1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
2 years ago
14

IM a bit confused on what this is asking for exactly.

Computers and Technology
1 answer:
valina [46]2 years ago
7 0

Answer:

im not sure can you ask someone for help

Explanation:

You might be interested in
The Internet consists of interconnected computer networks throughout the world that everyone can use.
KiRa [710]
False, I'm pretty sure people in North Korea cant use it...
8 0
3 years ago
Read 2 more answers
What is a specific challenge faced by information visualization researchers who are building an interface?
Mkey [24]

Answer:

 Information virtualization is the process of representing the abstract data such as numeral number and text into the form of visual which is human can easily understand.

The main challenges faced by the information visualization researchers are:

  • The main challenge which are faced by the information virtualization is during the data importing and also cleaning in the system.
  • It also not able to access the large amount of the data easily from the system.
  • Due to the poor selection of the scale and the coordinate rotation it also lead to the data distortion.
3 0
3 years ago
Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every _______ in order to maintain an upda
densk [106]

Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every 31 days in order to maintain an updated database of people.

<h3>What telemarketing firms do?</h3>

The act of telemarketing is known to be the act talking to potential or existing customers through the use of a telephone.

Conclusively, Note that Telemarketing can help a business firm to promote or boast their products or services, make their customer database stronger, bring about a lot of leads and appointments and others.

Learn more about telemarketing from

brainly.com/question/25974538

6 0
2 years ago
Label the strength of a beer based on its ABV. For each beer display the beer's name, ABV, and a textual label describing the st
belka [17]

Answer:

By presuming the question expect us to write a program to address the problem and the solution code written in Python is as follow:

  1. beer_name = input("Enter beer name: ")
  2. abv = int(input("Enter ABV value: "))
  3. if(abv > 10):
  4.    label = "Very High"
  5. elif(abv >=6):
  6.    label = "High"
  7. elif(abv >=3):
  8.    label = "Average"
  9. else:
  10.    label = "Low"
  11. print("Beer Name: " + beer_name)
  12. print("ABV value: " + str(abv))
  13. print(label)

Explanation:

Firstly, we can use input function to prompt user to input beer name and ABV value (Line 1 - 2).

Next, create if else if statements to check abv fallen into which range of value and then set a label accordingly (Line 4 -11). For example if abv is 4, the label will be set to "Average".

At last, print the information of beer that includes beer name, abv value and label (Line 13 - 15).

5 0
3 years ago
The computer code behind password input can be modified to force people to change their password for security reasons. This is k
bazaltina [42]

Answer:

to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.

Explanation:

3 0
3 years ago
Other questions:
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • Brittany just pulled up a database table with employee information that contains 50 records of employees at her company. Which o
    12·1 answer
  • The following method public String removeFromString(String old, String frag) removes all occurences of the string frag from the
    12·1 answer
  • How can vlan hopping attacks be prevented on a network?
    10·1 answer
  • ____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the n
    11·1 answer
  • What are invoices? A. Documents that convey a company's liabilities B. Documents that convey how much a company was earning and
    5·2 answers
  • Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
    11·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • An integrated file is one that includes information created in _____ Office application(s).
    15·1 answer
  • Select the examples that best demonstrate likely tasks for Revenue and Taxation workers. Check all that apply. Brenda works for
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!