28. Which major NIMS Component describes recommended organizational structures for incident management at the operational and incident support levels?

Answers

Answer 1

Answer:

Command and Coordination .

Explanation:

Command and Coordination is the component of NIMS that explains leadership roles, processes and prescribed authoritative and organizational structures for incident management at operational and incident support levels. It also describes how these structures interconnect to handle incidents proficiently. In a nut shell command and coordination provides with systems, rules, standards and principles for standard framework for incident management. It comprises of 4 areas. First includes tactical activities to put in resources on scene. Second includes incident support which is managed at Emergency operations centers via operational coordination, resource procurement and data collection and sharing. Third is the policy advice and senior level decision making. Fourth is the outreach and interaction media for keeping them updated about the incident.


Related Questions

Which of the following is true of the learning phase of Web site production? It orients the designer to consider how audiences will use the Web site and where they will access it. It involves seeking information from clients about what they want in a Web site. The wireframe is developed to look like the final product, often in Photoshop or some other graphics program. The template is transformed into a working Web site. The completed and approved site is launched into the world.

Answers

Answer:

Option B is the correct answer to the following question.

Explanation:

Because the website production involves in looking for the information or data from the clients as related to the website, without the information the website developer unable to create our clients website and the first thing before creating the website is the information about what type of website the client wants after that, developer plan how to create his website before start.

The learning phase of website production is crucial for understanding how users interact with the site and for gathering client requirements. It involves creating a wireframe that outlines content placement without final design elements, followed by storyboarding with initial designs

During the learning phase of website production, designers must consider various important aspects before the actual development of the website begins. The main purpose of this phase is to orient the design around how audiences will interact with the website and to gather an understanding of the website's goals from the client. Often this phase includes developing a site wireframe, which serves as a blueprint for the website layout, highlighting the placement and size of content elements, but not the design specifics such as style or color.

Site wireframes are created keeping in mind the content elements and their locations, without delving into specific design attributes. The process extends into storyboarding, where initial designs including color schemes, typography, and rough images are added using graphic editors. This is completed before any coding begins, allowing for a thorough understanding of the website's structure, which ultimately facilitates the development process.

Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
Bluetooth
Cellular
Dual Display
Wireless

Answers

BLUETOOTH IS your answer

cause dual display is when you show whats on one device on another too

The _____ requirements are associated with the efficiency, maintainability, portability, reliability, reusability, testability, and usability quality dimensions. functional non-functional performance correctness standard

Answers

Answer: Non-functional

Explanation:

Non-functional requirement(NFR) are the the requirements that evaluates operation of any particular system.It consist of several factors for judging the system such as security, reliability, quality, utility, maintainability etc.These parameters depicts about how a system will perform the tasks.

Other options are incorrect because function requires are used for depicting about specific and certain function in system. Performance requirements deal with the parameter of operation execution.

Correctness and standard requirement are measure for correcting system and general needs in a system respectively.

Answer:

Non-Functional Requirements are the correct answer to the following question.

Explanation:

NFS(Non-Functional Requirements) is referred to the attribute of the system and it serves the design of the computer system side to side the not similar uncompleted works or matters because the following reliability, testability, performance is not the features of the computer system.

So, that's why the following option is correct.

Design elements that you place on the Slide Master appear on every slide in the presentation.
A. True
B. False

Answers

Answer:

The answer is "Option A".

Explanation:

The Slide Master is part of the Microsoft office that is available in the PowerPoint.This option is available on the top of the diagram that controls the themes, design, background, color, font, and placement of all dispositive. With Slide Master, the look of an existing theme can be easily adjusted or all the slides on your presentation can be updated. That's why this statement is true.

What should you enter at the command prompt to check the tcp wrapper configuration on your system?

Answers

Answer:

The correct answer to the following question will be tcpdchk.

Explanation:

tcpdchk stands for tcp wrapper configuration checker.

It is used to report the problems which will found on your tcp wrapper configuration while surveying and try to fix it where possible.

