Does technology need to be kept alive?

Answers

Answer 1

Answer:

Explanation:

well we don’t need it we just use it =) hope it helps

Answer 2

Answer:

Probably not because people before us have lived without it.

Explanation:

But of course technology is extremely helpful!

Hopefully this helps you

- Matthew <3


Related Questions

When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of the blank
.

Answers

Answer:

The price of a commodity is determined by supply and demand. therefore the answer is COMMODITY. that other person is wrong

Answer:  The correct answer is Commodity

Explanation:  This answer is confirmed correct.

Commodity pricing is established based on supply and demand.

when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloaded off the internet

Answers

short answer yes. kinda long answer people can scan the photo and easily see or they can just look up the same image

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

What is the main device used on fourth generation computer​

Answers

Answer: Microprocessors were used to create the fourth generation of computers. In 1971, Intel built the first microprocessor, the 4004 chip.

Explanation: The microprocessor is a silicon chip with millions of transistors built using LSI and VLSI technologies.

hope this helps best of luck mate! :)

Which of these is NOT a part of the organizational change model used to support change management for Information security requirements. a. freezing b. unfreezing c. moving d. security training

Answers

The organizational change model used to support change management for Information security requirements typically involves three stages: unfreezing, moving, and refreezing. The option that is NOT part of this model is (a) freezing.

Unfreezing (b) is the first stage, where the organization acknowledges the need for change and begins to prepare for it. This involves breaking down existing structures, beliefs, and habits to create a sense of urgency and receptiveness to new ideas.

Moving (c) is the second stage, where the organization implements new processes, systems, and behaviors to address the identified Information security requirements. This stage may involve redefining roles, creating new policies, and incorporating new technologies to improve security.

Refreezing (d) is the final stage, where the organization solidifies the changes and ensures their sustainability. This involves integrating new processes and practices into the organization's culture, as well as providing ongoing support and reinforcement.

Security training, while essential in improving Information security, is not a distinct stage in the organizational change model. It is, however, an important component within the moving stage to help employees adapt to new policies and procedures effectively. Hence, a is the correct option.

You can learn more about organizational change at: brainly.com/question/29764667

#SPJ11

Effective nonverbal communication can cause tension.

True or False

Answers

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

Answer:

False

Explanation:

difference between multi-national and global company​

Answers

Answer:

Multinational Companies

A multinational corporation, is a company which produces goods and services. It has offices in several other countries

Global Companies

global corporation is a company which has trade relations with several other countries.

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

Answers

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

A pre-deployment message appears at the start of a patch job. You have to create a deployment job for a windows user wherein he will receive a notification message to the user indicating that a reboot is required. What communication option will you select?

Answers

Simply select Deployment Job under Jobs > New Job. You can also select the assets you wish to apply the updates on by going to the Assets page.

Which of the following qualys programmes or services allows for the creation of patch jobs?

Qualys Patch Management effectively associates vulnerabilities with fixes and necessary configuration adjustments, and automatically generates "patch jobs" that are prepared for deployment and may be scheduled and executed automatically.

Which approach to patch deployment is advised?

Patching software called Endpoint Central offers a thorough overview of the network's strong and weak points. Desktop administrators can apply all the missing fixes to a particular group of networked systems by using the system-based deployment option.

To know more about assets visit:-

https://brainly.com/question/14434545

#SPJ1

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill's interests and skills?

Answers

Answer:

Emergency and Fire management services

Explanation:

Paramedics are trained to respond to emergency situations faced by the public. These could include, fire incidents, accidents, or other emergency situations. Paramedics are trained to be calm under pressure, to use medical equipment, as well as to have good bedside manners as their jobs might require taking care of victims of various incidents at the spot of crisis, or in ambulances before they arrive the hospitals.

So, Jill is likely interested in a career in Emergency and Fire Management Services because she would require these skills to succeed in this field.

Answer:

Emergency and Fire management services

Explanation:

Rhonda created a table to classify materials that conduct electricity and materials that do not conduct electricity. Which table correctly classifies these materials? (2 points)

A. Materials That Conduct Electricity Materials That Do Not Conduct Electricity
steel plastic
copper glass
gold rubber
aluminum wood

B. Materials That Conduct Electricity
Materials That Do Not Conduct Electricity
steel plastic
gold glass
aluminum rubber
wood copper
C. Materials That Conduct Electricity
Materials That Do Not Conduct Electricity
plastic gold
rubber steel
aluminum glass
wood copper
D. Materials That Conduct Electricity
Materials That Do Not Conduct Electricity
plastic gold
rubber steel
glass aluminum
wood copper

Answers

The table that correctly classify the materials is option A, i.e., materials That Conduct Electricity are steel, copper, gold, and aluminum. The materials that do not conduct electricity are plastic, glass, rubber, and wood.

