1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
12

In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equ

a ls 0.600​, where D is directly in person. If someone is randomly​ selected,
what does Upper P left parenthesis Upper D overbar right parenthesis ​represent, and what is its​ value?
Computers and Technology
1 answer:
MA_775_DIABLO [31]3 years ago
8 0

Answer:

P(D) = 0.4

Explanation:

P(D) is the probability of randomly selecting someone.

who does not choose a direct​ in-person encounter as the most fun way to flirt.

1 – 0.600 = 0.4

P(D) = 0.4

hence the upper D over bar right parenthesis represent and its value is 0.4

You might be interested in
What is a technology that exists inside another device called
BlackZzzverrR [31]

Answer: embedded technology

Explanation: just took the test

7 0
3 years ago
Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
spayn [35]

Answer:

The answer is D. Use multiple record types, page layouts, and profiles

Explanation:

Universal container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify the post close follow up date and post close followup comments fields. How to make this happen

A. Use field-level security on page layouts to restrict editing fields

B. Use field-level security to mark fields as read=only on the sales profile

C. use record types with field sets and restrict editing fields using field-level security

D. Use multiple record types, page layouts, and profiles

3 0
3 years ago
When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
Sindrei [870]

Answer:

Costs will cover a need for more customer data. The further explanation is given below.

Explanation:

  • It's the greatest problem for almost every company to provide the data with security.
  • This is possible for highly trained practitioners and the technical staff to take charge of it.
  • Complicated technologies would have been going to run together again to withstand these types of jobs.
  • Such problems play a major part in the decision-making process affecting the law enforcement authorities to locate the suspects to strengthen the organization.
  • To do something like this, there seem to be a lot of other good initiatives out there doing it.

There have been some cases in which major corporations have chosen not to include law enforcement:

  • There are many more electronic corruption going on, including money robbery, asset fraud, as well as machine assaults.
  • In such a bigger case, numerous institutions, such as large-scale ones, have gone through these circumstances to evaluate law enforcement to come to terms with cybersecurity.
5 0
3 years ago
9. These particular machines can be decentralized.
shusha [124]

Answer:

A, B

Explanation:

Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.

4 0
3 years ago
Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
galben [10]

Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.

a)retrieval. b)comparison. c)storage. d)exponentiation.  

Answer:

a)retrieval.

Explanation:

A retrieval operation simply means obtaining data or information that is stored in a system.

Therefore, getting the data of a video file from a flash drive is a retrieval operation because it brings the video file from the storage device.

3 0
3 years ago
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • If you want to use your computer for recording your band, you would benefit most from a(n)
    13·2 answers
  • Different units of CPU ?
    12·1 answer
  • Consider the following implementation of a class Square:
    12·1 answer
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • How does the teacher know you have completed your assignment in Google Classroom?
    12·1 answer
  • Disuss the roles of hardware,software and databases in regard to computer based information systems
    7·1 answer
  • A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be abl
    8·2 answers
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!