Type of problems that can reported by the tcpdchk. These are as follows:

Non-existent path names,Unsuitable use of pattern,Unreasonable arguments, etc

Hence, tcpdchk is the correct answer.

Write a method called all Less that accepts two arrays of integers and returns true if each element in the first array is less than the element at the same index in the second array. For example, if the two arrays passed are {45, 20, 300} and {50, 41, 600}, your method should return true. If the arrays are not the same length, you should return false.Test your method and print out to the screen in main() function the following callsa. all Less(arr1, arr2); (where arr1 = [1,2,3,4,5], arr2 = [4,5,6,7,8])b. all Less(arr1, arr2); (where arr1 = [1,2,3,4,5], arr2 = [5,6,7,8])c. all Less(arr1, arr2); (where arr1 = [5,2,3,4,1], arr2 = [4,5,6,7,8])d. all Less(arr1, arr2); (where arr1 = [5,5,3,4,5], arr2 = [9,9,9,9,1])

Answers

Answer:

The program to this question can be given as:

Program:

#include<iostream> //header file

using namespace std; //using name space

bool allLess (int arr1[], int arr2[]) //defining method allLess  

{

int a,b; //define variable

a=  *(&arr1 + 1) - arr1; //hold length of arr1

b=  *(&arr2 + 1) - arr2; //hold length of arr2

if(a!=b) //checking condition  

{

return 1; //return value

}

for(int i=0; i<a; i++) //loop

{

if( arr1[i]>=arr2[i]) //checking condition

{

return 1; //return value

}

}

return 0; //return value

}

int main() //define main method.

{

   int arr1[]={1,2,3,4,5}; //define array arr1 and assign value.

   int arr2[]={4,5,6,7,8}; //define array arr2 and assign value.

   cout<< allLess(arr1,arr2); //function calling

   return 0;

}

Output:

1

Explanation:

The Explanation of the C++ language program can be given as follows:

In the above program firstly we include the header file. Then a method is defined that is "allLess" this method accepts two arrays that are "arr1 and arr2". This function returns a boolean value that is true or false. Inside a function, we define a conditional statement and a loop in the if block we check the length of the arr1 array variable is not equal to arr2 array length. if this condition is true it will return false. In the loop, we define another if block in this block we check that if arr1 array elements are grater then equal to arr2 array element if this condition is true it will return false. At the end of both if block and loop the function will return a value that is "true". In the main method, we define two arrays and pass to the function and use (cout function) for print return value.

While cloud services are useful for small and midsize analytic applications, they are still limited in their ability to handle Big Data applications.1. True
2. False

Answers

Answer:

False

Explanation:

There are cloud applications which can effectively handle big data.

For example processing and handling big data technologies like Hadoop, Spark can be used on cloud.

Services like Amazon Web Services or Google Cloud Services allows users analyze big data with various tools.

Which is true about POP3 and IMAP for incoming email?
(a)Both keep email on an email server by default
(b)IMAP keeps email on an email server by default
(c)Neither keep email on an email server by default
(d)POP3 keeps email on an email server by default.

Answers

Answer:

Both keep email on an email server by default is true about POP3 and IMAP for incoming email

Explanation:

POP3 and IMAP have used setting parameters for incoming email in MS-outlook and lotus domino to receive emails for the end-user.

Normally pop3 will nor keeps mail in emails in the server. once the end-user receives mails for the specific account it deletes emails from the email server.

But IMAP keeps mail in the email server. So the end-user can retrieve the old emails in case he formatted or lost emails.

But email account has some limitation in size. If it is IMAP setting period cleaning should be done in the email server. If it is not done the end-user will not receive any email unless or until deleting the old emails.

Best method is to have pop3 account. But in pop3 still setting can be done in email server not delete for specific period of time.

You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides?

Answers

Answer:

Northbridge

Explanation:

A computer chipset is a group of circuits that coordinates and controls the data flow between components of a computer. These components involve CPU,  main memory,  cache memory, and devices located on the buses.  A computer has 2 main chipsets:   Northbridge and Southbridge

A northbridge or host bridge is one of the two chip sets on an Advanced Technology extended motherboard. It is also called memory controller. It controls communication between processor (CPU) and RAM. This is the reason of Northbridge being connected directly to the CPU. Northbridge chip set is in charge for tasks that demand the highest performance.

