1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
4 years ago
14

The bantu and arabic languages blended, creating what new language?

Computers and Technology
2 answers:
nasty-shy [4]4 years ago
8 0

Swahili....333333333333333

Anon25 [30]4 years ago
5 0
The answer is swahili

Basically, the Swahili language is of an African Bantu origin with borrowed words from other languages like Arabic. It dates back to the interactions between the Arabian traders and the inhabitants of the east coast of Africa. The language was often thought to be an interaction between Bantus and Arabs. Arab cultures had a huge influence on the Swahili language.




You might be interested in
Suppose that you have been asked to create an information system for a manufacturing plant that produces nuts and bolts of many
maksim [4K]

Answer:

Following are the solution to this question:

Explanation:

In essence, both issues (relevant) were addressed, that form the design of the system, and all of the information collected and during initial analysis along with all subsequent stages will, in turn, affect the design of the system. Being aware, that perhaps the data is obtained to establish the entities, attributes, or relations. In particular, partnerships, clearly outline, or cardinal-ties are shaped by company policies derived from the creator's information. Example problems and the probable effects on the layout may be:

It will create the file concurrently for all depts, or would like to build and execute the database simultaneously with one dept?  

How would the work be to design affect the development process? In other terms, determine the range of the system as well  

as its limits about the bottom-up, centralized, or decentralized.

Do you want, and would you like an integrated framework to develop a single module? (Inventory, production, shipping, billing, etc.)  

Would you like a product code, output change, and form of controlling the bolts and bolts and dept? Impact: design of the logical and physical server.  

Perhaps you'd like to monitor the sources of every lot a raw resources for the nuts and bolts manufacturing? Impact: design of the logical and physical server. Model E-R.  

Perhaps you'd like to monitor consumers receiving shipments of bolts and nuts? Impact: design of the logical and physical database. ER model.  

Its documents will you demand, or to whom can these documents be transmitted? What specific reporting requirements?  

Reactions to such concerns relate to the design, execution, testing, or subsequent functioning of the logical and physical system.

8 0
3 years ago
HELLLPPPPPP For each of the following discussion questions, write a response in complete sentences. Your response should be at l
zzz [600]

Answer:

Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Budget-priced camera cases might not be sealed perfectly, making it easier for grit and sand to penetrate the case and cause damage. Gently blow out the grit and sand to avoid this problem. Use care when shooting photos on a windy day at the beach, too, where sand can blow with excessive force. Avoid opening the battery compartment on such days.

Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case.

Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips.

The lens and sun don't mix. Do not point your camera's lens directly at the sun for any length of time, especially with a DSLR camera. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera.

Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. In fact, other than stubborn smudges, you should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera.

Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera.

Watch the temperature. Although some cameras are designed to survive harsh temperatures, most cameras are not. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD.

Use neck straps and wrist loops. Use neck straps and wrist loops with your camera. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.

Store camera properly. If you're not going to use your camera for a couple of months, store it in a low humidity area and out of direct sunlight. Additionally, store the camera without the battery inserted to reduce the risk of corrosion.

Explanation:

:)

6 0
3 years ago
Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
SVEN [57.7K]

Answer:

True

Explanation:

Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False

Authorization is a set of rights defined for a subject and an object.

Authorization is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification.

4 0
3 years ago
Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
sattari [20]

Answer:

He should talk to a trusted adult and fix the problem.

Explanation:

This problem could become even worse and even more than one person could get in on the act.

7 0
3 years ago
Read 2 more answers
Which are examples of embedded systems? Choose two answers.
SVEN [57.7K]

Answer:

An operating system inside a virtual machine

Smart TVs

Explanation:

We can explain an embedded systems like a system within other system, in this case we have two examples, the smart TV have an operative system in some cases an Android system, and this system is within the television system, the virtual machine is the same concept, we can have an Android system running in a windows system.

7 0
3 years ago
Other questions:
  • Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and Recovery configura
    10·1 answer
  • according to the National Automobile Dealers Association, a single dealership may employ people with as many as 57 different A.
    6·1 answer
  • Output from the print statement is usually written to the ______ in the form of ________
    6·1 answer
  • Help me out here pleaseeeee
    9·2 answers
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • In the Sender Message Channel Receiver (SMCR) model, the ______ is the large, bureaucratic organization that produces messages.
    5·1 answer
  • Talia was a scientist whose research compared the birth rates of young
    12·2 answers
  • Please help me with this this is Computer chapter Advanced HTML of class 8th​
    10·1 answer
  • What are the importance of rules in the computer lab ?​
    12·1 answer
  • HC - AL-Career Preparedness
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!