illustrated by F.D. Bedford Complete the PictureBook class below. Your implementation should conform to the example above. public class PictureBook extends Book (write your class using pencil in a separate page) Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) Consider the following books. • A book titled Frankenstein, written by Mary Shelley A picture book titled The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow The following code segment is intended to represent the two books described above as objects bookl and book2, respectively, and add them to the ArrayList myLibrary. ArrayList myLibrary = new ArrayList(); /* missing code */ myLibrary.add(bookl); my Library.add(book2); (b) Write a code segment that can be used to replace /* missing code */ so that bookl and book 2 will be correctly created and added to my Library. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). (write your code segment using pencil in a separate page) The BookListing class is used to generate a descriptive listing for a book. The BookListing constructor takes a Book object and a double value as parameters and uses them to print information about the book, along with its price. Assume that book1 and book2 were created as specified in part (b). The following table demonstrates the intended behavior of the BookListing class using objects book1 and book2. Code Segment Result Printed BookListing listing1 = new BookListing (book1, 10.99); Frankenstein, written by Mary Shelley, $10.99 listingl.printDescription(); BookListing listing2 = new BookListing (book2, 12.99); The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow, $12.99 listing2.print Description(); (c) Complete the BookListing class below. Your implementation should conform to the examples. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). public class BookListing (write your class using pencil in a separate page)

Answers

(a) The implementation of the PictureBook class:

typescript

Copy code

public class PictureBook extends Book {

   private String illustrator;

   

   public PictureBook(String t, String a, String i) {

       super(t, a);

       illustrator = i;

   }

       public void printBookInfo() {

       System.out.print(title + ", written by " + author + " and illustrated by " + illustrator);

   }

}

(b) The code segment that creates book1 and book2 and adds them to myLibrary:

csharp

Copy code

Book book1 = new Book("Frankenstein", "Mary Shelley");

PictureBook book2 = new PictureBook("The Wonderful Wizard of Oz", "L. Frank Baum", "W.W. Denslow");

myLibrary.add(book1);

myLibrary.add(book2);

(c) The implementation of the BookListing class:

csharp

Copy code

public class BookListing {

   private Book book;

   private double price;

       public BookListing(Book b, double p) {

       book = b;

       price = p;

   }

      public void printDescription() {

       book.printBookInfo();

       System.out.println(", $" + price);

   }

}

For more questions like Polymorphism visit the link below:

https://brainly.com/question/16344360

#SPJ11

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters

Answers

The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.

What are binary sequences?

A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros.

The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.

See options below

4

6

7

8

Learn more about bits from

https://brainly.com/question/19667078

A recursive method that computes the number of groups of k out of n things has the precondition that ______. n is a positive number and k is a nonnegative number n is a nonnegative number and k is a positive number n and k are nonnegative numbers n and k are positive numbers

Answers

Integer n is a positive number

In this lab, you will complete the implementation of a medical device vulnerability scoring web page. the purpose of this web page is to return a score that numerically quantifies how vulnerable a specific vulnerability is to the particular attack. the properties of the system will be selected from a group of predetermined options, where each option is a styled radio button. once options are selected for all possible properties, the web page will display the vulnerability score (and hide the warning label).
implement a function called updatescore. this function must verify that one button from each property is selected.
using javascript, add a click or change event listener to each radio button (do not add the event listener to the button label). notice that the radio buttons are hidden using css.

Answers

To complete the implementation of the medical device vulnerability scoring web page, you can follow these steps:-

1. Define the `updateScore` function in JavaScript:
```javascript
function updateScore() {
 // Check that one button from each property is selected
 // Calculate the vulnerability score based on the selected options
 // Display the vulnerability score and hide the warning label
}
```

2. Add a click or change event listener to each radio button using JavaScript:
```javascript
// Select all radio buttons
const radioButtons = document.querySelectorAll('input[type="radio"]');

// Add event listeners to each radio button
radioButtons.forEach((button) => {
 button.addEventListener('change', updateScore);
});
```

Make sure to adapt this code to your specific HTML structure and predetermined options. The `updateScore` function should be modified to handle the selected options and calculate the vulnerability score accordingly.

Learn more about web page here:

https://brainly.com/question/9060926

#SPJ11

in chapter 10, the class clocktype was designed to implement the time of day in a program. certain applications, in addition to hours, minutes, and seconds, might require you to store the time zone. derive the class extclocktype from the class clocktype by adding a member variable to store the time zone called timezone. add the necessary member functions and constructors to make the class functional. also, write the definitions of the member functions and the constructors. finally, write a test program to test your class.