What are electrical conductors?

A conductor, also known as an electrical conductor, is a material or substance that allows electricity to flow through it.

When a voltage is applied to a conductor, electrical charge carriers, usually electrons or ions, move easily from atom to atom.

Metals such as copper, iron, gold, aluminum, and silver are the best conductors of electricity.

The electrical conductivity of a material is measured using electrodes in a standardized aqueous solution at a specific temperature.

Steel, copper, gold, and aluminum are the materials that conduct electricity. Plastic, glass, rubber, and wood are examples of materials that do not conduct electricity.

Thus, the correct option is A.

For more details regarding electrical conductor, visit:

https://brainly.com/question/10906529

#SPJ1

Briefly, explain the specific functional elements involved in a global logistics process; global networks for shippers and carriers; INCOterms; and critical importance of cargo insurance and liability in global transactions.

Answers

The global logistics process involves various functional elements such as transportation, warehousing, inventory management, and customs compliance. It relies on global networks for shippers and carriers to facilitate the movement of goods.

INCO terms are internationally recognized trade terms that define the responsibilities and obligations of buyers and sellers in global transactions. Cargo insurance and liability are of critical importance in global transactions to protect against loss, damage, or liability during the transportation of goods.

The global logistics process encompasses several functional elements that are essential for the movement of goods across international borders. These elements include transportation, which involves selecting the appropriate mode of transport (such as air, sea, or land) and managing the transportation logistics. Warehousing plays a crucial role in global logistics by providing storage facilities for goods before they are shipped or distributed. Inventory management ensures the availability of goods at the right time and in the right quantity. Customs compliance is vital to ensure that goods comply with customs regulations and requirements in different countries.

Global networks for shippers and carriers are essential for coordinating and managing logistics operations. These networks connect various parties involved in the supply chain, including manufacturers, suppliers, freight forwarders, and transportation providers. They enable efficient communication, collaboration, and tracking of shipments throughout the logistics process.

Incoterms, short for International Commercial Terms, are internationally recognized trade terms that define the obligations, costs, and risks associated with the transportation and delivery of goods. They provide a standardized framework for buyers and sellers to clarify their responsibilities in global transactions.

Cargo insurance and liability are critical aspects of global transactions. Cargo insurance protects against loss, damage, or theft of goods during transportation. It provides financial coverage to compensate for any potential losses. Liability refers to the legal responsibility and potential financial obligations of parties involved in the transportation of goods. Ensuring appropriate cargo insurance and understanding liability issues is crucial to mitigate risks and protect the interests of all parties involved in global transactions.

In summary, the global logistics process involves functional elements such as transportation, warehousing, inventory management, and customs compliance. Global networks facilitate coordination between shippers and carriers. INCOterms define the responsibilities of buyers and sellers in global transactions, and cargo insurance and liability play a vital role in protecting against potential losses and liabilities in the transportation of goods.

Learn more about global logistics here:

https://brainly.com/question/5186018

#SPJ11

a statement in one function can access a local variable in another function. true or false

Answers

False. Local variables are only accessible within the function in which they are defined. They cannot be accessed by statements in other functions.

This is because local variables have a limited scope, meaning they can only be accessed within the block of code they are defined in. When a function is executed, a new namespace is created for it, which includes all the variables defined within that function. Any statement outside of that function cannot access those variables. To access a local variable from another function, it would need to be passed as an argument or defined as a global variable, which is not recommended.

learn more about function here:

https://brainly.com/question/28358915

#SPJ11

Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
Selma is describing

Answers

Answer:

Interrupts.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

The four (4) input-output (I/O) software layers includes the following;

I. User level software: it provides user programs with a simple user interface to perform input and output functions.

II. Device drivers: it controls the input-output (I/O) devices that are connected to a computer system through a wired or wireless connection.

III. Device-independent OS software: it allows for uniform interfacing and buffering for device drivers.

IV. Interrupt drivers (handlers): it is responsible for handling interruptions that occur while using a software on a computer system.

An interrupt is a signal from a program or device connected to a computer and it's typically designed to instruct the operating system (OS) that an event has occurred and requires an attention such as stopping its current activities or processes.

