Answer:
Cooking
Explanation:
Cooking and baking would be the easiest answer to come up with. It's the most practical thing that you would be measuring liquids and solids for. For example, you should measure how much water or flour you use when making food. Try and think of a time you may have used a measuring cup of some sort.
An example of using household measuring system could be; measuring out 1/4 cup of flour for a recipe.
What are household measuring system?The household measuring system is a system of measurement used for cooking and baking. It typically includes units such as cups, tablespoons, teaspoons, and fluid ounces to measure liquids and units such as cups, ounces, and pounds to measure solids.
This system is commonly used in the United States and it is based on the imperial system of measurement. Examples of using household measuring system are: measuring out 1/4 cup of sugar for a cake recipe, measuring out 2 tablespoons of butter for cookies, measuring out 1/2 cup of milk for a pancake mix, measuring out 1 teaspoon of salt for a soup recipe.
Learn more about household measuring system, here:
https://brainly.com/question/28433309
#SPJ2
Which option is most likely used to create many-to-many relationships in Access?
inner join
outer join
junction table
parameterized query
Answer:
Junction table.
Explanation:
Junction table is most likely used to create many-to-many relationships in Access.
A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.
Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.
In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.
Answer:
c
Explanation:
Which language is an example of a fifth-generation language?
Which one of the following options is incorrect in Presenter View?
Move to the previous or next slide
View all the slides
Hide or unhide the current slide
Writing option not available
Answer:
Writing option not available
Explanation:
What symbols are used with HTML tags?
A) ()
B) []
C) {}
D) <>
Answer:
C?
Explanation:
Answer:
D.
Explanation:
HTML uses <> as tags, example: <p> designates a paragraph.
Which of the following geometric objects occupy two dimensions?
Check all that apply.
A. Pyramid
B. Ray
O C. Line
D. Cube
E. Triangle
F. Plane
Answer:
E. Triangle
Explanation:
It's E, and F
A Pyramid is 3D
A Ray is 1D
A Line is 1D
A Cube is 3D
A Triangle is 2D
A Plane Is 2D
The two-dimensional objects are (e) triangle and (f) plane
How to determine the geometric objects?Two-dimensional objects are object that have a flat surface, and they extend in two directions i.e. the x and y axes.
As a general rule, two-dimensional objects are represented by flat surface.
From the list of given options, the two-dimensional objects are (e) triangle and (f) plane
Others are either one-dimensional objects or three-dimensional objects
Read more about geometric objects at:
https://brainly.com/question/12280037
#SPJ2
How will you reduce the risk of an collision?
A. By always driving with an adult.
B. By becoming more familiar with how your vehicle operates.
C. By playing more video games to keep you sharp.
Answer:
B
Explanation:
you want to be familiar with the vehicle you are operating such as braking, accelerating, blinkers etc.
four major parts of the keyboard
Answer:
alphabetical keys, function keys, cursor keys, and the numeric keypad
Explanation:
Answer:
Pretty much all of the keys on the keyboard are important. Also the touch pad.
By using your own data, search engines and other sites try to make your web
experience more personalized. However, by doing this, certain information is being
hidden from you. Which of the following terms is used to describe the virtual
environment a person ends up in when sites choose to show them only certain,
customized information?
A)A relational table
B)A clustered circle
C)A filter bubble
D)An indexed environment
Answer: Answer D, An indexed environment.
What means of preventing security breaches would you expect to find in a network which has attempted to provide protection from hackers and other external security threats?
Answer:
a firewall
Explanation:
a firewall is a way programmers can attempt to stop breaches, however every code has a zero day. (a bug that had zero days spent fixing it) even Microsoft had a couple zero days
Is it possible to increase watch hours for a channel by making a playlist out of your videos for people to watch? Will it boost your watch hours?
Answer:
It depends on the person watching
Explanation:
The video that the person is watching has to watched in order for it to count towards your watched hours if one of the videos in that playlist are watched it will get those hours but on the video that has not been watched it will not count it.
*URGENT!!* *100 POINTS!**9 questions for 100 points*
You are the operator of a small golf and ski shop (Sam’s Golf & Ski) that generates a profit of $70,000 on sales of $255,000 per year. You have been very successful with your 3-year-old business and have met all of your obligations on a timely basis. Your ultimate goal has been to rename your business Sam’s Sports Emporium (SSE) and carry most of the popular recreational sports items at multiple outlets within your state. You have been working on a business plan to present to the bank in order to secure funding and make your dream a reality. As part of your business plan, you need to address the information needs of your proposed business.
2.) identify the IS components needed for SSE. When you explain them, use terms SSE would use.
Hint: What types of communication technology, software, hardware, data
procedures, and people?
3.) how would perform an Industry Analysis on the sporting goods industry as a whole?
Hint: Use Porter’s Five Forces to guide you.
4.) what competitive strategy you would use for SSE based on the Industry Analysis you write wrote about in #2.