Answers

A program to test your class is given below:

The Program

#include <iostream>

class clockType

{

public:

void set_hour(int h);

int get_hour();

void set_minut(int m);

int get_minut();

void set_second(int s);

int get_second();

clockType() {};

clockType(int h,int m,int s)

{

 h = ((h < 0) ? 0 : (h > 23) ? 23 : h);

m = ((m < 0) ? 0 : ( m> 59) ? 59 : m);

 s = ((s< 0) ? 0 : (s > 59) ? 59 : s);

 hour = h;

 minut = m;

 second = s;

}

private:

int hour{ 0 };

int minut{ 0 };

int second{ 0 };

};

inline void clockType::set_hour(int h)

{

h = ((h < 0) ? 0 : (h > 23) ? 23 : h);

hour = h;

}

inline void clockType::set_minut(int m)

{

m = ((m < 0) ? 0 : (m > 59) ? 59 : m);

minut = m;

}

inline void clockType::set_second(int s)

{

s = ((s < 0) ? 0 : (s > 59) ? 59 : s);

second = s;

}

inline int clockType::get_minut()

{

return minut;

}

inline int clockType::get_second()

{

return second;

}

inline int clockType::get_hour()

{

return hour;

}

int main()

{

// example test program

// set time 22:54:12

clockType test(22, 54, 12);

std::cout << "Set time :" << test.get_hour() << "h" << test.get_minut() << "m" << test.get_second() << "s" << std::endl;

// set time 18:18:54

test.set_hour(18);

test.set_minut(18);

test.set_second(54);

std::cout << "Set time :" << test.get_hour() << "h" << test.get_minut() << "m" << test.get_second() << "s" << std::endl;

system("pause");

return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Tell me what does WSG mean ​

Answers

Answer:

It could mean many different things but heres some things it could

With Special Guest

World Standard Group

Web Security Guard

Hope this helps!

1) Using the topics below, in 150 words or more for each item, describes how Threat Modeling fits into each:
a) System development life cycle.
b) Software development life cycle (address software development and not system items).
c) Security maturity.
d) Security plan and policies.

Answers

Threat modeling can be described as the method of analyzing a software system or application in order to identify and address any potential security threats and vulnerabilities. This analysis takes into account the components and structure of the system, as well as the external environment in which it will operate. Threat modeling is a crucial aspect of secure software development and can be integrated into various stages of the system development life cycle (SDLC), software development life cycle (SDLC), security maturity, and security plan and policies.

a) System development life cycle: Threat modeling can be integrated into the system development life cycle in several stages, including the design and implementation phase. At this stage, the threat model will help developers identify potential threats and vulnerabilities and ensure that they are addressed early on in the development process. This will help to prevent security issues from being introduced into the system later on and ultimately save time and resources in the long run.

b) Software development life cycle: Threat modeling can be integrated into the software development life cycle by addressing software development and not system items. At the coding stage, developers can use the threat model to help identify potential security vulnerabilities and ensure that they are addressed before the code is deployed. This can help prevent common security issues like SQL injection, cross-site scripting, and other types of attacks.

c) Security maturity: Threat modeling is a critical aspect of security maturity. By using threat modeling, organizations can develop a more comprehensive security strategy that takes into account potential threats and vulnerabilities and addresses them before they can be exploited by attackers. A mature security posture includes a proactive approach to identifying and addressing potential security risks and the use of tools like threat modeling can help organizations achieve this.

d) Security plan and policies: Threat modeling can be used to inform security plans and policies by identifying potential threats and vulnerabilities that need to be addressed. This information can then be used to develop policies and procedures that will help to mitigate these risks and ensure that the system is secure. Threat modeling can also be used to ensure that policies and procedures are effective by identifying potential gaps or areas for improvement. Overall, threat modeling is an essential component of developing effective security plans and policies.

Learn more about System development life cycle here:

https://brainly.com/question/19977141

#SPJ11

During the implementation of a new checkout system, target initially replaced only half of the old check out stations in each store while leaving the other half the same so bugs could be worked out and training could be completed on the new stations. After testing and training, target phased out the remaining old stations. This approach is called _________ conversion.

Answers

During the implementation of a new testing system, target initially replaced only half of the old check out stations in each store while leaving the other half the same so bugs could be worked out and training could be completed on the new stations.Software testing out is the act of inspecting the artifacts and the behavior of the software beneath check by validation and verification. software testing also can provide an goal, unbiased view of the software to permit the business to realize and apprehend the risks of software implementation.In wellknown, testing is locating out how well some thing works. In terms of human beings, checking out tells what level of information or skill has been obtained. In laptop hardware and software development, testing is used at key checkpoints inside the average system to determine whether goals are being met.

Learn more about testing here:

brainly.com/question/27794277

#SPJ4

PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST

 PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST

Answers

1.His story is told here deep detailed history of the company’s you love coming in everyday.

