Which of the components of the systems model provides information so
the system can adjust its function? *
A. input
B. feedback
C. process
D. output

Answers

Answer 1

Answer: Feedback

Explanation:

The input components of the systems model can consist of resources like people, energy, tools, capital, etc.

The feedback components of the systems model provides information so

the system can adjust its function. An example of the feedback mechanism for a system is the progress bar which shows when one is downloading a file on iTunes.


Related Questions

Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?

Answers

Answer: Rainforest

Explanation:

A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.

Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list

PLEASE HELP THANK U!!

Answers

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

What is a number that refers to the position of an item on a list?
variable
parameter
operator
index
PLZ HELP IM TIMED

Answers

Answer:

Parameter

Explanation:

a parameter is an argument that is used to call something, for example in an array when 0 is referenced as the first element in the array.

Select three advantages to using digital video.

A) Digital video appears to have more depth.

B) Digital video can capture a greater range of brightness.

C) Digital video is much less expensive than film.

D) Digital video be easily edited and shared.

E) Digital video can be viewed in real time where it was taken.

Answers

C. E and D, I believe. I apologize if I’m incorrect!

Answer:

Digital video be easily edited and shared., Digital video is much less expensive than film., Digital video can be viewed in real time where it was taken.

Explanation:

what is meant by cyber law​

Answers

Explanation:

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device


After you have figured out your storyline, what should be the next thing to
focus on?
1.character devlopment
2. What you want to name your video​

Answers

Answer: 2

A storyline figured out means you should already know the plot, setting, conflict, theme and characters (character development)
Figure out the story line, plan things out


A file format refers to the background in a presentation.
True
False

Answers

Answer:

False

Explanation:

Required

Describe file format

Literally, file format means file extension and it describes the type of file.

For instance:

. d o c is a file format of word documents

. j p g is a file format of  images

etc.

Hence, the statement is false

Answer: The answer is false

Explanation: File formats are linked to certain programs

Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.

Answers

Answer:

2nd statement is True dear!!!

Answer:

Deques can contain lists.

A deque is a type of collection.

Deques can be created empty.

Explanation:

Answers can be found in Edge instructions

"You can make a deque whose members are lists."

"You can create an empty deque or create a deque with a list or a string."

"You have used lists and deques, which are two types of collections used by Python. "

Can anyone help me solve this?

Answers

Answer:

what should be basically be done in this question?

that’s not a question

What information is automatically generated from the company identifier and product name?

A.
project name
B.
class prefix
C.
bundle identifier
D.
organization name

Answers

I think it’s project name, but I’m not 100% positive

como se genera la electricidad con energias no renovables
porfa alguien me ayuda llevo muchas horas buscando la respuesta
doy corona y todos lo puntos que pueda

Answers

Answer:

efeiueur eiuube erferve

Explanation:

Answer:

La energia no renovable proviene de fuentes que se agotaran o no se repondran durante miles o incluso millones de años.

Los combustibles fósiles se queman para generar energía y electricidad. Por ejemplo, carbón.

You should not photograph where unless you have permission?
O A public park
O Your backyard
O A parade
O Into someone's window
PLZ HELP ME

Answers

Answer:

Into someone's window

Explanation:

We should not photograph into some one's window, unless we have permission

Answer:

Hello There!!

Explanation:

I believe the answer is O Into someone's window.

hope this helps,have a great day!!

~Pinky~

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters.
For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_%E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#".
Which of the following statements about byte pair encoding is true?
A. Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.
B. Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character.
C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.
D. Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

Answers

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

1. Ngangingazi Ukuthi Ukulalela Abazali Nothisha Bami Kuletha Impumelelo
Enhle Kangaka.
[50]​

Answers

Answer:

yebo kumele ubalalele ngoba ayikho into yakho eyophumelela ungabalalelanga abazali

What is the output of:

print (8 % 4)

Answers

Answer:

0

Explanation:

The statement, print(8 % 4) will produce the output 0 ;

The print statement is an inbuilt function which is used to output a typed string or display result of a Mathematical calculation and so on.