It is also called Graphics and Memory Controller Hub . It is responsible for communication between CPU, RAM and Graphics Card. Southbridge also connects to Northbrige. It also acts as a mediator which helps southbridge chip to communicate with the CPU, graphics controller and RAM. Northbridge is connected to the CPU by the front-side bus (FSB).

In process-based DO/S, resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control, processing each request fairly, providing service to the requestor, and returning to serve others.

Answers

Answer:

Guardians or Administrators

Explanation:

In process-based DO/S, resources are controlled by servers called Guardians or Administrators.

The servers are used for high level corporations and for sharing of actions and data. They are responsible for providing services to the requestors.

Many websites ask for phone numbers. Write a Raptor flowchart which inputs a string containing a phone number in any format and outputs it in the standard format.

Answers

Answer:

This problem consists in how you can search for the telephone number of x person in a directory. We try to make it as simple as possible, and in a general way; Without declaring variables or anything, we only did the process necessary to locate a number.

First we made the algorithm

1.Start

2.Go to the section of the municipality where the person lives

3.Locate the first letter of the first surname.

4.Locate the full last name

5.Find the second last name

6.Find the person's name

7.Find the phone

8.End

To make the flowchart we use 'Raptor'

 and so we left the diagram

   What we take into account first is to locate

the section in which the person we are looking for is located,

then go to the section with the initial letter of the first surname,

then look for the full last name,

and since there are many people with that last name,

we look for the second last name and lastly the first name; And so we got to the phone.  

Therefore, in the flowchart, at last we add all the variables to reach the telephone, because this is the case in a directory; You add all the steps you did and as a result you get the phone number of the desired person.

Given an int variable datum that has already been declared, write a few statements that read an integer value from standard input into this variable.

Answers

Answer:

Following are the  Statement in the Java Language .

Scanner out = new Scanner( System.in); // creating the object

datum = out.nextInt(); // Read the integer value bu using the instance of scanner class

Explanation:

In the Java Programming Language The scanner class is used for taking the user input from the standard input The definition of scanner class is java.util package means that if you taking the input by using scanner class firstly importing the predefined package i.e Java.util.

The description of the above code is given below

Scanner out = new Scanner( System.in);: This statement created the instance "out" of the scanner class which is used for taking the input.datum = out.nextInt(); : This statement taking the integer input and store them into the datnum variable.

The order in which statements are executed during a program run. Answer 1 The first part of a compound statement begins with a keyword and ends with a colon ( : )

Answers

This is an incomplete question. The question I was able to find as the complete one is as follows:

Match the following terms and definitions

stack diagram flow of execution local variable function call header

-The order in which statements are executed during a program run. Answer 1

-The first part of a compound statement, begins with a keyword and ends with a colon ( : ) Answer 2

-A statement that executes a function. It consists of the name of the function followed by a list of arguments enclosed in parentheses. Answer 3

-A variable defined inside a function that can only be used inside its function. Answer 4

-A graphical representation of functions, their variables, and the values to which they refer. Answer 5

Answer with Explanation:Flow of Execution: The order in which statements are executed during a program run. This is done from top to bottom which means the statement written first is executed first.Header: The first part of a compound statement, begins with a keyword and ends with a colon ( : ). A header is given usually at the top. It can contain libraries being used in the program body.Function Call:  A statement that executes a function. It consists of the name of the function followed by a list of arguments enclosed in parentheses.  It is used to perform specific functions that are defined before calling a function. A program can be called as many times as needed.Local Variable: A variable defined inside a function that can only be used inside its function. A local variable with same name can be used inside two different functions but they are needed to be defined first.Stack Diagram: A graphical representation of functions, their variables, and the values to which they refer. It is the tool for knowing the state of program at the time given.

i hope it will help you!