2.The contribution was the computer
Oct 4 1903-June 15 1995

Write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "second = ", followed by the value of second. Print everything on one line and go to a new line after printing. Assume that first has already been declared as a double and that second has been declared as an int . Assume also that the variables have already been given values .

10507

Given an integer variable i and a floating-point variable f, write a statement that writes both of their values to standard output in the following format: i=value -of-i f=value -of-f

Thus, if i has the value 25 and f has the value 12.34, the output would be:

i=25 f=12.34

But if i has the value 187 and f has the value 24.06, the output would be:

i=187 f=24.06

10935

Write a declaration for a variable temperature that can hold the current outdoor temperature, measured to the half degree (like 98.6 or 31.5).

10591

Write a literal representing the true value .

11014

Answers

Given that first has already been declared as a double and that second has been declared as an int, to write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "second = ", followed by the value of second is:first = 3.3; second = 5;cout << "first is " << first << " " << "second = " << second << endl;Thus, the output of the above code will be:first is 3.3 second = 5

Given an integer variable i and a floating-point variable f, a statement that writes both of their values to standard output in the following format: i=value -of-i f=value -of-f is:cout << "i=" << i << " " << "f=" << f << endl;Thus, the output will be in the following format:i=value -of-i f=value -of-fAs given in the question, the following outputs are expected:i=25 f=12.34, i=187 f=24.06 respectively.


The literal representing the true value is: trueThe true value is of the Boolean data type. It is a Boolean literal representing true Boolean value.

To know more about  variable visit:

https://brainly.com/question/15078630

#SPJ11

What should a developer use to implement an automatic approval process submission for cases?

Answers

Process Builder  should a developer use to implement an automatic approval process submission for cases.

What is Process Builder?

Process Builder is an automated Salesforce tool that allows you to control the order of actions or evaluate the criteria for a record. Process Builder gives you the ability to use straightforward 'If/Then' logic to easily add automation to your Salesforce environment.

What is the difference between Workflow and process builder?

In Workflow, if you put multiple actions on criteria, there is no way to predict or control which action will happen first. However, with Process Builder, you are able to control the multiple actions set to criteria and what order you want them to take place in.

To learn more about Process Builder , refer

https://brainly.com/question/14312209

#SPJ4

Complete Question is,  

A . An Assignment Rule

B . Scheduled

C . Process Builder

D . A Workflow Rule

Indicate if the statement is true or false False 1. A spreadsheet cannot recalculate after you have changed data in your worksheet. 2. A spreadsheet uses formulae to carry out operations on numerical data. 3. A range is a group of cells that form a rectangle. 4. A value is titles and headings used in a spreadsheet. 5. You cannot format a spreadsheet like a word processing document by bolding and underling headings. 6. A label is a text entry. 7. You cannot copy a formula in a spreadsheet. 8. To find the largest value in a set of values the formula is: MAX(first Cell:Last Cell) You can produce a chart to represent the data in a spreadsheet.​

Answers

Answer:

False

Explanation:

a spread sheet can recalculate any number of times

There are different kinds of software. The answers are below;

A spreadsheet cannot recalculate after you have changed data in your worksheet is a false statement. A spreadsheet uses formulae to carry out operations on numerical data is a true statement. A range is a group of cells that form a rectangle on a screen is a true statement.  A value is titles and headings used in a spreadsheet is a false statement.  You cannot format a spreadsheet like a word processing document by bolding and underling headings is a false statement.A label is a text entry is a true statement.You cannot copy a formula in a spreadsheet is a false statement To find the largest value in a set of values the formula is: MAX(first Cell:Last Cell) is a false statement.

What is a Spreadsheet?

This is known to be a kind of arrangement of cells usually in columns and rows. It is used to organize, analyze, calculate and report any kind of information and it is often done in numerical form.

Learn more about spreadsheet from

https://brainly.com/question/4965119

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

Answers

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in the domain network location category.

In Windows 10, network location categories are used to determine the level of security and network sharing settings that are applied to a particular network connection. The three network location categories in Windows 10 are "Private", "Public", and "Domain".When a Windows 10 computer is joined to a domain and can communicate with the domain controller, the network connection is automatically identified as a "Domain" network location. This allows the computer to use domain-based security and policy settings, and enables access to network resources that are only available to computers in the domain.

To learn more about domain click the link below:

brainly.com/question/29812839

#SPJ11

a server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and webpages

true or false

Answers

Answer:

true

Explanation:

The answer to this question is true

what is a good wall adapter for your house?​

Answers

Answer:

RAVPower Dual-Port*

Explanation:

what permission must be granted for a user to run procedures within a database?

Answers

Answer:

To grant permissions on a stored procedure

From Stored Procedure Properties, select the Permissions page. To grant permissions to a user, database role, or application role, select Search. In Select Users or Roles, select Object Types to add or clear the users and roles you want.

