Choose the answer.
The ____ ... meeting is a great way to bring everyone involved together to discuss
the project. Some topics of this meeting include project vision, roles and
responsibilities, team buildings, team commitments, and rules.

Answers

Answer 1
nazlian monsters died and died and died again of heart attack

Related Questions

Help me pls :)):)))))))))))))

Answers

Answer:

26.6 miles per gallon

answer it correctly ​

Answers

Answer:

fertilizers: 950 bags

insecticides: P 2160.00

plowing: 5

harrowing: P 3150.00

Explanation:

When trying to find a machine that is needed to access the data can be difficult. What is this an example of?.

Answers

There are different kinds of computer language. The above is an example of Machine language. It is also a kind of input devices.

Why machine language?

Machine language is known to be a type of language that can only be understood by a computer. It is therefore very difficult for a person to understand as it is the only thing that the computer system can use.

When a person is trying to find a machine that is needed to access the data, it will be be difficult as one is not familiar with the machine language and what can be the best tool to use.

Learn more about Machine language from

https://brainly.com/question/5045657

Ok. Explain this. Here are the two screenshots. Im offering 100 points.

Answers

Answer:

B

Explanation:

0.25>-0.25 because 0.25 is positive and further right on the number line.

Answer:

For the first one it's B cuz, 0.25>-0.25

0.25 is gr8r than negative 0.25

Explanation:

and for the second, I really don't know why it keeps saying that. I tried to answer a question and it said the same. Its kinda annoying

large technology company hosts hundreds of servers in a datacenter. The company invests a great deal of money into a risk prevention plan to protect the systems. One such solution is insurance that protects the hardware and the data. Which specific risk response strategy does the company utilize in this instance

Answers

The specific risk response strategy that the company utilize in this instance is risk transference.

What is Transference risk control strategy?

Transference risk control strategy is known to be a type of strategy that firms uses to decides how they can lower or shut down a risk that it has encountered to another firm.

Note that in this situation above, large companies, instead of they trying to work and settle the risk themselves, they tend to give it to another such as a third party.

Learn more about insurance from

https://brainly.com/question/25855858

What happens when the button is clicked? Open the functions drawer and look at each of the StateLibrary functions. Mouseover them for documentation. How do these functions work? Click "Manage Libraries" in the gear menu, then click "view code" for the State Library. Read the code. How do the library functions work? Were your predictions correct?

Answers

Library functions work by assesment through its function name.

What are Library functions?

Library functions are computer language that are made up of inbuilt functions which are grouped together in a place called library.

A library is the collection of resources or data used by computer programs for software development.

These resources may include:

configuration data,

documentation,

help data,

message templates and

pre-written code.

Therefore, Library functions work by assesment through its function name.

Learn more about library here:

https://brainly.com/question/5961530

________ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action.

Answers

The location service that allows applications to know when a user has crossed a specific location to trigger an automated action is; Geofencing

What is geofencing?

Geofencing is a location-based service whereby an app or software uses GPS, RFID, Wi-Fi or even cellular data to trigger an already programmed action when a mobile device enters or exits a virtual boundary that is set up around a geographical location called a geofence.

Thus, the answer to the question would be geofencing as it tallies with the definition given above,

Read more about programs at; https://brainly.com/question/16397886

what is alternative name of home page

Answers

Answer:

In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for home page, like: web page, web site, website, webpage and homepage.

25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos

Answers

Answer:

financial theft

identity theft

media piracy

Unethical uses of computer devices include the following:

Financial theft.Identity theft.Media piracy.

What is an unethical use of a computer?

The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.

In Cybersecurity, unethical uses of computer devices by a hacker include the following:

Financial theft.Identity theft.Media piracy.

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ2

What would be considered a benefit of using simulation in the education field?

Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.

Answers

Answer:

books cost

Explanation:

the books cost will go down, as they are to become digital, thus, making physical copies cheaper

Answer:

A

Explanation:

Did test

In Scratch, what term refers to a message that gets passed along and causes an action to happen?
broadcast
mechanical
trigger
variability

Answers

Answer:

Broadcast

In scratch, let's use a block and a message as our example, when I receive and broadcast.

So you would put your syntax like this,

When green flag clicked

broadcast message1

 When I receive message1

 say Hello World!

Answer:

your answer is A. Broad cast

Explanation:

In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. true false

Answers

In a print statement, a user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line.

What is a print statement?

A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler.

In Computer programming, an end user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line by using a print statement.

Read more on print statement here: https://brainly.com/question/21631657

what is the answer in online learning and digitalcitizenship

Answers

Answer: an online encyclopedia.

Explanation: encyclopedias often have constantly updated pieces of news, that are also accompanied by fact-checkers as well unlike newspapers.

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select

Answers

The type of animation that Alejandro should select show a series of images displayed in sequence is: Animated GIF.

What is graphic design?

Graphic design can be defined as an artistic process that is used for the creation of various art works and animations.

In the creation of various graphic files such as in 2-D or 3-D, graphic designers can use a variety of software applications or programs to create still images and animations.

In this scenario, Alejandro should select an animated graphics interchange format (GIF) to show a series of images displayed in sequence.