5.)discuss systems needed for SSE.
Hint: EES for accounting, etc.
6.) identify the databases needed for SSE and explain why they are needed.
Hint: What type of DBMS? What kind of information would you keep in your
database?
7.)identifying the methodology to use for developing the system(s) for SSE and justify your selection.
Hint: Prototyping
8.) what type of system (functional or cross-functional) is needed and explain.
Hint: Supply chain management, sales transactions updates, etc.
9.)that states what your company ethics policy is.
Hint: What would you include in your company’s ethics policy?
Answer:last day of school
Explanation:
sorry, im looking for it as well
What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while also ensuring that those changes are tracked and coauthoring can occur?
Save to removable media.
Email the file.
Store on OneDrive and share.
Make a second copy of the file.
Answer:
Store on OneDrive and share.
Explanation:
Store on OneDrive and share is when coauthoring can occur.
What is One drive?OneDrive is a Microsoft online cloud storage platform. When saving documents.
OneDrive is integrated with Windows 11 and provides users with Microsoft accounts with five gigabytes of free storage space before offering upgrade alternatives.
Users of OneDrive can store files, pictures, and other documents on a variety of devices. The ability to save files in OneDrive and have them automatically sync to other devices is now available. This implies that a person can use several places to access and edit the same document.
Therefore, Store on OneDrive and share is when coauthoring can occur.
To learn more about One drive, refer to the link:
https://brainly.com/question/3733676
#SPJ3
Identify the equation that translates Y = In(x) five units down.
why would you use a custom filter?
Answer:By specifying conditions, you can create custom filters that narrow down the data in the exact way that you want. You do this by building a filter. If you've ever queried data in a database, this will look familiar to you. Point to either Number Filters or Text Filters in the list.
Explanation:
Tommy has hired a marketing company to create a billboard advertisement
for his company. So far, the message billboard contains exciting graphics, a
short description of the company and its services, and the contact
information. Which element of effective advertisement is Tommy missing?
Answer:
the billboard is missing a call to action!
Explanation:
It has exciting graphics and appropriate information.
The element that Tommy missing in the effective advertisement is the call to action.
What is the call to action?Any design intended to elicit an immediate response or promote an immediate sale is referred as in marketing as a “call to action.” A call to action (CTA) is most frequently used to describe the usage of words or phrases that may be inserted into sales scripts, advertising messages, or web sites and that urge an audience to behave in a certain way.
The message's call to action is the section that instructs your audience on what to do. If stated properly, it also motivates people to take action.
Therefore, it is call to action.
Learn more about the advertisement, refer to:
https://brainly.com/question/3163475
#SPJ2
What's a good drawing tablet?
Answer:
Wacom Intuos S
Explanation:
If you're looking for a good tablet that isn't too expensive the Wacom Intuos S is a great starter, I personally use it and really enjoy it. It doesn't have a graphic screen. If you're looking for one with a graphic screen get the Wacom Cintiq 22, It's expensive but great quality. Most tablets with a graphic screen are this expensive though. But if you REALLY want one with a graphic screen that isn't TOO expensive I recommend the HUION Kamvas pro 12.
Hope I could help!
Answer:
My recommended one is
Xp-Pen Artist 12 Drawing tablet
Explanation:
A good drawing tablet is a tablet where you can draw high quality drawings If you are an artist.
Which of the following describes an executive information system (EIS)?
A. Uses the Internet only for data analysis
B. Analyzes internal and external data sources
C. Reveals results broken down into time periods
D. Provides business performance reports
The executive information system (EIS) is used to Analyzes internal and external data sources.
What is an EIS in information management?An executive information system (EIS) is known to be a toll that helps to give important information, that is obtained from internal and external sources.
Therefore, one can say that The executive information system (EIS) is used to Analyzes internal and external data sources to executives.
Learn more about data sources from
https://brainly.com/question/26711803
#SPJ2
What is the purpose of lookup tables in spreadsheet software?
A. They allow the user to retrieve information from another location
in a table.
B. They allow the user to lock cells that contain information that
remains consistent.
C. They allow the user to create a graphic representation of a
selected table.
D. They allow the user to convert foreign currencies.
Answer:
A. They allow the user to retrieve information from another location
in a table.
Explanation:
The purpose of lookup tables in a spreadsheet software is that: A. they allow the user to retrieve information from another location in a table.
What is a spreadsheet software?A spreadsheet software refers to a type of software program which is typically designed and develop with cells that are arranged in a tabulated format in rows and columns, so as to do the following on a data:
SortCalculateFormatArrangeIn conclusion, the purpose of lookup tables in a spreadsheet software such as Microsoft Excel is that they allow end users to retrieve information from another location in a table.
Read more on spreadsheets here: https://brainly.com/question/4965119
#SPJ2
Describe two measures that a school could take to ensure the security of the school network.
