1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

1. How many questions are on the Consensus Assessment Initiative document?

Computers and Technology
1 answer:
Angelina_Jolie [31]3 years ago
3 0

Answer:

i have no idea

Explanation:

You might be interested in
The shapes of AND, OR, and NOR gates have something in common. What is it and why do you think they share that feature?
irina1246 [14]
There're all conjunctions.

You can seperate them in sentences after a comma for a run-on sentence.
4 0
3 years ago
you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?
rosijanka [135]

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

  • Computer data storage can be regarded complex system, immediately a data is saved then;

  • The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

  • The hardware will record this saved numbers inside the computer.

  • These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:brainly.com/question/21571591?referrer=searchResults

8 0
3 years ago
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
3 years ago
In 3–5 sentences, explain how telecommunications technology helps workers do their jobs more efficiently.
Anvisha [2.4K]
Technology helps business professionals, keep more organized, communicate better, and efficiently keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's. With better alarm systems, camera's and online banking, security measures are endless. 

Hope this helped :)  <span />
4 0
3 years ago
When creating a report, you should consider all of the following EXCEPT (Points : 4) who will use the report
barxatty [35]

Answer: Number of records input into the report

Explanation: Creating the report includes the factors like maintaining the record, updating data, designing content etc. The content of the report has the parameter to maintain so that it can be up to date and can be efficient to the user.

The parameters that are considered while making the report are confidential content should be specially considered ,user of the report , purpose of the report,etc. The only factor that is not accountable is input.There can be number of inputs that can be entered in the report because they have huge sheet space.

8 0
3 years ago
Other questions:
  • What is software piracy
    12·2 answers
  • Which is NOT a way the network operating sys-
    6·1 answer
  • Create a class ProblemSolution with following characteristics Two private member variables name &amp; designation of string type
    8·1 answer
  • The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
    7·1 answer
  • When creating a scene in Blender, you should change Blender Render to ______ to create the best lighting option?
    15·1 answer
  • Please help me please
    6·1 answer
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • It is used to select specific menu options, drag and drop options and to draw something on screen.
    6·1 answer
  • How can you categorize computer on the basic of its brands.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!