Read more on graphic design here: brainly.com/question/25299426

disadvantages of using lossless compression rather than lossy compression​

Answers

Answer:

Larger files

Explanation

Lossless advantages and disadvantages Advantages: No loss of quality, slight decreases in image file sizes. Disadvantages: Larger files than if you were to use lossy compression.

Compression, Explained. We use compression to make files smaller, so that they take up less storage space and can be downloaded more quickly.

Lossless vs. Lossy Formats.

Lossy Compression. Lossy compression is useful because of its ability to shrink a file to a more convenient size

Select the Pixel Format to be either Mono8 or BayerRG8.

Ensure ISP Enable is not selected (disabled).

From the Image Compression Mode drop-down, select Lossless.

Select the Adaptive Compression Enable checkbox to allow dynamic updates to compression tables to achieve a better compression ratio.

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

The area that we can see just after windows is started is subject​

Answers

Answer:

The area that we can see just after windows is started is desktop or working area.

Which file in linux would i need to modify in order for a local user to connect to a new site i created by just entering the site name in the browser

Answers

I attached my answer because Brainly wouldn't let me post it. It is important  to be detailed since you are setting up a DNS server to do this.

Select all examples of ethical and appropriate use of business e-mails.

1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.

Answers

Answer:

Number 3 only I believe, sorry if im wrong.

Explanation:

nums = [30, 10, 30, 14, 10, 3, 9, 7]
print(nums)

nums.extend([24, 3, 21, 19])
print(nums)
What is output by the second print statement in the code above?

Group of answer choices

[30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

[30, 10, 30, 14, 10, 3, 9, 7]

[24, 3, 21, 19]

[24, 3, 21, 19, 30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

Answers

The range function must have two parameters? False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

The range function must have two parameters is False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

brainly.com/question/30613605

#SPJ3

Check My Work An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output

Answers

An information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.

What are applications used in a computer system?

Applications are software program that helps a computer user to work effectively with the computer system.

It  helps the computer user by handling the input, managing the processing logic, and providing the required output.

Examples of application include:

Web browsersPresentation softwareSpreadsheetWord processors

Therefore, an information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.

Learn more about application software here:

https://brainly.com/question/18661385

Which of the following will Excel recognize as a date?
Group of answer choices

February 6 1947

2,6,47

2-Feb-47

None of the above

Answers

The option that shows how Excel recognize as a date is February 6 1947.

How does Excel see date?

The Excel  date is often seen as a regular number that is said to have been formatted to often look like a date.

One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.

Read more about Excel from

https://brainly.com/question/25879801

Can anyone figure this out???? I need help ASAP!

Answers

Answer:

cant see

Explanation:

a customer willl borrow

Answers

Answer: C. the PC

Explanation: The motherboard is not included in the passage

_________________ is a storage capability that removes duplicate chunks of data and replaces them with pointers back to a single original item.

Answers

Answer:

The answer is Deduplication

How to copy and paste from pdf to word without losing formatting?.

Answers

Answer:

mac: cmd c, cmd v
windows: ctrl c, ctrl V

Windows: use pdf to word convertor
such applications like pdf elemnt, pdfX, smallpdf(.com) online convertors, etc to convert

how academic skills for teachers help students at the university​

Answers

Academic skills for teachers has help students at the university​ because  with its use,  students are able to have test-taking strategies and understands their courses more better.

Why are academic skills vital for university?

The use of Academic skills is one that act to encourage students so they can be able to be more efficient and better learners.

Conclusively, It is one that give students the power or confidence to be involved fully in any courses that  are useful for them outside of the classroom.

Learn more about skills from

https://brainly.com/question/1233807

What will her profit be is she sells her CDs at this price?

Answers

I need the rest of the question before I can help you

Anyone know an "unblocked" alternative of giggl, or hyperbeam, maybe discord for a school chromebook while i wait during class since i'm literally finished with everything, or can you tell me how to unblock things on the chromebook.

Answers

You can get a VPN via the place where you get on your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend  Adguard VPN. You can create an account for free.

All data and bookman accounts will now start to be deleted from your Chromebook. You can now use your Chromebook without any limitations once you've finished.

What are the ways to unblock things on the Chromebooks?

This makes sure that neither other users nor unauthorized individuals may access your data by removing the Chromebook's hard drive and reading it. A Chromebook's “owner” is the first person to log in, and they have the option to control who else is permitted to log in if they so decide.

A VPN can be obtained from the same location where you download your browser. Any VPN with at least a 4.2-star rating should do the trick. If you are on chrome, I'd recommend  AdGuard VPN. You can create an account for free.

Therefore, On your Chromebook, it is not possible to transfer owner permissions to another account.

Learn more about Chromebook here:

https://brainly.com/question/23567863

#SPJ5

What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer

Answers

A feature that preserves open apps and data while allowing another user to log in to his or her own session of the same computer is: switch user.

What is a computer?

A computer is an electronic device that is designed and developed to receive data from an end user in its raw form (input) and processes these data into an output that could be used for other purposes.