                   

Implement a function which takes as input an array and a key and updates thearrayso that all occurrencesof the input key have been removed and the remaining elements have been shifted left to fill the emptied indices. Return the number of remaining elements. There are no requirements as to the values stored beyond the last valid element.

Answers

The function in cpp language is given.

void shift(int n[], int num)

{

   // integer variable to keep count of remaining elements

    int count=10;

     

   for(int j=0; j<10; j++)

   {

      // key element is compared to each element in the array

       if(n[j] == num)

       {

           n[j] = n[j+1];

          // decremented after each occurrence of key element in the array

           count--;

       }

   }

   

   std::cout<<count<<" elements are remaining out of 10 elements "<<std::endl;

   

}

1. The method accepts two parameters, one array and one element.

2. The integer array, arr, and integer element, key, passed to this function are declared outside all the methods.

3. The integer variable, count, is initialized to the size of the integer array, i.e., count contains the number of elements present in the array, arr.

4. Inside the for loop, the element is compared with each element in the array. If they match, the integer variable, count, is decremented each time the element occurs in the array.

5. After the loop completes, the number of remaining elements are displayed.

This function is implemented inside a cpp program as shown below.

#include <stdio.h>

#include <iostream>

// integer array declared and initialized

int arr[10] = {1, 2, 3, 4, 5, 6, 7, 2, 8, 2};

   

// element to be removed from the array

int key = 2;

   

   

void shift(int n[], int num)

{

   // integer variable to keep count of remaining elements

    int count=10;

     

   for(int j=0; j<10; j++)

   {

       if(n[j] == num)

       {

           n[j] = n[j+1];

           count--;

       }

   }

   

   std::cout<<count<<" elements are remaining out of 10 elements "<<std::endl;

   

}

int main()

{

   // function called having array and key as parameters

   shift(arr, key);

   return 0;

}

The program begins when the array and the element are declared and initialized at the beginning of the program.

Inside the main() method, the method shift() is called by passing two parameters to this method.

The main() method has return type of integer. Hence, this program ends with a return statement.

The following statement calls a function named half, which returns a value that is half that of the argument. (Assume the number variable references a float value.) Write code for the function.

Answers

Answer:

The function definition to this question can be given as:

def half (number): #defining a function half and pass a variable number in function parameter

   return number/2 #returns value.

data=half(12)  #defining variable data that holds function return value

print(data) #print value.

Output:

6.0

Explanation:

In the above python program, a function that is half is declare that includes a variable number in the function parameter. Inside the function, the parameter value that is number is divided by 2 and returns its value. In calling time a data variable is defined that holds the function half() value.

In calling time function holds value that is "12" in its parameter and return a value that is "6.0".

Final answer:

The student requested code for a function named 'half' that returns half the value of a float argument. The Python function 'def half(number): return number / 2.0' fulfills this request.

Explanation:

The student has asked for code to be written for a function named half, which returns a value that is half that of its argument, where the argument is a float value. Let's define this function in Python, as it is commonly used in educational contexts:

def half(number):
   return number / 2.0

To use this function, you would just call half with the number variable as its argument like this: result = half(number). This function simply takes the argument number, divides it by 2, and returns the result. If number is a float, the result will also be a float representing half of the original value.

You are concerned about fault tolerance for the database server you manage. You need to ensure that if a single drive fails, the data can be recovered. What RAID level would be used to support this goal while simultaneously distributing parity bits?
A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5

Answers

Answer:

D. RAID 5

Explanation:

Raid ( Redundancy array of inexpensive disk or drives) levels are used to boost performance and reliability of storage devices. They consist of hard drives or solid state drives working parallel to each other.

There are different levels of RAID, they are;

Raid 0, 1, 2, 3, 4, 5 and 10. Raid 2, 3, 4 and 7 are not really is use, so, we pay attention to 0, 1, 5 and 10.

Raid 0 only splits data to not list two drives and are not redundant. Raid 1 mirrors or reflects data on at least two drives and are also not redundant.