In conclusion, the computer term that Selma is describing is interrupts.

Answer:

Interrupts

Explanation:

Dr Martin Luther King and his followers go to Selma, Alabama to attempt to achieve, through non-violent protest, equal voting rights and abilities for black people. In 1964, Dr. Martin Luther King Jr. of the Southern Christian Leadership Conference (SCLC) accepts his Nobel Peace Prize.

Which statements are true about a database?


A database allows only numeric entries.



You cannot upload image files to a database.



You can enter data based on the defined data type.



You cannot leave a field empty.



A primary key uniquely identifies a record.

Answers

Answer:

You can enter data based on the defined data type.

A primary key uniquely identifies a record.

Explanation:

In a database, you can only enter data that matches the data type you have specified for that field. Therefore, you can enter text in fields with the text data type; numbers in fields with the number data type; or images in fields with the BLOb data type. You can have fields where data entry is optional. A primary key eliminates the chance of duplicate entries of the same record in a table.

FORM ONE HOLIDAY COMPUTER SYSTEMS 1. (a) Define the following terms as used in computing: (2 marks) i). System. ii). Computer system. (b) Differentiate between a Computer and a Computer system. (2 marks)

Answers

A computing system can be defined as a collection of computers and supporting software while a computer system is defined as a set of integrated devices that input, output, process, and store information and data.

Differentiate between a Computer and a Computer system?

A computer can be described as a device that accepts information in the form of digitalized data and manipulates it for results based on a program, software, or instructions on how the information is to be processed.

A computer system can be described as a set of integrated devices that input, output, process, as well as store data. Computer systems can be defined as currently built around at least one digital processing device.

There are 5 hardware components in a computer system: Input, Processing, Output, Storage, and Communication devices.

Learn more about the computer system, here:

https://brainly.com/question/2612067

#SPJ1

Two identical rectangular prisms and a cube are joined. Answer the questions to find the new solid’s surface area

Answers

To find the surface area of the new solid that is formed by joining two identical rectangular prisms and a cube, we need to use the formulas for the surface area of rectangular prisms and a cube. The surface area of the new solid that is formed by joining two identical rectangular prisms and a cube is \(4lw + 4lh + 4wh + 6s^2\).

The surface area of a rectangular prism is 2lw + 2lh + 2wh, where l is the length, w is the width, and h is the height. The surface area of a cube is 6s^2, where s is the length of a side. First, we need to find the surface area of the two identical rectangular prisms. Since they are identical, we can simply find the surface area of one and multiply it by two. So, if the length, width, and height of the rectangular prisms are l, w, and h, respectively, the surface area of the two rectangular prisms is 2(2lw + 2lh + 2wh) = 4lw + 4lh + 4wh. Next, we need to find the surface area of the cube. If the length of a side of the cube is s, the surface area of the cube is \(6s^2\). Finally, we need to add the surface area of the two rectangular prisms and the cube to find the surface area of the new solid. So, the surface area of the new solid is\(4lw + 4lh + 4wh + 6s^2\). Therefore, the surface area of the new solid that is formed by joining two identical rectangular prisms and a cube is \(4lw + 4lh + 4wh + 6s^2\).

Here you can learn more about solid's surface area https://brainly.com/question/9478251

#SPJ11

Which type of interest rate can be adjusted due to changes in the market?
A. Compound interest rate
B. Fixed interest rate
C. Annual percentage rate
D. Variable interest rate

Answers

Answer: fixed intrest rate

Thats your answer hope it helps.

Identify the parts of it, Give at least three web browser that you usually used to visit a website.​

Answers

Answer:

Chrome, Safari, Microsoft Edge

Explanation:

Web browsers such as Chrome, Safari, Microsoft Edge would allow you to visit a website  

Who are the stakeholders and their interests in your decision whether to knowingly download music off of the internet without permission and without paying a royalty in violation of copyright laws? (you need 6 stakeholders and their interests)

Answers

The stakeholders in unauthorized music downloads include musicians, labels, platforms, consumers, enforcement agencies, and ISPs.

What are the interests of key stakeholders in unauthorized music downloads?

In the decision to engage in unauthorized music downloads, there are several stakeholders with distinct interests. Firstly, musicians and artists are directly impacted as their intellectual property is being infringed upon, leading to potential financial losses. They rely on royalties and sales of their music for income and recognition. Secondly, record labels, which invest in the creation and promotion of music, have a stake in protecting their artists' work and ensuring their own profitability.

