Which of the following best describes professional behavior in the IT field?

Answers

Answer 1
Answer - teaching others about technology in order to increase IT knowledge in the community
Answer 2

Answer:A

Explanation:


Related Questions

The basic premise of ___________is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.

Answers

Answer:

Radio Frequency Identification (RFID)

Explanation:

A Radio Frequency Identification uses a tag that is made up of of a tiny radio receiver and transmitter, that transmits digital data when it receives an electromagnetic pulse from a nearby RFID reader device. This makes it possible to track an item, animals, or even a person by placing a RFID tag on it, and then monitor the tagged object over a network.

Which is true regarding a problem statement? It provides a vision of the unsolved problem. It is not usually necessary for a successful software development effort. It describes how to increase profits and decrease expenses. It clearly describes the issues that contribute to a problem.

Answers

Answer:

It provides a vision of the unsolved problem

Explanation:

Answer:

It clearly describes the issues that contribute to a problem.

Explanation:

A problem statement clearly describes the issues associated with a problem and the method for solving the problem.

Which features of Word are used to separate numbers and text into columns? Check all that apply.
ruler
Tab key
left tab
right tab
decimal tab

Answers

Answer:

ruler and decimal tab

Explanation:

The features of Word are used to separate numbers and text into columns are the ruler and the decimal tab.

In order to split text into columns, the following processes are required:

The user has to open the document.Then, one will select the page layout tab.The user will click on columns command in the page setup group.Then, there is a list of options that's used in splitting the text into columns.Then, the user will select the desired option.

In conclusion, the correct options are A and E.

Read related link on:

https://brainly.com/question/8950542

When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first

Answers

Answer:

There are may steps in this procedure but there few steps that do first to access your mobile with your website.

Explanation:

When we are looking in our website and easily accessed by the mobile users, It is easy for them.

There are certain steps that should do first.

First step is that you have to redesign the website color schemeTo optimize your websiteTo create the mobile appNow to shorten the content in website.

Bruce needs to have a drive to rerecord data on the used DVD

Answers

Answer:

DVD- RW

Explanation:

When designing a user interface, you can choose between the _______ or ______ layout Group of answer choices

Answers

Answer:

command line interface, graphical user interface

Explanation:

User interface design, commonly known as UI design may be referred to a visual layout of the elements which a user  interacts with in using a particular website, or some technological product.

It mainly focuses on what the user might need to operate or use the webpage  or a product and it ensures that the it has easy accessing elements to control and use the product.

There are two common  type of designs of the user interface. They are :

-- command line interface which contains only text

-- graphical user interface containing images and graphics

Help Pleaseeee? Which tool is used to create the World Wide Web? A. HTML B. Web Coder C. Application Software D. JavaScript

Answers

The correct answer would be A, I did it and A was right. :)

what is an example of an innovative solution to an engineering problem?

Answers

Answer:8 of the Greatest Challenges Facing Engineering

The climate crisis. ...

Making water clean and accessible. ...

Providing enough food. ...

Personalised and relevant education. ...

Improving health care. ...

The refugee crisis. ...

Cyber security. ...

Enlisting the youth.

Explanation:This may or may not help

Match the following.A. URL B. Web browserC. Web hostingD. Web pageE. World Wide Web1. A subset of the Internet where Web pages written using HTML can link together and can be displayed by a Web browser.2. A type of software that is capable of searching and retrieving web pages through the World Wide Web on the Internet.3. Uniform Resource Locator; an identifier that combines the domain name and the server location to tell the Web browser where the specific web page is located.4. A service where server stores all the information for a Web page and makes it available for other computers to access.5. A document that is create in Hypertext Markup Language or Extensible Hyper Text Markup Language that can be located by a Web browser and accessed through the World Wide Web.

Answers

Answer:

The answer to this question can be defined as follows:

A =  3

B= 2

C= 4

D= 5

E=  1

Explanation:

In this question, the matched point is defined in the attached file. please find it.

Sometimes when a baby is born they need to be kept in an incubator for a period of time. A manufacturer would like to design a new baby alarm to be used in the incubator. This alarm should only sound if it is switched on AND when the temperature becomes too cold OR the baby starts crying. Using the following: S = alarm switch T = temperature C = baby crying A = alarm a) Draw a truth table from these conditions to show when the alarm sounds. b) From your table produce a Boolean expression to represent the baby alarm c) Build a logic circuit on logic that is capable of carrying out the expression. Screen shot the final circuit.

Answers

A Ahfbcb

Explanation:

what are the three different type of solution?explain them.

Answers

Explanation:

Solid - A substance that can be felt and held

Liquid - can go into any shape of a container

Gas - exists in the atmosphere and very light

Even closed systems are never perfectly closed.
true false​

Answers

Answer:

True

Explanation:

You can learn through many different textbooks that a closed system is always closed.

Where is the quick access toolbar located?

Answers

Answer - The Quick Access Toolbar, is located above the Ribbon (top-left) and provides access to commonly used features and commands, such as Save and Undo/Redo. Both the Ribbon and the Quick Access Toolbar can be customized.