Raid 5 is redundant as it share data and parity bits between 16 or more drives.

Unlike Raid 5, Raid 10 does not have parity bits.

A type of backlight technology most commonly used in modern laptop devices is called____________.

Answers

Answer:

LED is the correct answer for the following question.  

Explanation:

LED is a display that is used in the Laptop screen which is a type of blacklight technology. Blacklight technology is a technology that is used to increase readability when the light is low.

An LED display is used in a modern laptop. It is a flat panel display. Its brightness is so high and allows a user to use it in the presence of the sunlight. It is designed in 1962 for the first time.

The above question asked about a blacklight technology that is used in a laptop device which is the LED display used in a modern laptop. Hence the answer is LED

Final answer:

The commonly used backlight technology in modern laptops is LED (Light Emitting Diodes), which provides illumination for the display's pixels, allowing for control over the color and brightness of the image.

Explanation:

In flat-panel displays, such as those found in laptop computers, tablets, and flat screen televisions, a light source at the back of the device illuminates the screen. The light from the LEDs travels through millions of tiny units called pixels, which consist of three cells with red, blue, or green filters. Each cell can be controlled independently, allowing the voltage applied to the liquid crystal in each pixel to adjust the amount of light passing through the filters, thereby varying the display's picture contrast.

This LED technology is prominent among laptop and notebook computers, offering advantages like lower power consumption and a slimmer profile compared to the older CCFL (Cold Cathode Fluorescent Lamp) backlighting. As technology advances, developments such as revamped E Ink technology are expected to provide even more enhanced display capabilities, such as displaying color and multimedia/hypermedia content.

Virtualization:

A. allows one operating system to manage several physical machines.
B. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
C. can boost server utilization rates to 70% or higher.
D. allows smartphones to run full-fledged operating systems.

Answers

Answer:

C. can boost server utilization rates to 70% or higher.

Explanation:

Virtualization -

It is the process of running virtual instance of the computer in the abstracted layer from the very actual hardware , is known as virtualization .

In this process multiple operating system can be operated on the single computer setup , it is useful for increasing the speed of the program.

Hence, from the question,

The correct statement with respect to virtualization is C. can boost server utilization rates to 70% or higher .

Final answer:

The correct answer is option C, stating that virtualization can boost server utilization rates to 70% or higher by allowing multiple virtual machines to operate on a single physical server. Virtualization benefits include efficient resource management and improved server scalability.

Explanation:

Virtualization in computing refers to the creation of a virtual version of something, such as hardware platforms, storage devices, and network resources. It enables one physical machine to be divided into multiple virtual machines, each capable of running its own operating system and applications. The main benefits of virtualization include increased server utilization, better resource management, and improved system scalability.

The correct answer to the question is option C, which states that virtualization can boost server utilization rates to 70% or higher. This is due to the fact that virtualization allows multiple virtual machines to operate on a single physical server, thus maximizing the server's computing potential. Options A, B, and D are not accurate representations of virtualization.

Virtualization technologies are fundamental in modern computing infrastructures such as cloud services, where resources are dynamically allocated based on demand. Using concepts developed from foundational research in operating systems, virtualization effectively manages resources such as CPUs, memory, and storage to optimize performance and efficiency. The Atmosphere system is an example of how clusters of physical computers are allocated into virtual machines with various capacities, allowing for a more efficient and scalable utilization of resources.

You want to equip yourself with FRUs for a laptop. What would you take with you? (Choose two)A. RAMB. SD card readerC. Video cardD. NICE. Hard drive

Answers

Answer:

RAM and Hard Drive

Explanation:

An FRU is also called a Field-repleacable Unit and is usually an assembly that is easily removed from an electronic equipment, laptop or just a computer and replaced so that one does not have to take the entire system for repairs. When trying to equip yourself with this unit of a laptop, you must take your Random Access Memory and your hard drive as they contain the whole information on the laptop.

Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.

A. True
B. False

Answers

Answer:

The following statement is False.

