1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
6

PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS A

LSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *

Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.

Software used for professional print publications such as posters, books, and email newsletters is called a: *

Professional software
Word processing software
Desktop program
Desktop publishing software

Which of the following criteria does NOT determine the credibility of a source? *

How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author

The process of finding a solution to a difficult or complex issue to make it easier is known as *

problem
problem-solving
input

A series of actions taken in order to solve a particular problem is known as the____________ *

process
problem
input
output

A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *

problem
output
algorithm
input

Which is the third step in the problem-solving process? *

Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem

A list of sources you used when writing a scholarly article on a specific subject is known as a: *

intellectual-property
credibility
bibliography
trademark

Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter

Which of the following is NOT a writing style format for academic purposes? *

Times New Roman
American Psychological Association
Modern Language Association

The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *

plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *

SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.

say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Computers and Technology
1 answer:
wlad13 [49]3 years ago
7 0

Answer:

finding a suitable solution for issue can be accomplished by following the basic four-step problem solving process and methodology outlined.

You might be interested in
01000100 01101111 00100000 01111001 01101111 01110101 00100000 01101011 01101110 01101111 01110111 00100000 01111001 01101111 01
Anna71 [15]
This was quite tricky but, I found a program online that answers your question. The answer is (Do you know your binary code? Answer this in binary code)
5 0
4 years ago
Read 2 more answers
The direction of a ratchet is reversed by _______________________.
ankoles [38]

Answer:

You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.

Explanation:

6 0
2 years ago
As u type where does excel display the entry
grigory [225]

Answer:

The Active cell inside Excel Worksheet is used to identify the cell which is currently active. The thick border gridlines around the cell indicates that it is the Active cell inside Excel Worksheet. The Active cell is where the focus is on and where the data will be entered when a key is typed on keyboard.

5 0
3 years ago
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
How does knowledge of disk management assist in terms of increasing systems performance 10marks
AlexFokin [52]

Answer:

<h3>bagaimana pengetahuan tentang manajemen disk membantu dalam hal meningkatkan kinerja sistem 10marks</h3>
4 0
2 years ago
Other questions:
  • Which of the following software is cloud-based? OpenOffice Writer Word 2013 Word Online Word Perfect\
    13·2 answers
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • What are the four main types of section breaks? Check all that apply.
    9·2 answers
  • Clep allows students to do all of thw following except which?
    9·2 answers
  • Choose the web design factor from the drop-down menus that best represents each statement. A. Good web pages stick to the point,
    15·1 answer
  • Which product is made using bacteria?<br>O A. Maple syrup<br>O B. Cork<br>O C. Latex<br>D. Yogurt​
    12·1 answer
  • What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know whic
    7·1 answer
  • Does anyone know how I can "guest browsing" when it's blocked ?
    7·1 answer
  • Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer syst
    7·1 answer
  • what are some examples of security goals that you may have for an organization? check all that apply.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!