____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

Answer 1

I believe "Work-Shift" should be in the blank


Related Questions

coding word scramble

ICOAIPAPLTSN- a software program for end users

AADT- processed information

RAAEHWRD- physical parts of computer system

MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible

Answers

application, data, hardware, programming

The decoded words for the coding word are:

ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - Programming

What is coding words?

In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.

Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.

Read more about coding here:

https://brainly.com/question/26134656

#SPJ3

remove the cover or chassis or case​

Answers

Answer:

Case. Under that, there is the motherboard which has all the connections to all the hardware

Explanation:

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support CompTIA Linux Customize or Write Simple Scripts Review Review Well done, you have completed the Customize or Write Simple Scripts Practice Lab. Lab Assessment Test your knowledge on the topics covered in this lab by completing the review questions below. 1 Question What is the extension of a shell script

Answers

Answer:

The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.

only cool people answer this question.




are you cool?

Answers

Answer:

Yes

Explanation:

I like frogs

Answer:

always been coolswag

Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.

Answers

The 3rd onee i think if not 4th

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.

Required:
What could have been the reason for that?

Answers

Answer:

The network address can be the reason. You need to modify it so you can have access.

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.

checking social media networks during working hours

surfing the Internet during working hours for what to do on the weekend

downloading a favorite band’s latest album from a file-sharing service

Answers

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.

what is the term used to describe with you connect your phone to another device to share internet access?

Answers

Answer:

This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.

Explanation:

Name any four constituent of the 8085 microprocessor.

Answers

Answer:

The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.

Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.

What is the configuration state of the 8085 microprocessor?

The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.

According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.

Therefore, some common constituents of the 8085 microprocessor are well described above.

To learn more about the microprocessor, refer to the link:

https://brainly.com/question/29243062

#SPJ5

Preset headers and footers cannot have additional information add to the areas.
Group of answer choices

True

False

Answers

the answer to the question is true

what is the problem here

Answers

Answer:

I think ...............

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.

Answers

Answer:

First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.

Hope this help please give the brainliest award.

. Imagine that you were programming without an IDE. What problems might you encounter?​

Answers

Answer:

Can't run the program, Can't see syntax error

Explanation:

If you are doing programming without IDE you can see 2 major problems. They are:

1: Can't run it: If you do not have any IDE and doing programming you will able be able to run it. Means you can't see its output.

2: Can't see syntax error: If you do programming without any IDE you can't see its errors. I mean you will not be able to see that where you have made errors.

According to me, these are the 2 major problems you will face when you do programming without any IDE.

Programming without an Integrated Development Environment (IDE) can present various challenges compared to using one.

Programming without an Integrated Development Environment (IDE) can present several challenges.

Without an IDE, developers might face difficulties in code organization and navigation, as they won't have features like code autocompletion, syntax highlighting, or code analysis to assist them.

This can lead to more time spent manually finding and fixing errors, which can slow down the development process.

Additionally, debugging may be more cumbersome without the support of a dedicated debug ger.

Overall, working without an IDE may reduce productivity and increase the likelihood of errors due to the absence of various productivity-enhancing tools available in modern development environments.

Learn more about Programming click;

https://brainly.com/question/14368396

#SPJ3

write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has been initialized and contains at least two elements.

Answers

Answer:

[24, 35, 9, 56 Approach #3: Swap the first and last element is using tuple variable.

what was the name of the earliest iteration of the internet?

Answers

Answer:

ARPANET

Explanation:

ARPANET was the name of the earliest iteration of the internet.

What is ARPANET?

The first open packet-switched computer network was the U.S. Advanced Research Projects Agency Network (ARPANET). In 1989, it was ultimately deactivated after being put into use in 1969. The primary applications of ARPANET were in academia and research.

The Advanced Research Projects Agency Network, or ARPANET, was developed in the late 1960s and served as the first functional prototype of the Internet. ARPANET, which was first supported by the US Department of Defense, used packet switching to enable multi-computer communication across a single network.

The first distributed control network was the ARPANET. It introduced TCP/IP protocols initially. With the employment of these technologies, the Internet was essentially only getting started. It was created with the fundamental goal of facilitating communication among scientific users.

Thus, it is ARPANET.

For more information about ARPANET, click here:

https://brainly.com/question/28577400

#SPJ2

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?

A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above

(10pts)

Answers

I would have to say answer b

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

How would you rate your prior knowledge or comfort level with the topic of technology applications?


A.

I am a technology application expert.

B.

I know a lot, but not everything about technology applications.

C.

I know a few things about technology applications.