Explanation:

The following statement is incorrect because if the user create its slideshow in the MS PowerPoint or any other presentation application or software then, they can easily edit or rearrange the following thing any time that is written by the user in the slide of the presentation, so there is not any difficulty to edit or rearrange things.

When designing your navigation, your primary objective should be to include keywords for search engines.
a) true
b) false

Answers

Answer:

Option b is the correct answer for the above question.

Explanation:

When a user creates a website then he should need to put navigation on that because navigation is a collection of the list followed by a link which is used to transfer the user to the other page of that website. For example, if a user makes a website of the student, then the navigation will hold the link of student detail, about us and login.

But search engine keywords are used to find the website easily on the internet which is important when a user lives his website but it is not important when a user creates a website. But the above question statement says that it is important while creating a website in the navigation bar which is not correct.

Hence Option b is the correct answer which states that the question statement is a false statement.

Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take a standardized amount of time and so can be counted on to arrive in the order they were sent b. TCP ensures messages can be reliably transmitted across the Internet c. TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission d. TCP must account for the fact that packets may not arrive at a destination computer in the intended order

Answers

Answer:

B. TCP ensures messages can be reliably transmitted across the Internet.

D. TCP must account for the fact that packets may not arrive at a destination computer in the intended order

Explanation:

TCP or transmission control protocol is a connection oriented protocol that divides a packet to segments, and reliably sends them to their destination.

TCP is a layer 4 (transport layer) protocol in the OSI network model. Its packets data unit, PDU, is called segment.

For TCP connection to be successful, a three way handshake must be established between the client and server.

When a connection is established, tcp sends the packets in sequenced segments to the destination through various routes, the source receives acknowledgement for segments received by the destination and the source resend segment that were lost. In the destination, the TCP arranges the segments to its proper sequence.

Write a function named get_first_name that asks the user to enter his or her first name and returns it.

Answers

Answer:

def get_first_name( ):

   My_name = input('Please What is Your Name')

   return My_name

Explanation:

In Python Programming Language, we define the function def get_first_name

The function receives no parameters.

On line two, the function uses the input function to request for a users name and assigns

On line three, it returns the the name entered by the user.

Final answer:

The function 'get_first_name' asks the user to enter their first name using Python's input function and returns the value entered by the user.

Explanation:

To create a function named get_first_name that prompts the user to enter their first name and returns it, you can use Python's input function. Below is a step-by-step example of how the function might look:

def get_first_name():
   # Prompt the user for their first name
   first_name = input("Please enter your first name: ")
   # Return the entered first name
   return first_name
When you call the get_first_name function, it will ask the user to enter his or her first name and store the input in a variable. After that, it returns the stored value when the function completes.

George is involved with a project at work and notices that he has a pending update for his computer. George knows that updates are important, and he decides to take a break and complete the restart of the computer so that the update can install. After George restarts the computer, he notices that his AutoCAD program is running slowly. The issue continues to the point that George decides to call the technician and ask him to check what is going wrong on his computer. The technician tells George to turn the computer off and then on again and asks George how much RAM is counted. The amount of RAM is 8GB less than the amount that was installed on George’s system.What hardware could be causing this problem? (Select all that apply.)
A. RAM
B. Processor
C. Motherboard
D. Video card
E. CMOS battery

Answers

Answer:

Option A and C i.e., RAM and Motherboard is the correct answer to the following question.

Explanation:

AutoCAD is the computer program which is used by the George to create 2-dimensional and 3-dimensional pictures or drawing but their AutoCAD running slow because the minimum requirement of RAM for the following program is 8GB or George has less than 8GB RAM in his system so that program is running slow.

The processor requirement for the AutoCAD program is more than 2.5 GHz 0r 3+ GHz, if he has less than 2.5 GHz then they also required to upgrade the processor or change the motherboard.

Final answer:

The hardware that could cause George's computer to show less RAM than what was installed is RAM, motherboard, and possibly the CMOS battery due to seating, recognition, or system settings issues.

