What are the 3 attributes of information?

Answers

Answer 1

As previously said, the three highly important qualities of validity, accuracy, and completeness can be expanded into the information quality of integrity.

For information to be valuable and to meet the definition of information, it must largely have the characteristics of relevance, availability, and timeliness. Accuracy, completeness, consistency, distinctiveness, and timeliness are five qualities of high-quality information. For information to be accurate and valuable, it must be of high quality. Standard attributes, commonly referred to as global attributes, work with a wide variety of elements. The essential attributes such as accesskey, class, contenteditable, contextmenu, data, dir, hidden, id, lang, style, tabindex, and title are included in them.

Learn more about information here-

https://brainly.com/question/5042768

#SPJ4


Related Questions

administrators can control which office 365 proplus apps users are allowed to download. once an administrator is logged into their global admin account, what should they do next?

Answers

The apps that users are permitted to download can be managed by administrators. To accomplish this, go into your global admin account at admin.microsoft.com.

Pick Office Software on the home page, then click on Software download settings. From there, you can pick which applications you want to let your users download.

Define software.

To control computers and carry out particular activities, the software is a collection of instructions, data, or programs. Hardware, which describes a computer's external components, is the opposite of software. The software can be divided into three categories: system software, utility software, and application software.

Applications, scripts, and other programs that operate on a device are collectively referred to as "software." Technology management and administrative capabilities can be abstracted via software-defined technology. For instance, SDN allows you to manage the creation of firewall rules, VLANs, and other network devices. It also includes the capacity to manage data flow.

To learn more about software, use the link given
https://brainly.com/question/28224061
#SPJ4

set of data using numbers or measurements to represent the findings of an experiment

Answers

The set of data using numbers or measurements to represent the findings of an experiment is quantitative data.

What is types of data?

Data in statistics consists of two types of data quantitative data and qualitative data.

Qualitative data is data to measures of 'types' or to descriptive information expressed in form of language, name, symbol, or any code rather than numerical value.

Quantitative data is data to measure of value, can be counted, or numerical information expressed in form of number rather than language, name, symbol, or any code.

Learn more about quantitative data here:

brainly.com/question/12929865

#SPJ4

What types of inventions are not patentable?

Answers

Some inventions are not eligible for patent protection. These consist of:

• a discovery, a theory of science, or a mathematical technique;

•a literary, dramatic, musical, or artistic work; a business practise, game to be played, or way of thinking;

•a method of medical treatment or diagnosis; 

•a literary, dramatic, musical, or artistic work; 

•a business practise, game to be played, or way of thinking;

Each claim in a patent, which may be numerous, defines a distinct property right. Technically speaking, a patent is a grant of protection for innovation. Design patents, utility patents, and technology patents are the three different categories of patents. A technique, equipment, manufacturing, or product must be "new and useful" in order to be eligible for patent protection.

To learn more about Patent click here:

brainly.com/question/29533746

#SPJ4

What are the top three wireless network attacks? Out of these attacks, which one has the capability of causing the most damage? Why? What steps would you take to protect your wireless network?

Answers

The top three wireless network attacks are Man-in-the-Middle (MitM) attack, Denial-of-Service (DoS) attack, and Wireless Jamming attack. Out of these attacks, the Man-in-the-Middle attack has the capability of causing the most damage. This is because a MitM attack enables an attacker to intercept data transferred between two parties, potentially allowing them to access sensitive information, tamper with the data, or even modify their identity.

To protect your wireless network, the following steps should be taken:

1. Use strong encryption for your wireless network.

2. Use a virtual private network (VPN) when accessing public networks.

3. Enable two-factor authentication on all devices connected to the network.

4. Install a firewall and regularly update your router's firmware.

5. Use an intrusion detection system to monitor and detect potential attacks.

6. Disable any services not in use.

7. Change your network's SSID and password regularly.

our company's internal namespace is westsim.local. this domain has two additional child domains named support.westsim.local and research.westsim.local. due to security concerns, your company's internal network is not connected to the internet. following are the dns servers that you manage for your company: dns1, authoritative for . and westsim.local, ip address = 192.168.1.1 dns2, authoritative for support.westsim.local, ip address = 192.168.2.1 dns3, authoritative for research.westsim.local, ip address = 192.168.3.1 all internal dns domains are active directory-integrated domains. you have configured dns1 with appropriate delegation records for the child zones. how should you configure root hints for dns2 and dns3?

