Answer:
Compress media
Explanation:
This zips the file into a smaller size which can now be sent. It can be decompressed to view.
Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.
Answer:1. Advanced house framing
Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.
2. Cool roofs
Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.
3. The right exterior doors
Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.
4. Skylights
Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.
5. Window treatments
Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.
Explanation:
When should a user consider restoring the operating system.
A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.
What is an operating system?This is known to be a software that aids a computer's basic functions, such as working on tasks and others.
Note that A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.
Learn more about operating system from
https://brainly.com/question/22811693
#SPJ1
Which of these would you least expect to find at an fbla-pbl meeting?
planning a community service project
role-playing to develop leadership skills
students working on iste certification
working with local business leaders
role-playing to develop leadership skills
Complete the sentences.
The ACCUPLACER exam is a diagnostic test that evaluates the students’ progress in a specific academic field. It is divided into sections that assess reading, writing, and mathematics skills. The
section tests students’ ability to solve problems related to algebra, trigonometry, and geometry. The
section tests how well the students can write. The
section tests the students’ knowledge about sentence structure.
Answer:
fiances
Explanations it just is
An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?
The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.
How document be protected?
There are many ways a computer file can be protected. The ways to protect the document are,
Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.
Learn more about the data protection here;
https://brainly.com/question/4219149
#SPJ2
One sign of a virus infection is that available memory is less than what should be available. Group of answer choices True False
Answer:
[tex]True.[/tex]
analog computer are general purpose computer true or false
Answer:
false
Explanation:
Analog computers were widely used in scientific and industrial applications even after the advent of digital computers
Stories used to be told only by:
OA. digitally recording them.
OB. saying them aloud.
OC. writing them down.
OD. drawing them on paper.
Answer:
OB. saying them aloud.
Explanation:
In the olden days, materials like recording devices, pens or paper weren't invented, so people had to know stories by heart.
Which best describes how information is sent on the internet?
Answer:
a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are
Explanation:
A series of events that gets the computer ready for work is known as what?
soft boot
hard boot
boot loader
boot sequence
Answer:
Boot Sequence
Explanation:
Compare and contrast sources and types of credit, including costs and benefits of installment
credit, collateralized loans versus unsecured credit, credit cards, mortgages, auto loans, and
student loans.
Answer:
loan your mom
Explanation:
If “A” represents in binary 10011001, what will be the value of word “CAB”?
Answer:
01000011 01000001 01000010
Explanation:
You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.
Carrie needs to keep a budget for her department. Each employee in her department sends her travel expenses. In cell, C2, C3, C4, and C5, she enters the total of each employee’s expenses. In cell B1, she enters the original amount of money the department was allotted for spending. What formula should she use to calculate the amount of money the department currently has?
=B1 -(C2+C3+C4+C5)
=B1-C2+ B1-C3+B1-C4+B1-C5
= (C2+C3+C4+C5)-B1
=(B1+C2+C3+C4+C5)
Answer:
(C2+C3+C4+C5)-B1
Explanation:
Answer:
=(C2+C3+C4+C5)/4
Explanation:
add all numbers together then div. by the total amount of numbers is how you get the average.
10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. you may prompt for the two integers as you wish; the prompt will not be included in the grading. ex: if the input is:
he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus
What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use
24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).
What is Wireless Equivalency Protocol (WEP)?Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).
According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).
Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151
#SPJ1
100 POINTS ANSWER CORRECTLY AND ANSWER QUICKLY I DONT HAVE MUCH TIME
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
Can you identify one syntax error and one logic error in these lines? Why do you think a programmer might have made the logic error?
Yes there's syntax error .
After if there's colon so the next line or code block should start after some spaces(min 4)
The correct code is
[tex]\tt def(a)[/tex]
[tex]\tt if\:a<10:[/tex]
[tex]\quad\tt print(a,"is\:greater\:than\:10")[/tex]
Help me with this question asap please :)
Answer:
I think it's sequence as there is a pattern of connection in the words
Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program
If he does not have another computer available to run the anti-malware program then.Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.