The CPU converts into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of . Another name for the CPU is .

Answers

Converts data into information

Mathematical sequences

Microprocessor

The CPU converts instructions and data into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of electrical signals and calculations. Another name for the CPU is brain.

The CPU, or central processing unit, is the primary component of a computer that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer.

The CPU interprets and executes instructions, performs calculations, and manages the flow of data within the computer system. It is responsible for coordinating and controlling the activities of other hardware components, such as memory, storage, and input/output devices, to carry out tasks and run programs.

Therefore, the CPU converts instructions and data into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of electrical signals and calculations. Another name for the CPU is brain.

Learn more about CPU visit:

brainly.com/question/21477287

#SPJ2

Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) The Internet protocols are changed every year to adapt to the new devices that have been connected to the network b) While the number of devices connected to the Internet has grown, the network itself has not grown c) The protocols of the Internet were designed to scale as new devices are added d) The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network

Answers

Answer:

Its C, they were designed to scale as new devices are added,

Explanation:

The internet has responded to the increasing number of devices by designing the protocols of the internet to scale as new devices are added. Option c is correct.

Internet protocols are rules that enables routing and addresses data packets in such a way that they have the ability to move across various networks and get to their right destinations.

Read more on https://brainly.com/question/23230754?referrer=searchResults

i need random facts about bill gates.

Answers

He is the co founder of Microsoft

What is a step by step procedure written to carry out a task?

Answers

Answer:

A. Algorithm

Explanation:

A computer uses algorithm (a well-defined procedure ) to solve a problem.

write down
the three part of a computer

Answers

Answer:

monitor motherboard keyboard

Explanation:

:) look with you eyes

Which file type is typically used for videos? GIF MPEG MP3 PDF

Answers

Answer:

MPEG

Explanation:

A GIF is a short repeating low-quality video clip

A MP3 file is an audio file

A PDF file is a text document

MPEG is the international standard for encoding and compressing video images

Hope this helps!

(Please mark Brainliest!)

Answer:

MPEG

Explanation:

took the test

A goal a student plans to achieve by tomorrow is described as a(n) A. extended goal. B. short-term goal. C. normative goal. D. long-term goal.

Answers

Answer:

I believe is B

Explanation:

its a short term goal-

Answer:

b

Explanation:

Which would be a responsible use of technology used by victims of cyberbullying?
finding ways to strike back at bullies online.
O buying software that allows them to track down bullies.
O changing passwords and screen names regularly.
O pretending to be someone else to hide their identity.

Answers

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

Answer:

C

Explanation:

I took the quiz :)

n macOS, what launch point provides access to almost all the settings needed to administer a macOS system?

Answers

Answer:

System preferences.

Explanation:

MacOS is the primary operating system designed and developed for Apple computers (MacBook).

In macOS, system preferences is a launch point that provides access to almost all the settings needed to administer a macOS system. The system preferences allow users to change various settings on their Mac computers such as changing the desktop layout, desktop picture (wallpaper), size and location of the dock, font size, appearance, energy saver etc.

You have been putting off writing a research paper, and now it's due in two days. You have gathered a few notes, but fear you will not complete the assignment on time. You are considering purchasing a paper from a website that produces research papers on any topic, though you are concerned the content might not be original. Should you take a chance and purchase the research paper? Is using the website's services even ethical?

Answers

Answer:

No! You should not! This is not ethical at all because you did not do the work yourself, and you are benefiting (or lowering your grade) with work that is not yours! Also not to mention, can get caught and recieve a zero!

Explanation:

Answer:

No, this is not a good idea.

Explanation:

This is not a good decision.

First of all, you should avoid procrastinating things, especially important papers.

Additionally, using a website to write your paper is unethical, dishonest, not to mention it is plagiarism. Plagiarism is when you take someone else's words or work and say it is your own.

Teachers, professors and schools have many ways to detect plagiarism. You could be caught, receive a failing grade, and in some cases, be expelled.

It is never a good choice to pay for other people to do your work. Prepare accordingly and write it yourself!

___ are stem professionals who collect, analyze, and interpret data

Answers

Answer:

Statisticians

Explanation:

Statistics is a science, technology, engineering, and math (STEM) related degree that involves acquiring knowledge through data. A statistician sources data through administering questionnaire, taking polls and carrying out experiments. From the collected data, the statistician makes use of statistical concepts to sift through large data sets, develop data interpretation and deduce relevant information from the data and present meaningful conclusion to the relevant bodies in fields such as education, manufacturing, marketing, government and healthcare.

Answer:

statiscians

Explanation:

Which of the following lists contains the five essential elements of a computer?

Answers

Answer:

The five essential elements of an (industrial) computer are chassis, motherboard, durability, longevity, and peripherals.

Select the correct answer.
Which finger would you use to type the letter t in the word Wait?
A right-hand little finger
B.left-hand thumb finger
C. right-hand index finger
D. left-hand index finger

Answers

Answer: D

Explanation:

Answer:

D

Explanation:

A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers.

Answers

Answer:

Network

Explanation:

When you have devices connected together to pass, share and exchange information; this connection is regarded as network.

