Define Advancements in Technology
Complete each statement by choosing the correct answer from the drop-down menu.
Advancements in technology occur because
??

Answers

Answer 1

Answer:

Advancements in technology occur because of the continuous efforts of researchers, scientists, and engineers to improve and innovate new technologies


Related Questions

A common programming operation is to swap or exchange the values of two variables. If the value of x is currently 19 and the value of y is 42, swapping them will make x into 42 and y into 19. Write a program named Swap.java that allows the user to enter two int values. The program should store those values into variables and then swap the variables. Print the values of both variables before and after the swap. You will receive full credit as long as your solution works, but try to do this using as few variables as possible

Answers

Answer:

import java.util.Scanner;

public class Swap

{

public static void main(String[] args) {

   

    Scanner input = new Scanner(System.in);

    int x, y, t;

 System.out.print("Enter the first variable: ");

 x = input.nextInt();

 System.out.print("Enter the second variable: ");

 y = input.nextInt();

 

 System.out.printf("Values before the swap -> x = %d, y = %d\n", x, y);

 

 t = x;

 x = y;

 y = t;

 

 System.out.printf("Values after the swap -> x = %d, y = %d\n", x, y);

}

}

Explanation:

Import the Scanner class

Create a Scanner object to be able to get input from the user

Declare the variables, x, y, and t - the variable t will be used as temporary variable that will hold the value of x

Ask the user to enter the first and second variables

Print the values before swap

Assign the value of x to the t

Assign the value of y to the x (Now, x will have the value of y)

Assign the value of the t to the y (Since t holds the value of x, y will have the value of x)

Print the values after the swap

Which of the following IPv4 addresses is a public IP address?

Answers

An example of Pv4 addresses that is a public IP address is

An example of a public IPv4 address is "8.8.8.8". This is a public IP address that is assigned to one of Go ogle's DNS servers. Any device connected to the Internet can use this IP address to resolve domain names and access websites.

What is the IP address about?

A public IP address is a globally unique IP address that is assigned to a device or computer that is connected to the Internet. Public IP addresses are used to identify devices on the Internet and are reachable from any device connected to the Internet.

On the other hand, private IP addresses are used within a local area network (LAN) or within a private network, and are not reachable from the Internet.

They are used to identify devices within a local network, such as a home or office network. Private IP addresses are not unique and can be used by multiple devices within a LAN.

Learn more about IP addresses from

https://brainly.com/question/30018838

#SPJ1

Write a function that receives a StaticArray where the elements are already in sorted order, and returns a new StaticArray with all duplicate values removed. The original array must not be modified. You may assume that the input array will contain at least

Answers

The code that remove duplicate is as follows:

def remove_duplicate(mylist):

    mylist = list(dict.fromkeys(mylist))

    return mylist

print(remove_duplicate([1, 1, 2, 3, 3, 5, 6, 7]))

Code explanation

The code is written in python.

we defined a function named "remove_duplicate" and it accept the parameter "mylist".The variable "mylist" is used to store the new value after the duplicate vallues has been removed.Then, wed returned mylist.Finally, we call the function with the print statement . The function takes the required parameter.

learn more on python here: https://brainly.com/question/21126936

Write a function that receives a StaticArray where the elements are already in sorted order, and returns

Why would an information systems security practitioner want to see network traffic on both internal and external network traffic?

Answers

Answer:

To see who is accessing data and also where it is going

Explanation:

An information systems practitioner is a person who is involved in the planning and and also implementation of IT resources for any organization which he at she works.

The information systems practitioner would want to want to see network traffic on both internal and external network traffic so as to know who is accessing data and to also know where it is going.

What does influence mean in this passage i-Ready

Answers

In the context of i-Ready, "influence" refers to the impact or effect that a particular factor or element has on something else. It suggests that the factor or element has the ability to shape or change the outcome or behavior of a given situation or entity.

In the i-Ready program, the term "influence" could be used to describe how various components or aspects of the program affect students' learning outcomes.

For example, the curriculum, instructional methods, and assessments implemented in i-Ready may have an influence on students' academic performance and growth.

The program's adaptive nature, tailored to individual student needs, may influence their progress by providing appropriate challenges and support.

Furthermore, i-Ready may aim to have an influence on teachers' instructional practices by providing data and insights into students' strengths and areas for improvement.