What is Antivirus?Antivirus is vital even in case you are on a Mac or Windows device, which each includes a few stages of virus safety constructed in. For general safety with endpoint safety and response, and blocks in opposition to malware and probably undesirable programs, it is fine to put in a third-celebration antivirus software program.
Antivirus is a type of software program used to prevent, scan, discover, and delete viruses from a computer. Once installed, the maximum antivirus software program runs mechanically withinside the heritage to offer real-time safety in opposition to virus attacks. Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.
Read, more about the program:
https://brainly.com/question/1538272
#SPJ1
Android os is developed by
Answer:
It is developed by G oogle
Explanation:
Android os is developed by G oogle. It launched in 2008.
Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}
integer userInput
integer i
integer mid
integer array(20) number
userInput = 1
for i = 0; userInput >= 0; i = i + 1
if number[i] > -1
userInput = Get next input
number[i] = userInput
i = i - 1
mid = i / 2
if i > 9
Put "Too many inputs" to output
elseif i % 2 == 0
Put number[mid - 1] to output
else
Put number[mid] to output
When using outer and inner methods for recursion, typically, the outer method should check for a valid _____ and then call the inner method.
The statement that completes the blank is input value
How to complete the statement?From the question, we have the following concepts:
MethodsRecursionThere are two methods in recursions, and they are:
Inner methodOuter methodThe role of the inner method is to check for valid input value
When the input value is valid, this value is sent to the outer method
Hence, the complete statement is "The outer method should check for a valid input value and then call the inner method."
Read more about recursion at:
https://brainly.com/question/14208577
#SPJ4
what are trends in GPS ?
Answer:
New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.
Explanation:
Help ASAP this Answer is simple…
why is fair use important
Answer:
to ensure that the rights of the copyright holders are fair or balanced properly
Explanation:
hope this helps
You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files
To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.
What is a FTP server?FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.
It is a basic thing in transferring or sharing files between two computer networks.
Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.
Learn more about FTP server
https://brainly.com/question/27610307
#SPJ1
CODEHS: WHY is it important to know the difference between div and span?
Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.
Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but before you have logged on again
Answer:
last known good configuration
Explanation:
If you're having difficulties starting Windows, the Last Known Good Configuration, or LKGC for short, is a technique to get it started. It loads the drivers and registry data from the last time you began and shut down your computer successfully.
what word makes this inappropriate????
What could cause an external drive, like a usb flash drive, to not be recognized when plugged into a computer?.
The reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.
What is a USB flash drive?A USB flash drive is a drive is a small device that connect devices with computer or insert data to the computer.
A USB have capacity to hold data within, and the data can be transported to anywhere.
Thus, the reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.
Learn more about USB flash drive
https://brainly.com/question/14144068
#SPJ1
When you collaborate or meet with a person or group online, it is called
1. cloud computing
2. social networking
3. text messaging
4.web conferencing
When you collaborate or meet with a person or group online, it is called social networking.
What is social networking?The term social networking is known to be the act of meeting people online, interacting with them and even making friendship with them.
Therefore, When you collaborate or meet with a person or group online, it is called social networking.
Learn more about social networking from
https://brainly.com/question/1027666
#SPJ1
As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?a. Layer 4 switchesb. ToR switchesc. EoR switchesd. Layer 3 switchesAs a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?a. Load balancingb. NIC teamingc. Clusteringd. Port aggregationYou run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?a. Measured service.b. Resource pooling.c. Rapid elasticity.d. Broad network access.
The option that you will use to implement this change in your Windows devices is Layer 3 switches.
What are the layer 3 switches?A Layer 3 switch is is known to be one where a switch can carry out routing functions and also do its switching.
Note that The option that you will use to implement this change in your Windows devices is Layer 3 switches.
Learn more about Layer 3 switches from
https://brainly.com/question/14594641
#SPJ1