Answers

Based on the above, the way to configure root hints for dns2 and dns3 is by:

Edit the Dns2 and Dns3 properties in DNS Manager. Remove all of the default root hints entries from the Root Hints tab before adding a Dns1 entry.

How to configure DNS root hints?

Root hints are a list of Internet-based DNS servers that your DNS servers can utilize to answer requests for names they don't recognize. When a DNS server is unable to resolve a name query using its local data, it sends the request to another DNS server using its root hints.

Note that there are 13 primary DNS root servers in all, and their names range from "A" to "M."

Therefore, to be able to do the above case, one need to:

Click Start, point to Administration Tools, and then click DNS to update root hints using the DNS snap-in.Right-click ServerName, where ServerName is the server's name, in the right pane, and select Properties.Click Add after selecting the Root Hints tab.

Learn more about configuration from

https://brainly.com/question/9978288
#SPJ1

compare and contrast the value between onboard capture systems and down-linking data systems. why are such systems usually not mandated on private general aviation aircraft?

Answers

The value between onboard capture systems and down-linking data systems is Widespread aircraft are usually misunderstood as the simplest, lightest, small-engine commercial aircraft,

Widespread aircraft are usually misunderstood as the simplest, lightest, small-engine commercial aircraft, but even huge jets and transport aircraft operating under federal aviation regulations are not as well-known aircraft.

Why are such systems usually not mandated on private general aviation aircraft?

Well-known Aviation (GA) is defined by global commercial airlines as all civil aviation operations other than scheduled air services and non-scheduled flights for compensation or employment. This means that although military and air operations do not fall under the GA umbrella, they do so broadly.

What is a statistics hyperlink gadget?

Datalink refers to virtual air/floor communications among plane and floor systems. The European data link gadget is primarily based totally at the Aeronautical Telecommunications Network (ATN) the usage of interconnected routers and give up systems, and VHF Digital Link Mode 2 (VDL Mode 2/VDL2), because the air/floor statistics hyperlink technology.

Learn more about data link system :

brainly.com/question/9871051

#SPJ4

rfid reader (rfid interrogator) is a transmitter/receiver that reads the contents of rfid tags in the area. a rfid system is comprised of one or more rfid tags, one or more rfid readers, two or more antennas. group of answer choices true false

Answers

Yes, it's true that RFID reader is a transmitter/receiver that reads the contents of RFID tags in the area. Also, it is comprised of one or more RFID tags, one or more RFID readers, and two or more antennas.

RFID stands for "radio-frequency identification," a technology that uses radio waves to read digital data encoded in RFID tags or smart labels (described below). In that information from a tag or label is recorded by a device and stored in a database, RFID is comparable to barcoding.

Contrary to systems that use barcode asset tracking software, RFID has a number of advantages. The most apparent difference is that although barcodes require alignment with an optical scanner, RFID tag data can be read without being in the line of sight.

An integrated circuit and an antenna make up an RFID tag. The protective substance that binds the parts together and shields them from various external factors is also a component of the tag.

The application determines the protective material. For instance, RFID-enabled employee ID badges are normally made of sturdy plastic, with the tag sandwiched in between the layers. RFID tags can be passive or active and come in a variety of sizes and shapes. Because they are more compact and affordable to employ, passive tags are the most popular. Before transmitting data, passive tags need to be "charged up" by the RFID reader.

To learn more about RFID click here:

brainly.com/question/29538641

#SPJ4

Write a program that inputs numbers and keeps a running sum. when the sum is greater than 200, output the sum as well as the count of how many numbers were entered.

Answers

The program we use for the following problem is Python.

What is python?

Python is one of the most commonly used programming languages with high-level and general purpose design to emphasizes the code to be able to read and significant indentation.