This can help educators make informed decisions and adjust their teaching strategies to better meet their students' needs.

In summary, in the context of i-Ready, "influence" refers to the effect or impact that different elements of the program have on students' learning outcomes and teachers' instructional practices. It signifies the power of these components to shape and mold the educational experiences and achievements of students.

For more such questions element,Click on

https://brainly.com/question/28565733

#SPJ8

what is the main objective of the administrator when creating and assigning storage accounts to users?

Answers

Note that the main objective of the administrator when creating and assigning storage accounts to Users is "to provide them with a secure and reliable method of storing and accessing their data, while also maintaining control and visibility over the data and its usage. "

What is an Administrator in IT?

IT administrators, also known as system administrators, configure and manage the computers, servers, networks, corporate software, and security systems of a business. They also assist the organization stay comply with cybersecurity rules by optimizing internal IT infrastructure for increased efficiency.

A competent administrator must understand networks and how to handle network problems. Basic hardware expertise is required. Understanding of backup, restoration, and recovery techniques. Excellent knowledge of permissions and user management

Learn more about Storage Accounts:
https://brainly.com/question/29929029
#SPJ1

what are business rules​

Answers

Answer:

defines or constrains some aspect of business and always resolves to either true or false. It specifically involves terms, facts and rules

Explanation:

To win an election in Ghana, a presidential candidate must have 50% plus one of the total valid votes counted.assuming x and y are two presidential candidates for party manU and Chelsea respectively, write a program to request for the total valid votes counted,total valid vote for x and y should any of them obtain 50% plus one of the total valid votes counted that candidate should be declared as winner if none of them obtained the 50% plus one of the total valid votes counted. The program should request for a re-run of the election

Answers

Answer:

Total valid votes:

X:

Y:

if X + Y >= 50% + 1 of total valid votes

 if X > Y

   print "X is the winner!"

 elif X < Y

   print "Y is the winner!"

 else

   print "It's a tie!"

else

 print "Re-run the election"

HELP ASAP WITHIN 5 MINUTES

HELP ASAP WITHIN 5 MINUTES

Answers

Answer:

A,B, and C

Explanation:

Information censorship is used to____. (4 options)
1. Promote Authorization Government
2. Polarize the Public
3. Create Confusion
4. Promote Independent Media

Answers

Information censorship is used to control the flow of information and restrict access to certain content.

While the specific motives and methods behind information censorship can vary, it generally serves to exert authority and influence over the dissemination of information within a society.

Option 1: Promote Authorization Government - This option suggests that information censorship is used to support authoritarian or autocratic regimes by controlling the narrative and limiting dissenting viewpoints. Censorship can be employed as a means of consolidating power and suppressing opposition.

Option 2: Polarize the Public - Censorship can be used to manipulate public opinion by selectively suppressing or amplifying certain information, thereby influencing people's perspectives and potentially creating divisions within society.

Option 3: Create Confusion - Censorship can contribute to confusion by limiting access to accurate and reliable information. This can lead to a lack of transparency, misinformation, and the distortion of facts, making it challenging for individuals to form informed opinions.

Option 4: Promote Independent Media - This option is not typically associated with information censorship. Rather, independent media thrives in an environment that upholds freedom of speech and opposes censorship.

Overall, options 1, 2, and 3 align more closely with the potential outcomes of information censorship, while option 4 contradicts the nature and purpose of censorship.

For more questions on Information censorship

https://brainly.com/question/29828735

#SPJ8

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AM

Questions for chapter 8: EX8.1, EX8.4, EX8.6, EX8.7, EX8.8

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for

Answers

The response to the following prompts on programming in relation to array objects and codes are given below.

What is the solution to the above prompts?

A)

Valid declarations that instantiate an array object are:

boolean completed[J] = {true, true, false, false};

This declaration creates a boolean array named "completed" of length 4 with initial values {true, true, false, false}.

int powersOfTwo[] = {1, 2, 4, 8, 16, 32, 64, 128};

This declaration creates an integer array named "powersOfTwo" of length 8 with initial values {1, 2, 4, 8, 16, 32, 64, 128}.

char[] vowels = new char[5];

This declaration creates a character array named "vowels" of length 5 with default initial values (null for char).

float[] tLength = new float[100];

This declaration creates a float array named "tLength" of length 100 with default initial values (0.0f for float).