Generally, all computers are designed and developed with a feature called switch user, so as to preserve open software applications and data while allowing another user to log in to his or her own session of the same computer simultaneously.

Read more on computer here: brainly.com/question/959479

Other Questions
Is anyone able to figure this out, I can't do this You are shopping at a dvd store and have $49.50 to spend each dvd cost $4.25 estimate how many dvds you buy. bring a cookie crumb or soda? A boy bought 1,567kg of frozen chicken,657g of vegetables and 95g of corn oil from a shopping mall. What is the total weight of the items she bought in kilograms What register does the Cello instrument play in? High,medium , or low. divide and simplify. 8/ 15 3/ 5 Wyalusing Industries has manufactured prefabricated houses for over 20 years. The houses are constructed in sections to be assembled on customers lots. Wyalusing expanded into the precut housing market when it acquired Fairmont Company, one of its suppliers. In this market, various types of lumber are precut into the appropriate lengths, banded into packages, and shipped to customers lots for assembly. Wyalusing designated the Fairmont Division as an investment center. Wyalusing uses return on investment (ROI) as a performance measure with investment defined as average productive assets. Management bonuses are based in part on ROI. All investments are expected to earn a minimum return of 16 percent before income taxes. Fairmonts ROI has ranged from 29. 2 to 32. 4 percent since it was acquired. Fairmont had an investment opportunity in 20x1 that had an estimated ROI of 28 percent. Fairmonts management decided against the investment because it believed the investment would decrease the divisions overall ROI. The 20x1 income statement for Fairmont Division follows. The divisions productive assets were $23,100,000 at the end of 20x1, a 5 percent increase over the balance at the beginning of the year. Fairmont Division Income Statement For the Year Ended December 31, 20x1 (in thousands) Sales revenue 22,500 Cost of goods sold 13,900 Gross margin 8,600 Operating Expenses: Administrative 1,800 Selling 4,300 6,100 Income from operations before income taxes 2,500. Required: 1. Calculate the following perofrmance measures for 20x1 for the Fairmont Division. a. Return on Investment (ROI) b. Residual Income 2. Would the management of Fairmont Division have been more likely to accept the investment opportunity it had in 20X1 if residual income were used as a performance measure instead of ROI? Explain your answer A difference or departure from the original.A. statementB. contrastC. repetitionC. hook What is 7/8 - 1/4 in simplest form? pasagot po hehe sorry pakitingnan nalang po attachment below Any scary story prompts or places for a scary story to take place??? Betty Friedan, a feminist writer, wrote a book called "The Feminine Mystique". What was its overall message? Raisa is purchasing, a life insurance policy in which the premiums, death benefits, and cash value of the insurance remain fixed. At the time ofher death, the cashvalue of the insurance becomes the insurance company's and the death benefits are paid to the beneficiaries. Which type ofpolicy is Raisa purchasing?A. whole life insuranceB. permanent life insuranceC. term life InsuranceD. healthy life insurance 70 pts if your correct. ROUND YOUR ANSWER. Which of the following words could be used to replace the italicized word, chaotic, in the sentence below without changing its meaning?In the corner of Amys room, lay a chaotic array of textbooks and unfinished homework assignments.categorizeddisorganizedfascinatingfrightening Write a program that uses while loops to perform the following steps:a. Prompt the user to input two positive integers. Variables: firstNum and secondNum(firstNum must be less than secondNum) (use while loop); create a user-defined functioncalled validateUserInput() to validate the user's input. Use Call-by-Value.validateUserInput() is a value returning function.b. Output all odd numbers between firstNum and secondNum. (use while loop); create auser-defined function called oddNumbers(). Use Call-by-Value. oddNumbers() is a voidfunction.c. Output the sum of all even numbers between firstNum and secondNum. (use whileloop); create a user-defined function called sumEvenNumbers(). Use Call-by-Value.Declare a variable called sumEven in the main() for the sumEvenNumbers().sumEvenNumbers() is a valuereturning function. Use sumEven to hold a returned value.d. Output the numbers and their squares between 1 and 10. (use while loop): create auser-defined function called displaySquareNumbers(). Call-by-Value.displaySquareNumbers() is a void function.e. Output the sum of the square of the odd numbers between firstNum and secondNum.(use while loop); create a user-defined function called sumSqureOddNumbers(). UseCall-by-Value. Declare a variable called sumSquareOdd in the main(), for thesumSqureOddNumbers(). sumSqureOddNumbers() is a value returning function. UsesumSquareOdd to hold a returned value.f. Output all uppercase letters. (use while loop); create a user-defined function calleddisplayUppercaseLetters(). Use Call-by-Value. displayUppercaseLetters() is a voidfunction. What is the length of one side of a square when it has an area of 100 inches squared?and what is the squares perimeter? triangle ABC is similar to triangle DEF. The ratio of the lengths of the corresponding sides of triangle ABC to triangle DEF is 2:3 what is the measure of DF With respect to the history of American business, the ________ era covered the early years of the United States up until the 1920s. Write in Spanish in past tense please and thank youI was born five poundsI drank formula When I was three I would play outside with my friendsI lived in Chicago until I was 6I had a stuffed animal