Explanation:

When George's computer shows less RAM than installed after an update, the hardware likely causing this issue could be A. RAM, C. Motherboard, or E. CMOS battery. RAM is crucial as it is the main memory that the CPU utilizes for storing information that needs to be quickly accessed. If there is less RAM detected, it could be due to a RAM module not being properly seated or recognized. The motherboard is responsible for housing the RAM modules, and if there's an issue with the motherboard slots or chipset, it might not recognize all the RAM installed. The CMOS battery helps maintain system settings including the system's RAM configuration. If the battery is failing, it may lead to incorrect hardware settings being loaded, potentially affecting the RAM detected at startup.

Carskadon study on starting times for schools concluded that early school starting times cause________.

Answers

Answer:

Early school starting times cause poor performance on tests, inattention in class, and drowsiness.

Explanation:

Carskadon study on early school starting time showed that it cause increased rate of rapid eye movement sleep in students and they doze off during lecture. Insufficient sleep lessens attentiveness levels in the class which affects students' potential to learn. The study showed that students do not perform well on tests. In addition to the difficulty in learning, there is an increased danger of accidents for those who drive to school due to dizziness.

if are reseachers is using data that are low in cost and save time which type of data is this likely tro be

Answers

Answer:

Internet or online data.

Explanation:

There are different sources of data, through questionnaire, database, online etc.

Questionnaires are writing or printed guides to data collection given to individuals to give answer to the questions based on their perspective. For a questionnaire to be ready, questions are formulated, typed and printed with copies. The questionnaires are taken to the target subjects. The time taken to implement this can be overwhelming. Databases on the other hand needs paid skills and time to setup.

The internet has readily available resources, anybody can access its unlimited resources with just an internet connection.

Average LCD panels are around _______________, which most monitor authorities consider excellent brightness.
A. 100 kHzB. 100 bitsC. 300 pixelsD. 300 nits

Answers

Answer:

The correct answer to the following question will be option D. 300 nits.

Explanation:

LCD Monitors: LCD stands for Liquid Crystal Display, the display which uses two sheets of liquid crystal with polarizing material between the sheets and also known as Flat panel monitor.

Each of the crystal in LCD's is like a shutter, it either allows to pass the light or it blocks the light. There is a fixed type of resolution in LCDLCD panels can be easily moved around all, lightweight, compact and small in size. An average 17-inch LCD monitor could be around 15 pounds, upwards 300 nits which gives the perfect brightness.

So, Option D is the correct answer.

A graphic designer purchased a new device. The purpose is to convert her sketches that she drew on paper to a digital format. She connects the device to her computer via USB. However, the device is not recognized by her computer.
What is the next step?

a. She must locate and install the driver for her stylus.
b. This output device is not compatible.
c. She must purchase a device manufactured by the same manufacturer as her computer.
d. She must locate and install the driver for her scanner.

Answers

Final answer:

The correct step when a computer does not recognize a newly connected device is to locate and install the appropriate driver for that device, in this case, a driver for her scanner.

Explanation:

When a graphic designer's new device is not recognized by the computer after being connected via USB, the next step would typically involve troubleshooting to ensure proper installation and connectivity. In this scenario, the correct course of action would be to locate and install the driver for the device in question. If the device in question is a scanner, which is commonly used to digitize sketches, option d would be the appropriate choice:

She must locate and install the driver for her scanner.

Drivers are software components that enable the operating system to communicate with hardware devices. Without the proper driver, the system may fail to recognize the device. Installing the correct driver normally resolves issues of device detection. It is unnecessary to purchase a device from the same manufacturer as the computer or to assume that the device is not compatible without first attempting driver installation.

On which tab would you find Access's features for formatting text?

A. File
B. Home
C. Create
D. Format

Answers

Answer:

B. Home

Explanation:

In Microsoft Access's database the home tab contains the text formatting group, a feature for formatting texts, it also contains clipboard, sort and filter, and find. the tab provides a place to perform common or repetitive tasks done in MS Access. Access is a database management system provided by microsoft.

Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems, which is an example of specialized information systems called knowledge work systems (KWSs) that create information in their areas of expertise.?