String[] names = new String[]{"Sam", "Frodo", "Merry"};

This declaration creates a String array named "names" of length 3 with initial values {"Sam", "Frodo", "Merry"}.

char[] vowels = {'a', 'e', 'i', 'o', 'u'};

This declaration creates a character array named "vowels" of length 5 with initial values {'a', 'e', 'i', 'o', 'u'}.

double[] standardDeviation = new double[1];

This declaration creates a double array named "standardDeviation" of length 1 with default initial value (0.0 for double).

In summary, arrays are objects in Java that store a fixed-size sequential collection of elements of the same type. The syntax for creating an array includes the type of the elements, the name of the array, and the number of elements to be stored in the array. An array can be initialized using curly braces ({}) to specify the initial values of the elements.


B) The problem with the code is that the loop condition in the for loop is incorrect. The index should start from 0 instead of 1, and the loop should run until index < masses.length instead of masses.length + 1. Also, the totalMass should be incremented by masses[index], not assigned to it.

Corrected code:
double[] masses = {123.6, 34.2, 765.87, 987.43, 90, 321, 5};

double totalMass = 0;

for (int index = 0; index < masses.length; index++) {

   totalMass += masses[index];

}


The modifications made here are to correct the starting index of the loop, fix the loop condition, and increment the totalMass variable correctly.


C)

1)
Code to set each element of an array called nums to the value of the constant INITIAL:

const int INITIAL = 10; // or any other desired initial value

int nums[5]; // assuming nums is an array of size 5

for (int i = 0; i < 5; i++) {

   nums[i] = INITIAL;

}


2) Code to print the values stored in an array called names backwards:
string names[4] = {"John", "Jane", "Bob", "Alice"}; // assuming names is an array of size 4

for (int i = 3; i >= 0; i--) {

   cout << names[i] << " ".

}



3) Code to set each element of a boolean array called flags to alternating values (true at index 0, false at index 1, true at index 2, etc.):

bool flags[6]; // assuming flags is an array of size 6

for (int i = 0; i < 6; i++) {

   flags[i] = (i % 2 == 0);

}


Learn more about array objects at:

https://brainly.com/question/16968729

#SPJ1

to save a copy of word online document to your hard drive which option should you select? Save as , save, rename or download and copy

Answers

Answer:

 The correct answer is Save as              

                                                                                                                                               

The option that is to select to save a copy of word online document to hard drive is the save as option.

What is word document?

The term “Word Document” is used to denote the document that is made in the Microsoft Word. This document is made in the proper format with the MS Word. This document can be safe electronically by selecting the save as option.

After saving that document, this will automatically save on the hard drive of the computer device of that user.

Therefore, option A is correct.

Learn more about the Word document, refer to:

https://brainly.com/question/15939168

#SPJ2

Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space. Your program's output should only include the two words and a space between them.

Hint: To print both words on one line, remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a space between the words as well.

Sample Run

Enter a word: Good
Enter a word: morning
Good morning

Answers

word1 = input("Enter a word: ")

word2 = input("Enter a word: ")

print(word1 + " " + word2)

I hope this helps!

Write a program that takes a month(string) and date(int) as input and check if it's in Autumn c++

Answers

A program that takes a date as input and outputs the date's season is given below:

The Program

input_month = input()

input_day = int(input())

months= ('January', 'February','March', 'April' , 'May' , 'June' , 'July' , 'August' , 'September' , "October" , "November" , "December")

if not(input_month in months):

   print("Invalid")

elif input_month == 'March':

   if not(1<=input_day<=31):

       print ("Invalid")

   elif input_day<=19:

       print("Winter")

   else:

       print ("Spring")

elif input_month == 'April' :

   if not(1<=input_day<=30):

       print("Invalid")

   else:

       print("Spring")

elif input_month == 'May':

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Spring")

elif input_month == 'June':

   if not(1<=input_day<=30):

       print("Invalid")

   elif input_day<=20:

       print ("Spring")

   else:

       print("Summer")

elif input_month == 'July' or 'August':

   if not(1<=input_day<=31):

      print("Invalid")

   else:

       print("Summer")

elif input_month == 'September':

   if not(1<=input_day<=30):

       print("Invalid")

   elif input_day<=21:

       print ("Summer")

   else:

       print ("Autumn")

elif input_month == "October":