D.

I am not familiar at all with technology applications.

Answers

Answer:

A

Explanation:

I know cyber security and Javascript and also a framework called svelte to create websites.

helppppppppppp pleaseee​

Answers

Answer:

3. Multimedia Projectors

Explanation:

Ive had this quiz before lol

Answer:

c

Explanation:

its c

What is the unique name given to a class called?

Answers

Answer:

A class is an extensible program-code template for creating objects.

Source: https://en.wikipedia.org/wiki/Class_(computer_programming)

,  Hope this helps:)

Have a great day!!

what information most likely presents a security risk on your personal

Answers

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

Date of birth.Occupation.Religion.Gender (sex).Location.Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: https://brainly.com/question/21765376

The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable​

Answers

Answer:

Cat 5 cable

Explanation:

The ethernet cable is also known as Cat 5 cable.

why is a fragmented disk slower than one that is defragmented?

Answers

Answer:

Explanation:

The fragmented program has parts stored all over the hard driven. The computer has to keep on checking for where the next fragment is. All if this takes time especially if the program that you are trying to load is very large.

If the sectors for a program are consecutive, that makes loading a whole lot easier.

which device allows you to convert sounds into digital format to be used on the computer​

Answers

the correct anwser is ADC

are special characters usually found on the keyboard?

Answers

Answer:

No

Explanation:

When typing in predefined characters, Automatic substitution feature will change the characters into a symbol or special character. No.

Other Questions
Rose thinks Bruno and Gaston are _____.lazyzdumzb funselfishthe z is to make it so brainly says the question is okay just ignore them Describe TWO characteristics of limestone that makes it prone to chemicalweathering. halp now if u pro i will give brainli Which formula is best for obtaining physical fitness true physical activity 10. Four forces act on a hot-air balloon, shown fromthe side in the figure below. Find the magnitude anddirection of the resultant force on the balloon.enollsuganomu5120 N1520 Nnominacoat950 NBideobibiswerwoblerSIvo4050 N Hello! I need help with coordinate planes in math. I don't need an explanation, because I do kind of understand it. If you don't know the answer, please don't answer it. If you have any questions about the question, please drop in a comment! Thank you! Which ordered pairs is a solution to 5x + 3y > 12?A. (3, 9)B. (-5, 5)C. (3, -6)D. (-2, -5)E. (2, 8)F. (-6, 0) What organisms use the carbon dioxide produced by animals Photosynthetic organisms like grass are able to ________. Group of answer choices turn light energy from sunlight into sugars use water they take in through their leaves as a final electron acceptor use molecules in the air as a major source of carbon make all of their organic matter from organic molecules in the soil if a= 2, b= -3 and c= 4 evaluate ab-bc How much more interest is earned on an investment of $12,585 at 3.5% interest over 5 years if the interest is compounded annually rather than earning simple interest? a. They are the same. b. $159.65 c. $2,362.03 d. $12,744.65 Please select the best answer from the choices provided A B C D Which of the following is NOT a property of a mineral?naturally occurring, crystalline structureinorganic substancean ever changing unknown chemical composition (what it is made of)always a solid; never a liquid or gas What happens to prey populations when predators eat some individuals Paul has three cube-shaped boxes. Each box is a different size and they are stacked from the largest to the smallest. Some information about the boxes is given below. Answer questions 15 below. The combined volume of the three boxes is 1,197 cubic inches.The area of one face of the medium box is 49 square inches.The volume of the smallest box is 218 cubic inches less than the volume of the medium box.1. What is the volume of the medium box? Explain.The edge length of the medium box is StartFraction StartRoot 49 EndRoot Over 2 EndFraction commaStartRoot 49 EndRoot commaRootIndex 3 StartRoot 49 EndRoot commaStartFraction 49 Over 2 EndFraction comma which equals nothing. The volume of the box is the edge length squared,doubled,tripled,cubed, which equals nothing cubic inch(es).inch(es).square inch(es). While you push a box you begin to decrease the force you are exerting on the box. When will the box reach equilibrium?A. When the force you are exerting on the box is equal to 0.B. When Fyou on box = -Fbox on you.C. When the force of the box becomes Fyou on box < Fbox on youD. The box will never reach equilibrium. plss helpppppppppppp plssss PLEASE HELP!! THIS COUNTS FOR 18 PERCENT OF MY GRADE!!!! harry and his 3 friends decided to order pizza, and the cost was $42.24. How much money will each have to pay? The sum of three numbers is 66. The second number is twice the first and six less than the third. find the numbers I dont know this no links though