1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
8

How does and employer judge a candidate

Computers and Technology
1 answer:
nlexa [21]3 years ago
6 0

Answer:

Explanation:

An employer can judge a candidate from these factors.

1) Confidence Level

2) Way of talking

3) Written or screening test

4) Experience Level

5) Resume

You might be interested in
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
Doss [256]

Answer:

def filter_strings(data_list):

   string_list = []

   for s in data_list:

       if type(s) == str and len(s) > 5:

           string_list.append(s)

   return string_list

Explanation:

Create a function called filter_strings that takes data_list as a parameter

Initialize a new list to hold the strings that are longer than 5 characters

Initialize a for loop that iterates through the data_list

Check the elements if they are string - use type function, and if their length is greater than 5 - use len function. If an element satisfies the both conditions, put it to the string_list

When the loop is done, return the string_list

6 0
3 years ago
Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
marta [7]
The answer is C because he'll be able to search up the employees name then it will tell him all the information he needs along with their job profile
6 0
4 years ago
What kind of network connection do you think is used to connect most wireless video game controllers to consoles, and why would
Ostrovityanka [42]

Answer:

I would say Lan

Explanation:

5 0
3 years ago
A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
Darya [45]

Answer:

nslookup is the correct answer to the following question.

Explanation:

The following answer is correct because It is the tool or the utility of the command line by which an administrator to query a DNS(Domain Name System) for finding the domain name or the Internet Protocol address or many other records.

<u>Steps to use nslookup:</u>

  • Firstly, you have to press the window key + R to open run.
  • Then, you have to type cmd in it and press enter.
  • Then, cmd will appear after that, you have to type the command 'nslookup' and then press enter.
  • Then, it shows the default server name and ip address after that, you have to type an ip address of DNS server.
  • Then, you have to type 'set' then type q=M X and then press enter
  • Then, you have to type the name of your domain then, press enter key.

7 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
3 years ago
Other questions:
  • While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
    8·1 answer
  • ____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
    15·1 answer
  • Explain the use of keyboard shortcuts and key combinations. You are at the tenth page of a 20-page document. You need to make ch
    14·1 answer
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • Dave has to create animations for a game. Which tool can Dave use?
    6·1 answer
  • Player casts 'Assassinate' on 'Acolyte of pain'. Acolyte's owner will:
    6·2 answers
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • Which precaution should you take while working on a computer
    9·1 answer
  • As we’ve discussed, computer programs are considered creative works and are protected by copyright. That means those programs be
    12·1 answer
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!