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Autumn")

elif input_month == "November":

   if not(1<=input_day<=30):

       print("Invalid")

   else:

       print ("Autumn")

elif input_month == "December":

   if not(1<=input_day<=31):

       print("Invalid")

   elif input_day <=20:

       print ("Autumn")

   else:

       print ("Winter")

elif input_month == 'January':

   if not(1<=input_day<=31):

       print("Invalid")

   else:

       print("Winter")

elif input_month == "February":

   if not(1<=input_day<=29):

       print("Invalid")

   else:

       print ("Winter")

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

five real world objects with similar characteristics​

Answers

Our current scientific knowledge in areas such as human visual perception, attention, and memory, is founded almost exclusively on experiments that rely upon 2D image presentations. However, the human visuomotor system has largely evolved to perceive and interact with real objects and environments, not images (Gibson, 1979; Norman, 2002).

question below in attachment

Answers

You can use basic HTML elements like input, select and textarea to generate an HTML web-form and gather the data for the code table.

What is the program?

The form in this code case is configured to use the "post" method and directs to "insert_item.php", a PHP script that manages the form submissions. The structure comprises of input sections for the "name", "description", and "quantity" cells in the "item" table, as well as a button for submitting the information.

One method of collecting user input from a web-form and adding it to a database table is by utilizing PHP and SQL commands, which enables connectivity to the database and the ability to run the INSERT query.

Learn more about  program from

https://brainly.com/question/26134656

#SPJ1

question below in attachment
question below in attachment
question below in attachment

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

Disaster Recovery: Mastery Tes
Select the correct answer.
Which form of control can monitor a system in real-time and make decisions based on real-time information?
OA. preventive control
B.
directive control
O C.
OD. corrective control
administrative control

Answers

Answer:

C.

Explanation:

directive control is the form of control that can monitor a system in real-time and make decisions based on real-time information. Directive control is also known as "active control," as it actively monitors and adjusts the system based on the current state of the system. This type of control is often used in disaster recovery situations where quick, accurate decision-making is critical.

Preventive control is a form of control that is designed to prevent problems from occurring. This type of control is implemented before an incident occurs and is focused on identifying and mitigating potential risks.

Corrective control is a form of control that is implemented after a problem has occurred. It is focused on correcting the problem and restoring the system to its normal state of operation.

Administrative control is a form of control that is implemented through policies, procedures, and guidelines. It is focused on managing and organizing the system and is often used to support other forms of control, such as preventive and corrective control.

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple algorithm to compute the upper median. How manyoperations does it take asymptotically in the worst case?3.(7 points) Show how you can use the (upper) medians of the two lists to reduce thisproblem to its subproblems. State a precise self-reduction for your problem.4. (7 points) State a recursive algorithm that solves the problem based on your reduction.5.(2 point) State a tight asymptotic bound on the number of operations used by youralgorithm in the worst case.

Answers

Answer:

See attached images

2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple
2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple
2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple

The goal of this coding exercise is to create two classes BookstoreBook and LibraryBook. Both classes have these attributes:
author: String
tiltle: String
isbn : String
- The BookstoreBook has an additional data member to store the price of the book, and whether the book is on sale or not. If a bookstore book is on sale, we need to add the reduction percentage (like 20% off...etc). For a LibraryBook, we add the call number (that tells you where the book is in the library) as a string. The call number is automatically generated by the following procedure:
The call number is a string with the format xx.yyy.c, where xx is the floor number that is randomly assigned (our library has 99 floors), yyy are the first three letters of the author’s name (we assume that all names are at least three letters long), and c is the last character of the isbn.
- In each of the classes, add the setters, the getters, at least three constructors (of your choosing) and override the toString method (see sample
run below).
- Your code should display the list of all books keyed in by the user
What’s new in HW5:
- Create an abstract class that you call Book. The class Book should have the fields and the code that is shared by both the BookstoreBook and the LibraryBook classes. Both of those classes extend the Book class. Test your code with an array of 100 elements of Book. Call that array list (You can’t have an array to store the BookstoreBook objects and another one to store the LibraryBook objects. One array (list) to hold all the book objects that your code creates).
- Create a class that you call BookList in which you put list as a private field. Your code must have the following structure:
public class Main {
public static void main(String args[]) {
// Instantiate the class BookList here ...
}
}
//___________________________
abstract class Book {
//code of the abstract class Book
}
//___________________________
class BookstoreBook extends Book {
// fields and specific code to the BookstoreBook class goes here
}
//___________________________
class LibraryBook extends Book {
// fields and specific code to the LibraryBook class goes here
}
//___________________________
class BookList {
private Book[] list;
public BookList() {
list = new Book[100];
// Additional code goes here if needed...
}
}