Streaming platforms also have a significant interest as they operate within the legal framework and often have licensing agreements in place with copyright holders. Unauthorized downloads can undermine their business models and relationships with artists and record labels. Consumers, on the other hand, may be driven by the desire to access music conveniently and at no cost, which conflicts with the interests of other stakeholders.

Copyright enforcement agencies, such as copyright offices and legal organizations, aim to protect the rights of creators and ensure that copyright laws are upheld. Unauthorized downloads pose challenges to their efforts in safeguarding intellectual property rights. Lastly, internet service providers may have an interest in promoting lawful and responsible use of their networks, as they can face legal consequences or reputational damage if their networks are used for illegal activities like copyright infringement.

Learn more about stakeholders

brainly.com/question/31679631

#SPJ11

Look at the following code:
Line 1 public class ClassA
Line 2 {
Line 3 public ClassA() {}
Line 4 public void method1(int a){}
Line 5 }
Line 6 public class ClassB extends ClassA
Line 7 {
Line 8 public ClassB(){}
Line 9 public void method1(int x){}
Line 10 }
Line 11 public class ClassC extends ClassB
Line 12 {
Line 13 public ClassC(){}
Line 14 public void method1(int y){}
Line 15 }
Which method (line number) will be executed as a result of the following statements?
ClassB item1 = new ClassA();
item1.method1(5);

Answers

Answer:

The answer is "There is an error, that's why the program will crash".

Explanation:

In the given program code, three class  "A, B, and C" is defined, and inside the code, all class constructor and a method "method1" is defined, that uses an integer variable in its parameters.

At the last line class B object "item1" is created, that holds the class A instance, and in the next step, method1 is called by accepting integer value. when we create the class B object and convert it into ClassB. it is not possible that's why it will give an error.

did i do this righ? (sequence)

did i do this righ? (sequence)

Answers

YUP YOU DID HAHAHAHA

A(n) _______________ reference is a cell reference whose location remains constant when the formula is copied.

Answers

A "absolute" reference is a cell reference whose location remains constant when the formula is copied.

In spreadsheet software such as Microsoft Excel, cell references are used in formulas to perform calculations based on the values in different cells. By default, when a formula is copied to other cells, the references within the formula are adjusted relative to the new location. However, an absolute reference is a type of cell reference that remains fixed or constant when the formula is copied. It is denoted by using a dollar sign ($) before the column letter and/or row number. For example, "$A$1" represents an absolute reference to cell A1.

When a formula contains an absolute reference, the referenced cell remains the same regardless of where the formula is copied or filled. This allows users to refer to a specific cell or range of cells consistently, even when the formula is used in different locations. Absolute references are particularly useful when working with formulas that need to reference specific cells or when creating calculations that should not change their reference when copied to different locations within a spreadsheet.

Learn more about Excel here: https://brainly.com/question/30763191

#SPJ11

Which standard supports a throughput of up to 39.8 Gbps? A. ISDN B. VDSL C. SONET D. MPLS.

Answers

Among the given options, the standard that supports a throughput of up to 39.8 Gbps is C. SONET (Synchronous Optical Networking). SONET is a widely used standard for high-speed optical communication networks.

It provides a flexible and scalable framework for transporting digital signals over optical fibers.

SONET supports various data rates, including OC-768, which provides a maximum throughput of 39.8 Gbps. OC-768 is the highest data rate in the SONET hierarchy and is used for ultra-high-speed communication networks.

In contrast, the other options do not support such high data rates:

A. ISDN (Integrated Services Digital Network) typically supports data rates up to 128 Kbps or 2 Mbps, depending on the specific ISDN variant.

B. VDSL (Very High Bit Rate Digital Subscriber Line) supports data rates up to several hundred Mbps, but not as high as 39.8 Gbps.

D. MPLS (Multiprotocol Label Switching) is a routing technique used to improve the efficiency and performance of network traffic but does not define specific data rate capabilities.

Therefore, the correct answer is C. SONET.

