A document used to convince a panel of potential funders to help a product, programor service become reality.

Answers

Answer 1

Answer:

Concept paper

Explanation:


Related Questions

I will make you brainless Just answer this question!!

A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on.​​

Answers

Answer:

1. 3

2. 8

3. 2

4. 6

5. 4

6. 5

7. 9

8. 1

9. 7

Explanation:

Im not sure about this but I hope it helps

The number 8 is actually first

cui documents must be reviewed to which procedures before destruction?

Answers

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The procedure before the destruction of the CUI document will be Records Management.

What is the CUI documents procedure?

Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.

Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.

To acquire regulatory advice for records management and destruction processes, go to the course resources.

The CUI document must be reviewed to which procedures before destruction by Records Management.

More about the CUI documents procedure link is given below.

https://brainly.com/question/29871876

#SPJ12

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

what is the problem here

Answers

Answer:

I think ...............

You can open an HTML document only in ________.
A. Internet Explorer
B. M.S Excel
C. Note Pad
D. None of these
please solve it fast its urgent ​

Answers

Answer:

You can open a HTML document in internet explorer usually browsers can open HTML files.

An advantage of a private home network is that is typically more secure than public Wi-Fi.

Answers

Answer:

yes it's true

Explanation:

please mark brainiest

Answer:

I agree on that.

Explanation:

Of course you can use a vpn to encrypt your data being sent to router but it is easier to just connect to a private network.

Hope this help please give the brainliest award would be much appreciated.

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

8
Select the correct answer from each drop-down menu.
The AND operator narrows
your search results. The OR operator broadens your search resul
Result. Am I right?

Answers

Answer:

yes you are correct

the AND operator narrows

the OR operator broadens your search results

Answer:

yes your right

(:

Explanation:

As a member of your barangay,how will you help your community in improving solid waste management?

Answers

Answer:

Reuse materials whenever possible. Recycle materials and organize for government and industry to develop community recycling programs. Collect, transport, and store wastes safely.

is a technique for breaking a problem down into smaller, less complex parts.



A- Pattern recognition
B- Decomposition

Answers

Decomposition hope this helps :)

Answer:

B) decomposition

Explanation:

I got it right on the test

What is the difference between a filter and a Search Folder?

*manually & *on demand

Answers

Answer:

manually and on demand is correct

Explanation:

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

A laptop can be kept on palm to work. [true/false) ​

Answers

Answer:

Explanation:

false

search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?

Answers

Answer:

They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.

please give brainliest.

You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?

A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above

(10pts)

Answers

I would have to say answer b

Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity

Answers

Answer:

I would say A B and C

Explanation:

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.

Answers

Answer:

First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.

Hope this help please give the brainliest award.

How do people decide their ethical behavior

Answers

Explanation:

Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.

Answer:

most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.

Explanation:

Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:

A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year.

Answers

Year = input()

isLeapYear= false
if Year%4 = 0
if Year%100 != 0 or Year%400 == 0
isLeapYear = true
print(isLeapYear)

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

Year = input()

isLeapYear= false

if Year%4 = 0

if Year%100 != 0 or Year%400 == 0

isLeapYear = true

print(isLeapYear)

See more about python at brainly.com/question/26104476

what is the answer ??​

Answers

Answer:

D all of the above

B operating system

the person above ^ me is correct

what was the name of the earliest iteration of the internet?

Answers

Answer:

ARPANET

Explanation:

ARPANET was the name of the earliest iteration of the internet.

What is ARPANET?

The first open packet-switched computer network was the U.S. Advanced Research Projects Agency Network (ARPANET). In 1989, it was ultimately deactivated after being put into use in 1969. The primary applications of ARPANET were in academia and research.

The Advanced Research Projects Agency Network, or ARPANET, was developed in the late 1960s and served as the first functional prototype of the Internet. ARPANET, which was first supported by the US Department of Defense, used packet switching to enable multi-computer communication across a single network.

The first distributed control network was the ARPANET. It introduced TCP/IP protocols initially. With the employment of these technologies, the Internet was essentially only getting started. It was created with the fundamental goal of facilitating communication among scientific users.

Thus, it is ARPANET.

For more information about ARPANET, click here:

https://brainly.com/question/28577400

#SPJ2

only cool people answer this question.




are you cool?

Answers

Answer:

Yes

Explanation:

I like frogs

Answer:

always been coolswag

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

why is a fragmented disk slower than one that is defragmented?

Answers

Answer:

Explanation:

The fragmented program has parts stored all over the hard driven. The computer has to keep on checking for where the next fragment is. All if this takes time especially if the program that you are trying to load is very large.

If the sectors for a program are consecutive, that makes loading a whole lot easier.

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

Other Questions
a patient is in refractory ventricular fibrillation and has received multiple appropriate defibrillation shocks, epinephrine 1 mg iv twice, and an initial dose of amiodarone 300 mg iv. the patient is intubated. which best describes the recommended second dose of amiodarone for this patient? What the advantages and disadvantages of file sharing to the users help asap please............. A rod is heated at the rate of 30 watts at the middle point and is insulated at its two ends. The two half sections are cooled by convection by an ambient fluid at 20 degree Celsius with a heat transfer coefficient of 30 W/m^2 C. The diameter of the rod is 0.5 cm, its length is 18 cm and its thermal conductivity is 206 W/mC. Determine the temperature in the middle of the rod and at the insulated ends. Please describe your strategy of solving this problem. does anyone know how to solve this math problem?A waiter earns $6 per hour plus tips of 15% of the restaurant tab from each table served . What total amount of restaurant tabs assures the waiter of making at least $350 in a 5 hour shift ? Which design principle will you apply if you group similar elements together when designing a magazine cover?A. repetitionB. contrastC. alignmentD. proximityE. grid system Find the x- and y-intercepts of the graph of 7x + 8y = 40. State your answers aswhole numbers or as improper fractions in simplest form. Theo mixes cake batter and places it in the oven at 350F for 45 minutes. Explain what type of reaction baking a cake represents in terms of energy. [1 3/5(6)](3 3/4)10 how do frog eat there food Question 13 of 20Which of the following actions is an example of the Renaissance idea ofsecularism?O A. An artist creates a painting based on his feelings and emotionsrather than classical themes.O B. A high school requires all of its students to study mythologicalstories written by the ancient Greeks.O C. A city reduces its tax rates in an attempt to encourage itsresidents to create new businesses.D. A politician argues that religious images should not be displayedin any government building,SUSIMA 13. Which type of industry is home construction?primary industrysecondary industrytertiary industry what if water didnt have a negative charge? pls answer aasap, ill mark you as a brainliest if only you answer this correctly. 2) The terms representative democracy and republic are used when describing America's government Choose the THREE features ofthe type of government these terms are used to describeA)The power of the government belongs to the citizens.B)People must have access to free and fair elections.Every citizen is required to vote for representatives,D)Limits are placed on government and lawmakers,E)Every citizen gets a direct vote on every issue, Describe the translation of the point to its image (-2,5) (3,1) Plz help me well mark brainliest! Explain these 3 quotes from The Outsiders.1.) I listened to his heart pounding through his T-shirt and knew everything was going to be okay now. I had taken the long way around, but I was finally home. To stay. (Page 69)2.) And dont be so bugged over being a greaser. You still have a lot of time to make yourself be what you want. (Page 179)3.) Two friends of mine had died that night: one a hero, the other a hoodlum. (Page 154) The Sun's primary energy source is simplify the expression 7(a+4b)-3c