Take for instance. you need to get a file from your friend's mobile phone; when you connect your phone to your friend's phone via Bluetooth, Xender or via whatever convenient means of connection; that is a network.

Another instance is when you connect multiple systems in a CBT examination; this connection is also regarded as a network.

Answer:

network

Explanation:

Operating systems the most common form Microsoft windows in Mac OS discuss the similarities and differences between which two systems

Answers

Aside from the way that the two of them have GUIs, nearly everything is extraordinary. On an unadulterated specialized level, there are almost no similitudes.  

The pieces are extraordinary. They are even various sorts (darwin is small scale bit while windows piece is half and half portion).  

macOS is UNIX-like and generally POSIX consistent. Windows isn't care for anything and not agreeable to POSIX principles.  

macOS can run on practically any machine by structure yet they run completely just on a couple because of absence of drivers. Windows can run on practically any machine and isn't intended for just explicit equipment.  

The OS level interfaces are extraordinary, which implies drivers are composed contrastingly for them.  

They utilize distinctive document frameworks.  

The system stack execution are unique despite the fact that the two of them adhere to the IETF/IEEE norms and hence, can intercommunicate.  

The manner in which you introduce and uninstall Application is extraordinary.

What's a possible sign of
malware?
A. Lots of popups
B. Being redirected in search engines
C. Computer running slowly
D. All of the above

Answers

Answer:

All of the above

Explanation:

I got a 100% on everfi ignition :) hope you do too

Lots of popups, being directed in search engines, and the computer running slowly are possible signs of malware. Thus, option D is correct.

What is malware?

Malware is a type of malicious software that is designed to infiltrate computer systems, networks, and devices with the intent of causing harm, stealing data, or disrupting normal operations. Malware can take many forms, including viruses, worms, Trojan horses, ransomware, spyware, adware, and other types of malicious code.

Malware can be spread through a variety of methods, including email attachments, infected websites, malicious software downloads, social engineering, and other types of cyber attacks.

Once a system is infected with malware, it can be used to steal personal information, log keystrokes, control devices remotely, send spam, and launch attacks on other systems. Hence, option D is correct.

Learn more about malware, here:

https://brainly.com/question/22185332

#SPJ2

Which statement is most likely to be true about a computer network?

a. A network can have several servers and only none client.

b. A network has to have physical cables connecting the devices in the network.

c. A network can have several client computers and only one server.

d. A network can consist of a single computer with no other devices in communication with that computer.

Answers

Answer:

c. A network can have several client computers and only one server.

Explanation:

Computer Network is a term that describes the connection of one or multiple computers to a server such as Local Area Network, LAN, or Wide Area Network, WAN, basically for the purpose of transferring electronic files among connected computers.

Hence, the statement that is most likely to be true about a computer network is "a network can have several client computers and only one server."

Answer:

A network can have several client computers and only one server.

Explanation:

I just did the Instruction/Assignment on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

Other Questions
A study by van der Vink and students at Princeton University suggests that the level of democracy is more important than the strength of an economy in determining the death toll of a natural disaster.a. Trueb. False TRUE OR FALSE: Metacognition is mostly an inborn trait, and it is clearly early on which children have it and which dont find the additive inverse of 1/2 + 1/6 + 1/12 The stock solution is 100 M the protocol calls for 10 mL solution of 80, 60, 40 and 20 M. Compute the table.Target Concentration(M) Volume of stock(mL) Volume of water(mL)20406080 what are different type of plastids explain them? Decide if the following indefinite article and noun agreement is CORRECT or INCORRECT. Las bolgrafos. In parallelogram RELA you are given that the measure of angle R = 110 degrees. Find the measure of angle E? Help me solve thiss Has population of city been growing or getting smaller? A small rock with the mass of 6 g is dropped into a graduated cylinder with 20 mL of water. The water rises to 23 mL. What is the density of the rock? What are one or two examples of "bad citizenship" that you see on a regular basis? Definition of escape velocity? I've been stuck on this for about 2 hours but it still doesn't make any sense to me, please helpppppppppp A boat is being pulled into a dock with a rope attached to the boat at water level. When the boat is 12 feet from the dock, the length of the rope form the boat to the dock is 3 feet longer than twice the height of the dock above the water. Find the height of the dock. What are the believability and authority of a speaker called?A. LogicB. Credibility C. EmotionD. Appeal Prime Cost and Conversion Cost Benton Engineering Services Company incurred the following during 2019: Direct labor $60,000 Overhead 110,000 Selling expenses 56,000 Administrative expenses 95,000Calculate prime cost and conversion cost for Benton Engineering Services Company during 2019. The fall of Alexander the Great Empire can be mostly attributed to what reasons Both a plant and a fungus are composed of cells. According to the cell theory, the cells ofA a fungus can take in nutrients but are unable to produce new cells.Bboth organisms are able take in nutrients, and both can produce new cells.Ca plant can produce new cells but are unable to take in nutrients,Dboth organisms are able to take in nutrients, but only plants can produce new cells. How can a new element be made? What is this? k/8-5-6 25 tens=______hundreds 5 tens