1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
15

When a piece of shiny silver jewelry gets tarnished, what has happened?

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
6 0
A
because if you leave certain metals in the rain they tarnish or rust. think about how if you leave a bike in the rain for too long it will start to rust on the metal parts
You might be interested in
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any in
irina1246 [14]

Answer:

Project Identification

Provide the identifying information associated with the project, including the applicable project control code, system acronym, and system title.

System Proponent

Provide the name of the System Proponent.

History of the System

Briefly describe the system’s history and predecessor, if any.  State the mission needs and information requirements, including how the system is expected to help users.

Functional System Description and Data Usage

Briefly describe what the system does functionally and how the data are used by the system.

Explanation:

Overview

The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months).  The objectives are to determine if the system does what it is designed to do: Does it support the user as required in an effective and efficient manner? The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system.  The review results can be used to strengthen the system as well as system development procedures.

The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system.  A representative from the functional development group or other member of the major user organization participates in the review.  The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible.

The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing end users and their managers, system administrators, and computer operations personnel.  The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to initiate other actions.

The Post-Implementation Review is a free-form report, and not all sections are relevant or necessary to the final product.  A description of the Post-Implementation Review Report is attached.

3 0
3 years ago
Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap
EleoNora [17]

Answer:

I believe it's b

Explanation:

I'm straight

8 0
3 years ago
a data tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patter
Mashcka [7]

Text mining tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Here's the complete question:

__________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

- OLAP

- Text Mining

- Web mining

- Web content mining

What is Text mining?

Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

Learn more on Text mining from:

brainly.com/question/25578967?referrer=searchResults

#SPJ4

6 0
1 year ago
The original U.S. income tax of 1913 was quite simple. The tax was
Svetradugi [14.3K]

Answer:

       Scanner inputObject = new Scanner(System.in);

       System.out.print("Enter your income to calculate the tax: ");

       double income = inputObject.nextDouble();

       double tax = 0;

       if (income <= 50000) {

           tax = income * 0.01;

       }

       else if (income > 50000 && income <= 75000) {

           tax = income * 0.02;

       }

       else if (income > 75000 && income <= 100000) {

           tax = income * 0.03;

       }

       else if (income > 100000 && income <= 250000) {

           tax = income * 0.04;

       }

       else if (income > 250000 && income <= 500000) {

           tax = income * 0.05;

       }

       else if (income >= 500000) {

           tax = income * 0.06;

       }

       System.out.printf("Your tax is: $%.2f", tax);

Explanation:

Here is the Java version of the solution. The user is asked to enter the income and the tax is printed accordingly.

<em>Scanner</em> class is used to take input from user, and the value is stored in <em>income</em> variable. A variable named <em>tax</em> is initialized to store the value of the tax.

Then, if structure is used to check the <em>income</em> value. This <em>income</em> value is checked to decide the amount of the tax will be paid. For example, if the <em>income</em> is $100000, the tax will be calculated as tax = 100000 * 0.03 which is equal to $3000.00. After calculating the <em>tax</em> value, it is printed out using System.out.printf("Your tax is: $%.2f", tax);.

Be aware that the values are <u>double,</u> <u>printf</u> is used to print the value. "<u>%.2f</u>" means print the<em> </em><u>two decimal values</u> in the result.

7 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • Which area of physics governs wireless communication?
    10·2 answers
  • 1. A device that can be used to insert data into a computer or other computational devices is
    6·2 answers
  • In python:
    14·1 answer
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • Describe two types of software suites supporting your answer with three examples each.
    12·1 answer
  • Help me i'll brainiest if its right
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!