1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
9

Which is an example of static web page??

Computers and Technology
2 answers:
DENIUS [597]3 years ago
7 0
? What do you mean by showing a expletive
quester [9]3 years ago
7 0

Answer:

Explanation:

may we have the options?

You might be interested in
Your brother is starting 9th grade next year and is thinking about going to college. What step would you recommend he take?
postnew [5]
I would say D. Usually students aren't expected to fill out the FAFSA till junior or senior year, this is because it is based on household income which may change every year. Also, guidance counselor's can help students on the right track to go to classes. Clubs and/or sports teams look really good on college applications and are usually preferred by colleges. 
4 0
3 years ago
Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
Burka [1]

Answer:We start each project to get some business benefits. We design it to achieve users and other stakeholder’s satisfaction. And we build it to improve organization KPIs. But, we live in a world where the project faces many uncertainties. These uncertainties or risks can prevent from achieving our project goals or objectives. So, it is critical that we identify them in time to take care of their effective responses.

The more we know our risks, the more we can evaluate and prioritize them timely for:

Reducing their probable negative impacts, or

Increase their likely positive impacts

We can use Qualitative Risk Analysis and Quantitative Risk Analysis techniques to evaluate and prioritize risks. I see there are a lot of confusions around how these two techniques are different from each other.  In this blog, I will address these confusions and differences between these two techniques.

Before we get into the difference between qualitative and quantitative risk analysis/assessment, it is mandatory to understand how we perform risk analysis in projects.  Below is the summarized demonstration of the risk analysis:

Explanation:

8 0
3 years ago
¿Cuál es la potencia de una lámpara de incandescencia que se conecta a la red de 220 V, sabiendo que tiene una resistencia de 50
Juliette [100K]

Answer:

  • <u>1,000W</u> (rounded to one significant figure)

Explanation:

I will answer in English.

The question is:

  • <em>What is the power of a filament lamp that connects to the 220 V network, knowing that it has a resistance of 50 ohms?</em>

<em />

<h2>Solution</h2>

<em />

<em>Power</em>, <em>voltage</em>, <em>resistance</em>, and current, are related by either of the following equations:

  • P = V × I
  • P = R × I²
  • P = V² / R

Where:

  • P is power in watts (W)
  • R is resistance in ohms (Ω)
  • V is voltage in volts (V), and
  • I is current in amperes (A)

Since you know the voltage (<em>220V</em>) and the resistance (<em>50Ω</em>), you can use the last equation:

  • P = V² / R
  • P = (220v)² / (50Ω)
  • P = 968 W

Since the magnitude 50Ω has one significant figure, your answer should be rounded to one significant figure. That is <u>1,000W.</u>

7 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Robots are increasingly being used in caring roles. Discuss the ethical and cultural implications of this trend
vekshin1
Using more robots means less human contact which means declining social skills, and heavier dependence on technology. And using more technology is expensive.
4 0
3 years ago
Other questions:
  • What is ment by creative middle way solution
    6·1 answer
  • Approximately what percent of desktop PCs are used for work-related purposes?
    12·1 answer
  • Using the notation exemplified in following question , list a set of tables and attributes (and identify keys) to represent the
    10·1 answer
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method
    8·1 answer
  • Someone please help ASAP will brainlist
    9·2 answers
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
    9·1 answer
  • How does 5G technology enhance the Internet of Things (ioT) ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!