Learn more about SONET here -: brainly.com/question/14019698

#SPJ11

Kindles use E-ink technology to display text and images. This technology works by charged pigment spheres migrating across a capsule, bound by electrodes in each pixel. For more information, visit the E-ink website and look at the two-pigment ink system example. When 'flipping pages', the response time of Kindles is discernible. Calculate a) this response time given the assumptions below and b) how does your answer change if the Kindle is facing down instead of up? What does this tell you about the magnitude of the electrostatic force compared to gravitational force acting on the little pigment spheres? - the Kindle is horizontal to ground, facing up so forces act in only one coordinate - steadystate - creeping flow / Stokes regime - D
P

=1.0μm - electrodes are 0.1 mm apart - uniform field across the capsule with V=50 V - fluid in the capsule has viscosity 0.02cP - fluid specific gravity << pigment specific gravity - assume le charge on each pigment sphere - assume pigment sphere specific gravity =1.0

Answers

a) The response time of the kindle is 8.85 seconds when it's horizontal to ground and facing up.

b) The response time of the kindle is not going to change if the Kindle is facing down instead of up as the magnitude of the electrostatic force is much greater than the gravitational force acting on the little pigment spheres.

P=1.0μm,

electrodes=0.1mm,

V=50V,

fluid viscosity=0.02cP,

charges on each pigment sphere and pigment specific gravity=1.0.

Using the creeping flow/Stokes regime for a spherical body (the pigment sphere) of diameter P and density ρP, the settling velocity, v can be calculated by the equation,v= 2/9 (ρP- ρF) g P² / η

Where, ρF= density of the fluid

η=viscosity of the fluid

g=gravitational acceleration=9.81m/s²=9810mm/s².

Using these values,v = 2/9 (ρP-ρF) (9810mm/s²) P² / η

Again, the settling velocity is equal to the distance (P) over the response time (t), so that response time, t = P/v.

Substituting the values,v = 2/9 (1.0g/mL-0.002g/mL) (9810mm/s²) (1x10^-6m)² / (0.02 x 10^-3 Pa s)= 1.13 x 10^-4 mm/s.

Using v, the response time, t is :-  t = P/v = (1 x 10^-6 m) / (1.13 x 10^-4 mm/s) = 8.85 s.

The response time of the kindle is 8.85 seconds when kindle is horizontal to ground and facing up.

Learn about the differences between the electrostatic and gravitational forces here : https://brainly.com/question/16345866

#SPJ11

The technical problem/fix analysts are usually:a.experts.b.testers.c.engineers.d.All of these are correct

Answers

The technical problem/fix analysts can be experts, testers, engineers, or a combination of these roles.

Technical problem/fix analysts can encompass a variety of roles, and all of the options mentioned (experts, testers, engineers) are correct. Let's break down each role:

1. Experts: Technical problem/fix analysts can be experts in their respective fields, possessing in-depth knowledge and experience related to the systems or technologies they are working with. They are well-versed in troubleshooting and identifying solutions for complex technical issues.

2. Testers: Technical problem/fix analysts often perform testing activities as part of their responsibilities. They validate and verify the functionality of systems or software, ensuring that fixes or solutions effectively address identified problems. Testers play a crucial role in identifying bugs, glitches, or other issues that need to be addressed.

3. Engineers: Technical problem/fix analysts can also be engineers who specialize in problem-solving and developing solutions. They apply their engineering knowledge and skills to analyze and resolve technical issues, using their expertise to implement effective fixes or improvements.

In practice, technical problem/fix analysts may encompass a combination of these roles. They bring together their expertise, testing abilities, and engineering skills to analyze, diagnose, and resolve technical problems, ultimately ensuring that systems and technologies are functioning optimally.

Learn more about Technical analysts here:

https://brainly.com/question/23862732

#SPJ11

you have written a set of functions that are stored in the .funcs file. how can you use the functions in this file in scripts that you write? (choose all that apply.)

Answers

In order to use the functions included in the '.funcs' file in a script, you can modify either your login script or your scripts to load the '.func' function into memory. Therefore, options B and D hold the correct answers.

In the context of computer programming, a script is a  sequence of instructions or a program that executes without being complied.

Based on the case where you save a set of sorted functions in the '.funcs' file for using them in the future. Whenever you need to have access to these saved functions to write them in scripts:

you can modify your login script so that the log script loads the '.funcs' functions into memory or you can change your scripts so that the scripts load '.funcs' into memory.

"

The complete question is as follows:

you have written a set of functions that are stored in the .funcs file. how can you use the functions in this file in scripts that you write? (choose all that apply.)