Answer:
Having a proper firewall that could prevent cyber attacks against black hat hackers, And having good cyber team that has had extensive training and know hows the network operates to ensure smooth sailing for the workers and students. (extra) Ensuring your staff understands the cyber war and knows not to click on malicious links that could allow a cyber crminal in to the network.
Explanation:
BlackHat- Individual that uses his knowlage of computers for malicious use.
Firewall- Enitial intrance into a computer it is a piece of software that have expressions to ensure you are only getting traffic that you have specified on the system and not allowing all traffic on all ports
Bookmarks can be added to a browser to quickly find favorite websites
Answer:
Yes.
Explanation:
Bookmarks can be added to a browser to quickly find favorite websites.
Four friends bought three same-sized pizzas for dinner.
Kesha ate 3/4 of a pizza.
Samuel ate 1/2 of a pizza.
Jaxson ate 5/8 of a pizza.
Luann ate the rest of the pizza.
How much pizza did Luann eat?
Answer:
9/8 of a pizza
Explanation:
3/4 -> 6/8
1/2 -> 4/8
5/8 -> 5/8
We can now add all of these:
6/8 + 4/8 + 5/8 = 15/8
The total amount of pizza is 24/8 because there are 3 pizzas.
24/8 - 15/8 = 9/8
Which type of operating system is usually used in personal computers?
A [blank] operating system is usually used in personal computers
Answer:
A GUI based operating system is usually used in personal computers
Explanation:
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
The type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
What is the Operating system?An operating system may be defined as s type of system software that significantly regulates all sorts of hardware and software resources of the computer and provides common services for computer programs.
According to the context of this question, the three most fundamental operating systems for personal computers may include Microsoft Windows, macOS, and Linux.
All of these operating systems generally are graphical user interface (GUI) based. These are powerful and extensively used a program that controls and manages the hardware and other software on a computer.
Therefore, the type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
To learn more about Operating systems, refer to the link:
https://brainly.com/question/22811693
#SPJ2
Your question seems incomplete. The most probable complete question is as follows:
Which type of operating system is usually used in personal computers?
Microsoft Windows.UNIX.LINUX.Type the correct answer in the box. Spell all words correctly.
What will happen if there is an imbalance in the presentation of the content on a website?
An imbalance in the presentation of the content can decrease the _____
of a website.
Answer:
Traffic
Explanation:
Answer:
visual appeal
Explanation:
I had just taken this test on Edmentum and gotten it correct. if you review the lesson youd see the answer.
(please give me brainlist)
5
Type the correct answer in the box. Spell the word correctly.
What aspect should you consider before adding pictures to a document?
You should structure the
first before you search for a relevant picture.
Reset
Next
Answer:
Document
Explanation:
Document because after you structure your document together the way you like you can add pictures.
Answer:
I think is tvibl irqfijqbiwnkefw (Document)
Explanation:
is the answer of plato
Please hurry
Question 6 of 10
Who is most likely able to help you accomplish goals?
Teachers
Parents or caregivers
Friends
All of the above
Answer:
All of the above
Explanation:
Answer: all of the above!
Explanation: brainliest? <3.
how do i end my current plan that i never signed up for, the basic one it charged me $24
Answer:
...
Explanation:
I think you need to call the brainly HQ other then that i don't know.
Which technique will game developers use to provide more immersive simulations in future games?
A.
computer-hand interfaces
B.
brain-hand interfaces
C.
computer-technology interfaces
D.
brain-computer interfaces
Answer:
brain-computer interfaces
Explanation:
Digital signatures are as legally acceptable as written signatures.
Digital signatures contain information such as birth date and Social Security number.
Digital signatures can be retrieved easily if they are lost.
Digital signatures show the handwriting of the signer as physical verification.
What is an advantage of using digital signatures?
Answer:
First point and the last point are the correct answer to the given question .
Explanation:
The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.
Following are the advantages of the digital signature
As compare to the electronic signature the digital signature is more secure then that of.The signer's signature is seen on the digital signatures as the physical proof.Global recognition, and the compliance with the law.All the other options are incorrect they are not advantage of the digital signature .
What is the difference between primary memory and the secondary memory?
Answer:
Computer memory is categorized into primary and secondary memory. While primary memory is the main memory of the computer which is used to store data or information temporarily, whereas secondary memory refers to external storage devices that are used to store data or information permanently.
Explanation:
Answer:
Explanation:
Difference between Primary Memory and Secondary Memory Primary is when a computer which can be directly accessed by the central processing unit, where as secondary memory refers to the external storage
Does -8 = -21?
[this is NOT a trick question]
Yes....?
No!
Answer:
No.
Explanation:
From my knowledge, negative 8 is 8 units to the left of zero, while 21 is 21 units to the left.
This means that they are two different negative numbers! If you see an equation like this, it would be labeled as false.
I'm quite sure I am correct, tell me so if otherwise! :)
#SpreadTheLove
Answer:
No
Explanation: