1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
10

What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel

ect all that apply.a. True/False-Type of Business/entityb. True/ False-User Locationc. True/ False- your judgmentd. True/False- User Intent
Computers and Technology
1 answer:
jeyben [28]3 years ago
7 0

Answer: A. True/false-Type of Busirness/entity and

B. True/false-User Location

Explanation

Business/entity and Usee location ia what considered when determining whether a business is too far based on the query and the user location

You might be interested in
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinet
s344n2d4d5 [400]

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

6 0
3 years ago
From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
kaheart [24]

Answer:

A) "Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law, or otherwise to be problematic."

B) "Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing, or other intellectual property to which a software engineer has contributed."

C) "Not knowingly use software that is obtained or retained either illegally or unethically."

Explanation:

All the above are connected to intellectual stuff and hereafter are the right possibilities. One requires to comprehend the definition of intellectual property. In fact, it is a software, a piece of script, art, etc. that a knowledgeable make using his intelligence. All the rights related to such is with the intellect. And that is why the above three choices is right.

The fourth choice has nonentity to do with intellectual stuff, and it deals with the skirmish of interest. And henceforth that is not a correct option.

5 0
3 years ago
Which of the following is not a common business use of blogs? document sharing promotions posting answers to frequently asked qu
vagabundo [1.1K]
Document sharing I think
4 0
3 years ago
Read 2 more answers
0010 0000<br> What is the binary decimal
Degger [83]

Answer:

The decimal number is 32 and the Hexidecimal  is 20

5 0
3 years ago
Read 2 more answers
Who invented the first antivirus software and when was it written?
Bad White [126]

Answer:

The answer to this question can be given as:

The first antivirus was written in 1987 by the German security expert Bernd and the name of the antivirus is Vienna Virus.  

Explanation:  

Antivirus: It is a software or anti-malware software that is used for providing security. It is a tool that runs on various digital devices and searches for files that should not be on your computer. If the file is found then It defends the computer from incoming threats and seeks-out, stops and alerts of viable threats from the system so the computer works properly. So, the first antivirus was developed in 1987 by German security expert Bernd.

7 0
3 years ago
Other questions:
  • How do you think engel would feel about computers information systems and the internet?
    14·2 answers
  • Can someone please help with two? I will mark brainlest!!!
    12·1 answer
  • Which operating system is a version of Linux?​
    13·1 answer
  • import java.util.Scanner; public class TeenagerDetector { public static void main (String [] args) { Scanner scnr = new Scanner(
    6·2 answers
  • Logical address is generated by,
    13·1 answer
  • Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le
    14·1 answer
  • How do you use VMware Fusion to make a Tip Calculator?
    10·1 answer
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • 1. Atestharnessprogramfortestingsortingmethodsisprovidedwiththeprogram iles.ItisintheileSorts.javainthech11.sortspackage.Theprog
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!