Jen's house contains the following devices:
• Jen's laptop that is wirelessly connected to the home network router and turned on
• Her husband's PC, which connects to the router by a cable but is turned off
• Her mother's virus-infected computer that has been unplugged from the router
• Her daughter's smartphone that is wirelessly connected to the router
If Jen's daughter is talking on her phone, and Jen's husband's computer is off, which computers are currently
networked?
O All four, because they are all computers in the house, regardless of their present usage.
Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.
Just Jen's laptop, because her mom's computer is not connected to the router, her husband's computer is off, and her daughter's
phone is not currently acting as a computer.
None of them, because a network must have at least two devices wired by cable before it can be called a network

Jen's house contains the following devices: Jen's laptop that is wirelessly connected to the home network

Answers

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

Answer:

Jen’s laptop and her daughter’s phone, because they are both connected to the router and turned on.

Explanation:

what does this mean PLEASE?

what does this mean PLEASE?

Answers

Answer:

the controls of which you're your suppose to use or where your suppose to put it

Explanation:

because i'm not sure what you're your showing me

Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:

Answers

Answer:

Families are systems

Explanation:

first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.

what are the characteristics of review site

Answers

Review sites are websites where people can post reviews about people, businesses, products, or services. Some of the characteristics of review sites are:

- Web 2.0 techniques: Review sites may use Web 2.0 techniques to gather reviews from site users or may employ professional writers to author reviews on the topic of concern for the site

- Self-selection bias: Most review sites make little or no attempt to restrict postings, or to verify the information in the reviews. Critics point out that positive reviews are sometimes written by the businesses or individuals being reviewed, while negative reviews may be written by competitors, disgruntled employees, or anyone with a grudge against the business being reviewed. Some merchants also offer incentives for customers to review their products favorably, which skews reviews in their favor

- Reviewer characteristics: Understanding online reviewer characteristics has become important, as such an understanding can help to identify the characteristics of trustworthy reviews. Some of the characteristics that have been studied include valence, rationality, and source

- Content characteristics: The content characteristics of online consumer reviews can make them more useful to readers. Some of the content characteristics that have been studied include the tone of the review, the level of detail, and the relevance of the review to the reader's needs

- Successful owner responses: Successful owner responses to reviews can help to improve the reputation of a business. Some of the characteristics of successful owner responses include being prompt, personalized, and professional
Other Questions
I NEED HELP , 10 POINTS ON THE LINE ! What is scarcity?(1 point)the things needed to produce goods and servicesthe gap between limited resources and unlimited wants and needsthe production of more goods and services over timethe act of setting up a business to make a profit How did the Civil War impact the North differently than the South?The North lost more soldiers than the South.The North spent less on its war effort than the South.The North ended up paying the South's war expenses.The North suffered infrastructure damage that the South did not. MM Model with Zero Taxes An unlevered firm has a value of $525 million. An otherwise identical but levered firm has $100 million in debt. Under the MM zero-tax model, what is the value of the levered firm? find the missing angels How can you Compare the Musical Instruments of Thailand to the native Musical Instruments of the Philippines? of the three words and, or, and not, using which one will probably result in the most results for a search? At the beginning of the war, which advantage did the British have over thePatriots?A. A larger armyB. Good supply and communication linesC. Motivation to fight and win the warD. Knowledge of the terrain If a BCC single crystal is loaded along the [001] axis, which fo the following candidate slip systems is the least likely to experience slip ?Select the single best option.(011) [1 1 1](011) [1 1 1](101) [1 1 1](101) [1 1 1](110) [1 1 1](101) [1 1 1] Gricault's masterpiece, Raft of the Medusa, fits the definition of sublime because _____.the composition is based on diagonal linesthe scene is stormy and violent and full of raw emotionthe subject matter is politicalthe human figures are twisted and distorted Reflect on what you think about when you see or hear the word if. Use your understanding of the word to a makeprediction about the poem. Type your response in the box below. the fifth scale step (sol) forms the chief active chord (v), which is called the pleases help solve for x What realization tinges Freneau's delight in the flower with a sense of sorrow?The hidden flower will never delight others.The bloom will decay and disappear.There were also beautiful flowers in Eden.The bloom should rather not exist than die so soon. will a marble rolling down an incline travel a shorter or greater distance if you raise the height of the incline? short description of how the Mayan empire came to power? Is southwest Asia culturally divided? what is 52/7. in need help you have just been beamed into a biome that has relatively stable temperatures and abundant rainfall. along with your laser gun, your compass, and rain poncho, you have a graph of precipitation and temperature similar to the one above. which letter marks the area you are in? f1=30Nandf2=10Nact on amass of 2kg if the cofficient of friction between the mass and the horizontal surface is 0.2 what is the acceleration of the mass