The expression in the print statement gives 0;

8%4 means, the remainder when 8!is divided by 4 ; 8 /4 gives 2 without a remainder. Meaning that :

8%4 = 0

Hence, print(8 % 4) = 0

Transferring data from a remote computer to a local computer is .....​

Answers

The answer is uploading

You are going to create multiple functions that will take in the appropriate measurements as parameters and calculate the area of the specific shape.

The following shapes must be included:
Square, Triangle, Circle, and Trapezoid

Feel free to add on more shapes if you want!!

Answers

Answer:

circle

Explanation:

Answer:

circle

Explanation:

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

what is the effect of flattening layers in image editing?
you can reduce file size by flattening layers. this operation mergers all ___ layers into the background and discards hidden layers.
all ___ areas that remain are filled with white.

first blank
a. black
b. colored
c. transparent

second blank
a. dark
b. visible
c. bright

Answers

The answer to this blanks are black and visible

Answer:

Hello There!!

Explanation:

I believe the answers are:

-First blank=>c. transparent

-Second blank=>b. visible.

hope this helps,have a great day!!

~Pinky~

Kirstie needs a computer for word processing, emailing, downloading high definition TV
series from an online store and basic photo editing.
Which computer would you recommend for Kirstie? Give reasons for your answer.

Answers

NmmkkjdijdjrjrjdjirjrkdidiL028

Hi there!
I am writing a research paper on Satellite internet. I have about 4 out of 6 pages of information written down. What are some topics to talk about regarding satellites? It does not have to be specifically about satellites. Just some things to add to the paper. I am not sure what subject it fall under, so i'm going to post it twice.
Thank you in advance.

Answers

Answer:hi there

Explanation:

Satellite Internet access is Internet access provided through communication satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds


Which tab is used to create a
new e-mail?

O File
O View
O Folder
O Home

Please help!!!!!!!!!!!!!

Answers

Answer:

Mail tab

Explanation:

Please mark as brainliest answer as it will also give you 3 points

File , brainliest answer. Hope this helps

Explica la importancia que tiene el plan de trabajo (cronograma) en los proyectos y porque se realiza antes de ejecutar la solución seleccionada. ayuda es para hoy :c

Answers

Answer:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación del proyecto) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

Explanation:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.

What are the steps to add a bibliography to a document? 1. Create a using the proper steps. 2. Go to the tab on the ribbon. 3. In the Citations & Bibliography group, select the Bibliography drop-down menu. 4. Select the correct formatting from the three choices. 5. A bibliography is then added to the

Answers

Answer:

The steps required to add a bibliography after adding the sources of the information contained in the document and marking the references made in the text, are;

1. Click to select insertion point of the bibliography

2. Select the Reference tab by clicking on the Reference tab in the ribbon

3. Within the Citations & Bibliography group, select Bibliography to open  a dropdown list of bibliography format

4. Select the applicable format

5. By selecting the desired bibliography format, the bibliography is inserted at the selected insertion point of the document

Explanation:

Answer:

1. Create a

✔ citation

using the proper steps.

2. Go to the

✔ References

tab on the ribbon.

3. In the Citations & Bibliography group, select the Bibliography drop-down menu.

4. Select the correct formatting from the three choices.

5. A bibliography is then added to the

✔ bottom of the document

Explanation:

Edg 2021

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

C. Assessment Application
MATCHING TYPE
Directions: Match column A with column B. Write the letter of your
answer on the space provided.
А
B В
1. Disk Cleanup
A. Repairs and cleans the Windows Registry
2. ASC
3. Scandisk
B. Repairs registry errors, remove "junk" files,
and ensure your PC is fully protected
C. Creates and deletes disk partitions
D. Accesses various information's about your
computer
E. Tunes up and maintains your PC automatically
F. Optimizes use of space on a disk.
4. ASC Pro
5. Format
6. CPU-Z
7. Defrag
G. Tunes up and maintains your PC, with anti-
spyware, privacy protection, and system
cleaning functions
H. Prepares a hard drive prior to use.
I. Checks for physical errors on the disk surface
J. Removes unused files.
8. ARO 2013
9. Fdisk
10. RegDoctor
--00 End of the Module 00--​