A. By calling this file .funcs, the functions in the file are automatically available whenever you log in.

B. Modify your login script, so the login script loads the .funcs functions into memory.

C. Use the call scripts .func command in your scripts.

D. Modify your scripts so that they load .funcs into memory.

"

You can learn more about Scripts at

https://brainly.com/question/26121358

#SPJ4

You received $50 as a birthday gift and chose to spend it on new wallpaper for your room. The opportunity cost of this decision is:

Answers

Answer:

.......-_-.........heheh

What do you use to create a chart 1?

Answers

You'll look into a group of environmental activists. Your research on the environmental heroes will be shared. Maps, organizational charts, graphs, images, hand-drawn graphics, audio, and video are a few examples of many media forms.

Writing a reflection paragraph and sharing what you discovered about incorporating images with your words by selecting two media forms to add with your paragraph are two ways to complete the Anyone Can Be One homework. Conduct research on one of these environmental advocacy groups. You are invited to look into another environmental group that defends an issue that interests you personally. (Right-click the following link, and then use the links on the final page of the 4.04 lesson OR open the URL. Answer the crucial questions below by visiting the organization's website and applying your sleuthing abilities. The "About" or "Our Mission" sections of the website may provide some crucial information. Write the data you gathered throughout your investigation in your own words. Do not directly quote your source. Putting a notion into your own words is simple!

Learn more about Paragraph tab here:

https://brainly.com/question/27816302

#SPJ4

Which among the following is a collaboration tool that allows users to stay updated on topics of interest?
A browser cookie
A browser cookie
Really Simple Syndication
Desktop sharing

Answers

The collaboration tool that allows users to stay updated on topics of interest is Really Simple Syndication.

What is Really Simple Syndication?

It should be note that Users and programs can obtain website changes in a standardized, computer-readable format through RSS, a type of web feed.

Real Simple Syndication, or RSS, is a web feed format for constantly updated content like blog posts, news headlines, the newest homes and cars, etc. in a uniform format.

Learn more about tool at;

https://brainly.com/question/25898149

#SPJ1

Other Questions
____ flow sensors operate on the principle that when a moving liquid strikes an object, a swirling current is created. ActivityIn this activity, you will examine the difference between opinions, facts, theories, and laws. To do so, examine the tablebelow. Carefully read each example in the table before answering the questions thatfollow. How can Texas belocated in both theNorthern Hemisphereand the WesternHemisphere? MARKING PEOPLE AS BRAINLIST LOTS OF POINTS 4. Can humans be affected by population growth limitations?How? Proteins on the surface of vesicles determine where the vesicles go. Which cell organelle provides the instructions for these proteins?A. endoplasmic reticulumB. lysosomeC. mitochondriaD. nucleus in an inductive argument, it is intended that the conclusion contain more information than the premises. The cost of a plane ticket varies directly as the number of miles in the trip. A 3000 mile trip costs $400. What is the cost of a 450 mile trip How many milliliters of a 0.900% (m/v) normal saline solution can be prepared from 3.50 g of sodium chloride, NaCl Ancient Egyptians originally buried their dead in the The ________ gland secretes epinephrine.a. adrenalb. thyroidc. pituitaryd. master When you combine baking soda and vinegar in a container, producing many bubbles and making the substance overflow. What do you think will happen if you try the experiment again using orange juice, a weaker acid instead of vinegar?(Help me pls)I will mark you brainiest please help ill mark Suppose that Daniel has a 2.50 L bottle that contains a mixture of O2 , N2 , and CO2 under a total pressure of 5.20 atm. He knows that the mixture contains 0.270 mol N2 and that the partial pressure of CO2 is 0.350 atm. If the temperature is 273 K, what is the partial pressure of O2 How has the poison changed the concentration of pyruvate, NADH and intermembrane H in Jared's cells? Writing an equation of a hyperbola given the Foci and asymptotes in the 1920s, who is able to attend collage? When i look back on the decisions i've made, it's clear that i made some of my best choices not through a thorough analytical investigation of my options, but instead by trial and error and, often, simply by accident. the somewhat random aspect of my success or failure is, at the same time, both encouraging and scary? Please choose one example of rhetoric from one of the following texts to share with your classmates: Patrick Henry's "Speech to Virginia Convention" Thomas Paine's Common Sense Thomas Paine's "Crisis No. 1" The point on a lean strategy is to have a logical and well-planned process of deploying lean _____________, which leads to lean ____________________ and finally lean ______________. a. tools, systems, value stream b. principles, tools, results c. kaizen, systems, organization Determine which expression is a factor of the fourth term in the expansion of the expression below, given that z is an integer and z > 4. (x^4 + y^7)^z A. B. C. D