1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
9

Improving Writing Techniques

Computers and Technology
1 answer:
klemol [59]3 years ago
6 0

Answer:

Explanation:

ERROR IDENTIFICATION:

Sentence 1 =>  The error is option D - Dangling Modifier.

As it is not clear from the sentence whether Sharon was walking down the hall of her folders.

Sentence 2 =>  The error is option B - Lack of Parallelism.

Correct form should be <em>"We will be visiting our accounts in California, Oregon, and Washington."</em> Repeating the same information that has already been provided is not good.

ACTIVE PASSIVE VOICE:

Scenario 1 => Sentence is in <u>active voice</u> and <u>is not appropriate</u> for this situation.

Use of passive voice will be correct as we want to highlight the fact that an error has been made rather than who made the error.

Scenario 2 => Option B.

This choice is right because it first points out to a reference from a credible source about why an action is being taken and then defines that action.

You might be interested in
Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
PtichkaEL [24]

Answer: 3 bytes

Explanation:

A Pixel uses 3 colors and each of these colors uses 8 bits to store their intensity.

One pixel will therefore have:

= 8 * 3

= 24 bits

1 byte = 8 bits

24 bits will therefore be:

= 24/8

= 3 bytes

6 0
3 years ago
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
Bess [88]

Answer:

Nmap CST CO CT0

Explanation:

Network map (Nmap) is a network scanning and host detection tool used in penetration testing to sorting out vulnerability in a network. Nmap APIs are used in packet sniffer tools as well to scan for available networks. There are different nmap command , but the command needed to scan a port with less noise to evade an IDS is the nmap's "Nmap CST CO CT0" command.

5 0
4 years ago
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
If you are trying to photograph a house that is on sale how are you most likely to photograph it?
Lady bird [3.3K]

Answer:

Take multiple pictures

Explanation: The more picture you have will in turn help you sell the house because different people have different questions which means a variety of pictures can help to answer those questions.

7 0
3 years ago
7.12 LAB: Even/odd values in a list
Korvikt [17]

The odd values in a list can be calculated by knowing the first and last number, whereas even numbers can be divided by two and the remainder is zero (0).

<h3>What are even numbers and odd numbers?</h3>

The even numbers can be found in a list because they are divisible by two and the remainder of this equation is always zero (0).

Conversely, odd numbers are those that cannot be divided exactly into exact entire numbers (e.g., 3, 5, etc).

The odd numbers in a list can be calculated by the equation ON (odd numbers): n/2 × [f + g], where 'f' is the first number and 'g' is the last number.

In conclusion, the odd values in a list can be calculated by knowing the first and last number, whereas even numbers can be divided by two and the remainder is 0.

Learn more about odd numbers here:

brainly.com/question/2263958

#SPJ1

4 0
2 years ago
Other questions:
  • Can the redirection shell metacharacter be used to redirect between a command and another command?
    8·1 answer
  • Which of the following describes a poor design consideration for a form?
    14·1 answer
  • What does GPA mean? Please tell me!
    13·2 answers
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Ssume that the timeout values for all three protocols
    8·1 answer
  • How long does it take to wash 12 t-shirts in the quickest way?​
    15·2 answers
  • A photographer is reading about how to ensure a high-quality photographic print. Which statements convey the best way to ensure
    5·1 answer
  • What is multimedia computer system​
    7·1 answer
  • Write features of Fifth Generation of computer?​
    12·2 answers
  • Which prefix indicates you are browsing a secure webpage
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!