Answers

Here is a solution that satisfies the requirements you've outlined:

The Program

import java.util.Random;

public class Main {

   public static void main(String args[]) {

       BookList bookList = new BookList();

       // Example usage

       BookstoreBook bsBook = new BookstoreBook("George Orwell", "1984", "1234567890", 15.99, true, 20);

       LibraryBook libBook = new LibraryBook("J.K. Rowling", "Harry Potter and the Philosopher's Stone", "9876543210");

       bookList.addBook(bsBook);

       bookList.addBook(libBook);

       System.out.println(bookList);

   }

}

abstract class Book {

   protected String author;

   protected String title;

   protected String isbn;

   public Book(String author, String title, String isbn) {

       this.author = author;

       this.title = title;

       this.isbn = isbn;

   }

   public String getAuthor() {

       return author;

   }

   public void setAuthor(String author) {

       this.author = author;

   }

   public String getTitle() {

       return title;

   }

   public void setTitle(String title) {

       this.title = title;

   }

  public String getIsbn() {

       return isbn;

   }

   public void setIsbn(String isbn) {

       this.isbn = isbn;

   }

 

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

Answers

In credentialed scanning, policy compliance plugins give you an advantage  known as option C: Customized auditing.

What does auditing serve to accomplish?

The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?

Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.

Learn more about Customized auditing from

https://brainly.com/question/7890421
#SPJ1

See full question below

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

More accurate results

Safer scanning

Customized auditing

Active scanning

A browser is a program that allow
A. users transfer messages and files through internet.
B. users search for relevant information on the WWW.
C. users to access and view web pages on the internet.
D. users exchange real-time messages or files with another online user​

Answers

C. users to access and view web pages on the internet.

Please have a look at the screenshot below

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

Which of the following accurately describes a user persona? Select one.

Question 6 options:

A user persona is a story which explains how the user accomplishes a task when using a product.


A user persona should be based only on real research, not on the designer’s assumptions.


A user persona should include a lot of personal information and humor.


A user persona is a representation of a particular audience segment for a product or a service that you are designing.

Answers

A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.

This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.

Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.

The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.

Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Learn more about User persona, refer to the link:

https://brainly.com/question/28236904

#SPJ1

Different network scenarios require the use of different tools. The tools you may consider should EXCLUDE:_________

Answers

Complete Question:

Different network scenarios require the use of different tools. The tools you may consider should EXCLUDE:

a. Port scanner

b. Banner grabbing tools

c. Vulnerability scanner

d. Honeypots

e. Protocol analyzer

f. Viruses

g. Honeynets

Answer:

f. Viruses

Explanation:

Different network scenarios require the use of different tools. The tools you may consider should include:

a. Port scanner: this is a program used by network administrators to scan various application, transport, internet and network ports which may be exploited by hackers or attackers when found vulnerable.

b. Banner grabbing tools: it is used to gather informations of a computer residing on a network and various services running on its open ports using telnet, zmap, netcat and nmap.

c. Vulnerability scanner: used for the detection of vulnerabilities in a network or systems.  

d. Honeypots: it is used to detect and redirect or prevent any unauthorized use of information of a network by mimicking the potential target systems.

e. Protocol analyzer: it is used to analyze traffic and packet captures in a network. Software programs such as wireshark, tshark can be used for protocol analysis.

f. Honeynets: is a combination of one or more honeypots used for attracting and trapping potential attackers.

However, a virus is a malicious program that can replicate and cause severe damage to a computer system.

What is the term given to large values of information collected from various sources?

A.
association
B.
classification
C.
neural networks
D.
big data

Answers

The term given to large values of information collected from various sources ; association.

What is the various?