Answers

Engineers who are involved in product design and manufacture of computer-aided should have enough knowledge in circuit and auto cad electronic design.

Explanation:

He or she should have mother board, voltage in or out extra. Person who develops should enough knowledge on circuit design which capacitor, resistance and voltage and processor capacity.

Each design they have first simulates and tested and result should be recorded. On simulation test success design is made.

There is third party software also available for design the circuit and gives the tested results as report.

Other Questions
Can someone tell how to do this? Mark is a student, and heis a student, and he can work for at most 20 hours a week. He needs to earn at least $75 to coverexpenses. His dog-walking job pays $5 per hour and his job as a car wash attendant pays $4 per hour. Writeeds to earn at least $75 to cover his weeklyinequalities to model this situation.endant pays $4 per hour. Write a system of how did the Bill of Rights limit government? 8. A 40.0kg block of metal is suspended from a scale and is immersed in water. The dimensions of the block are 12.0cm x 10.0cm x 10.0cm. The 12.0cm dimension is vertical, and the top of the block is 5.00cm below the surface of the water. (a) What are the forces exerted by the water on the top and bottom of the block? (Take P0 = 1.0130 X 105 N/m2 .) (b) What is the reading of the spring scale? (c) Show that the buoyant force equals the difference between the forces at the top and bottom of the block. When stopped at an intersection and your light turns green, you should __________ before accelerating.A: look right then leftB: look left then rightC: look left then right then left againD: look straight aheadE: look behind you Define the following terms in the order presented. _______ refers to the movement of individuals from one area to another. _______ refers to the movement of individuals into a geographic area. _______ refers to the movement of individuals out of a geographic area. Comparing changes in the public opinion of Texans regarding the legal status of marijuana with the actions of legislators and the judicial system in Texas indicates that. Find the value of x that makes ABCD a parallelogram. What race issues was Senator Johnson likely referring to in California and in the South? Given whosupported the Treaty (see Doc C), why might he have made this argument? Thinking back to that presentation in the library makes me smile. What started out as three high school boys skipping class turned out to be the most significant event in our lives. If we had made it to the gym that day instead of the library, more than likely the streets would have swallowed us in the next few years. We never would have become doctors.What effect does the Seton Hall presentation have on the three friends lives?It puts them on the path to becoming doctors.It makes them feel truly happy for the first time.It helps them remember what is important in life.It changes their feelings about high school. i NEED HELP ASAP with my science analysis questions ! 7/82/8 equal gfffghgddth How do u solve 1-2y=4-1+10y=8 The ages of three siblings combined is 27. The oldest is twice the age of the youngest. The middle child is 3 years older than the youngest. Write and solve an equation to find the ages of each sibling While cloud services are useful for small and midsize analytic applications, they are still limited in their ability to handle Big Data applications.1. True2. False Write a program that takes two numbers from the Java console representing, respectively, an investment and an interest rate (you will expect the user to enter a number such as .065 for the interest rate, representing a 6.5% interest rate). Your program should calculate and output (in $ notation) the future value of the investment in 5, 10, and 20 years using the following formula:future value = investment * (1 + interest rate)^yearWe will assume that the interest rate is an annual rate and is compounded annually. Write the expression that represents the phrase,"two times the difference of a number and 17."Use x as the variable. Gandhian Theory of State ? An issuer has filed a registration statement in the state proposing to offer 500,000 shares in a combined primary and secondary distribution, consisting of 300,000 newly issued shares and another 200,000 shares being offered by the officers of the firm. Under Uniform State Law, the:_______.a. 500,000 shares being sold is an issuer transaction.b. 300,000 shares being sold is an issuer transaction and the 200,000 shares being sold is a non-issuer transaction.c. 300,000 shares being sold is a non-issuer transaction and the 200,000 shares being sold is an issuer transaction.d. 500,000 shares being sold is a non-issuer transaction. Which equation is graphed here? A)x = -4 B)y = -4x C)y - 4 = 4x D)y = -4 Steam Workshop Downloader