Answers

Answer:

[tex]\begin{array}{lll}&A&B\\1&Disk \ cleanup& Removes \ unused \ files\\2&ASC&Tunes \ up \ and \ mantains \ your \ PC \ automatically\\3&Scan \ disk &Checks \ and \ removes \ errors \ on \ the \ disk \ surface\\4&ASC \ Pro& Tunes \ up \ and \ maintains \ your \ PC, \ with \ anti-spyware, \ privacy \ prot \\\\\end{array}[/tex][tex]\begin{array}{lll}\\5&Format&Prepares \ the \ hard\ drive\ prior \ to \ use\\6&CPU-Z&Accesses \ various \ informations \ about \ your \ computer\\7&De-frag&Optimizes \ use \ of \ space \ on \ disk\\8&ARO \ 2013& Repirs \ registry \ errors, \ removes \ "junk" \ files\\9&Fdisk&Creates \ and \ deletes \ disk \ partitions\\10&RegDoctor&Repair \ and \ cleans \ the \ windows \ registry \end{array}\right][/tex]

Explanation:

what type of data type is 1+78-5​

Answers

Answer:

Integer

Explanation:

Given

[tex]1 + 78 - 5[/tex]

Required

The datatype

1, 78 and -5 are all numbers and they are without decimal points,

When a number is without decimal, such number is referred to as integer.

Hence, the datatype is integer

how much video does a 10gb video hold i will give brainliest for first correct answer

Answers

Answer:

2,000 songs

Explanation:

Other Questions
Fiona leaves $1600 in the bank for four years. It earns compound interest of 4% each year. Calculate the total amount Fiona has in the bank at the end of the four years what is the National Bank veto why do objects cool down 2. Our solar system is made up of the Sun, 8 planets, and other bodies such asasteroids orbiting the Sun. The solar system is very large compared to anything we see onEarth. The distance between planets is measured in astronomical units (AU). One AU isequal to 149.6 million kilometers, the average distance between the Sun and Earth. Scalemodels are useful for helping us understand the size of the solar system.Mr. Wilsons science class made a scale model of the solar system. They went out to theschools football field, and they used the chart shown below to mark out the scale distancefrom the Sun to each planet MATH PROBLEM SOLVING Find the volume of the prism Draw and label the solution to each Define the word term John had to pay a combined electric and gas bill $150. The electric portion of the bill was $90. What is the ratio of money spent on electric to that on gas? A multicellular organism. Define multicellularity and explain how you know this organism is multicellular. What is the missing number that will complete the factorization? In order to preview an attachment in an e-mail, click the attachment in the ______Pane.Help ASAP!!!! Which of the following best explains how meiosis, followed by fertilization, ensures genetic variation? Why are there 52 genders? (school related) 2.) Write the probability as a fraction in simplest form. P (consonant) *5 pointsBAF.DE1/62/3 0.752 the man is eating banana ( into passive) Ill mark brainliest Who was Edgar Allan Poes nemesis and what significant role did he play in Poes life? Bilal goes for a cycle ride he starts at 3pm he finishes at 5:38pm he has a total of 25 min rest during the ride work out how long in hours and minutes he spends cycling Jon enjoys fishing (which costs $20) and golf (which costs $30) and has $140 to spend each month on these activities. Last month, Jon fished four times and golfed twice. The last fishing outing provided Jon a marginal utility of 50, and the last round of golf provided a marginal utility of 120. What is Jon's marginal utility per dollar spent on the last time fishing