The various can refer to a range of different things, depending on context. It could refer to different types of people, cultures, items, or anything else that can be seen as different or distinct from each other. It could also refer to different ways of looking at or doing something. For example, various methods of problem solving, various approaches to studying, various strategies for communication, etc. Ultimately, the various refers to the different options that exist in a given situation.

To learn more about various

https://brainly.com/question/26986135

#SPJ1

The digital EGR valve used on GM 3800 engines allows for how many different EGR flow rates?

Answers

Answer:

Is this an engine

Explanation:

DONT NEED HELL just showing correct results for future students :)

Use the drop-down menus to complete the steps for adding conditional formatting to a form. 1. Locate the switchboard in the navigation pane under Forms. 2. Open the switchboard in [Design ]view. 3. The conditional tab Form Design Tools will open 4. To edit the font, color, or image, click the conditional tab [ Format]. 5. Make all desired changes using [drop-down menus] the Control Formatting command group 6. Save and close. 7. Reopen in [ Form ] view to see the changes.

DONT NEED HELL just showing correct results for future students :)Use the drop-down menus to complete

Answers

The steps on how complete the steps for adding conditional formatting to a form.

How to do conditional formatting to a form.

Locate the switchboard in the navigation pane under Forms.Open the switchboard in Design view.The conditional formatting tab, Form Design Tools, will open.To edit the font, color, or image, click the conditional formatting tab, Format.Make all desired changes using the drop-down menus in the Control Formatting command group.Save and close the switchboard.Reopen the switchboard in Form view to see the changes reflected.

Read more on conditional formatting https://brainly.com/question/25051360

#SPJ1

Why is flash memory considered nonvolatile?

Answers

Answer:

flash memory is considered non-volitile becuase it does not require power to hold data. thats why its usually used to store the BIOS on a motherboard, which is unlike volitile memory that needs to be powered (like RAM).

Other Questions
Awarding 30 points and brainliest answer!Is it legal to burn an American flag in protest? What constitutional amendment involves such action? When a department in an organization has a high level of absenteeism, we are dealing with:____. How can the effect of radiation on healthy cells be reduced when treating cancer?A. Splitting the radiation into multiple treatments.B. Using metal plating to absorb excess radiation.C. Using less damaging alpha radiation.D. There is no way to reduce the negative side effects. One way that regulation is often studied is by examining the effects of mutations. For example, mutations within the parts of the lac operon have been well studied. Which of these mutants would be considered a constitutive mutant?. Following are the transactions of a new company called Pose-for-Pics. Aug. 1 Madison Harris, the owner, invested $6,600 cash and $33,600 of photography equipment in the company in exchange for common stock. 2 The company paid $2,200 cash for an insurance policy covering the next 24 months. 5 The company purchased office supplies for $890 cash. 20 The company received $3,431 cash in photography fees earned. 31 The company paid $685 cash for August utilities. When a 24000-kg fighter airplane lands on the deck of the aircraft carrier, the carrier sinks 0.27 cm deeper into the water. Determine the cross-sectional area of the carrier. Assume the density of seawater is 1025 kg/m3. Express your answer to two significant figures and include the appropriate units. A 20-foot ladder is used to scale a 16-foot wall. At what angle of elevation must the ladder be situated in order to reach the top of the wall? (round to the nearest tenth) what is the least number of unit cubes you could use to create an uppercase letter E How do I make this sentence better? how far is the puddle from his house What law signed by President Roosevelt was influenced by the TownsendPlan? Which lines best complete the sentence? Select 3 options. Grendel, by John Gardner, is written in first person to show a single perspective. to tell an old story from a new point of view. so that Beowulfs feelings can be understood. with Grendel acting as a first-person narrator. using first person to show Hrothgars perspective. Solve for nN=5(a-3h^2) which acid has the strongest conjugate base in aqueous solution?A) HF B) HNO3 C) HCIO4 D) HI E) H2SO4 what is the pronoun(s) in the sentence, Se la estamos sirviendo What is the exact volume of the cone?A 80 ftB 4003 ftC 400 ftD 418710 ft What is the solution to A=7x+40 Who is first president of Ethiopia A. Abiy.Ahamed. B. melesZenawi.. C Mengstu Hayilemaryam According to einsteins theory of relativity, what happens to the mass of an object as the object approaches the speed of light? Both the demand curve and the supply curve are straight lines. If the price is $4 but only 6 units are bought and sold, consumer surplus will be.