In python the question problem can be solve by this dynamic program,

totalsum=0

count=0

while(totalsum<=200):

  num=int(input("Enter a number: "))

  totalsum=totalsum+num

  count=count+1

print("Total sum: {0}".format(totalsum))

print("Total number of numbers entered: {0}".format(count))

The initial variable is totalsum and count.

Then, we use looping function for totalsum is lower or equal to 200.

As long the totalsum is lower or equal to 200 the input always appear and user can input the value after that the new value is adding to totalsum and count is plus 1 to indicate number were entered.

After loop break because totalsum is greater than 200, the program will give the output of sum and count of how many number were entered.

Learn more about programming language here:

brainly.com/question/16936315

#SPJ4

sumproduct is a function that returns the sum of the products of elements in a set of arrays. t or f

Answers

The statement "sumproduct is a function that returns the sum of the products of elements in a set of arrays" is a true statement. Sumproduct is a  function in we can use in Excel.

What is Sumproduct in Excel?

The SUMPRODUCT function in Excel multiplies ranges or arrays and returns the sum of the products. It sounds boring, but SUMMARY is an extremely versatile function that can be used to count and sum like COUNTIFS or SUMIFS but is more flexible. Other functions can easily be used in the SUMMARY to extend the functionality further.

The SUMPRODUCT function multiplies arrays and returns the sum of the products. If only one array is provided, SUMMARY will only sum the elements of the array. Up to 30 ranges or tables can be accommodated.

Learn more about sumproduct https://brainly.com/question/29731774

#SPJ4

Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. because he processes less than a dozen credit card payments per year, he does not need to worry about pci compliance requirements for handling his customers’ payment information.

a. Trueb. False

Answers

It is False that Layton does not need to worry about PCI compliance requirements for handling his customers’ payment information as for his home-based business uses less than a dozen credit card payments per year.

When receiving, sending, processing, and storing credit card data, organizations are required to adhere to a set of 12 security standards known as PCI compliance, or payment card industry compliance. PCI compliance demands that small firms manage firewalls, maintain antivirus software, assign unique IDs to each employee with computer access, and encrypt cardholder data.

The PCI Security Standards are managed by the Payment Card Industry Security Standards Council, an independent organization established by the card networks in 2006. The card networks and payment processors are responsible for enforcing these standards. No matter how many card transactions are performed, every merchant needs to be PCI compliant.

To learn more about PCI compliance click here:

brainly.com/question/28335079

#SPJ4

When you press and release the primary mouse button is called?

Answers

The solution is option (A). A click is the action of pushing and releasing the main mouse button.

a mouse button being pressed and released. This word only refers to hitting the left mouse button once unless otherwise stated, such as in a double-click or right-click. The left mouse button is typically used for clicking, selecting, dragging to highlight text or an object, and serving as the pointer. To highlight or drag-select text or objects, utilize the mouse buttons (click, hold down, and move). As an illustration, click and drag the mouse cursor to highlight all of the text in the first phrase in the animated figure below.

Learn more about mouse here-

https://brainly.com/question/10723616

#SPJ4

amy added a video to a slide and wants it to start playing when the slide appears in slide show view. what option should she set on the playback tab?

Answers

Choose the slide in Normal view to which you want to add a video. Click Video, then select Movie from File from the Insert tab. Choose the desired file to insert in the Choose a Movie dialogue box. Simply click Insert if you wish to include the video on the slide.

What option set on the playback tab?

Add a video or music file to a slide on your Android device by: Open the camera on your device in PowerPoint, capture some video, and then add the video right to a presentation.

Therefore, Slideshow in PowerPoint should be opened. Navigate to the [Slide Show] tab. Click “Set Up Slide Show” in the “Set Up” group. Check “Loop constantly until 'Esc'” in the “Show options” portion of the dialogue box that appears. Press [OK].

Learn more about playback here:

https://brainly.com/question/16310433

#SPJ1

the classic systems analysis methodology is called the: select one: a. systems development life cycle (sdlc) b. analysis development life cycle (adlc) c. component development life cycle (cdlc) d. information development life cycle (idlc) e. none of the above is correct

Answers

System analysis is a method or strategy used to assess how well a system performs given its known (or assumed) structural parameters.

A typical student project with predetermined input data that must be created for a specified system structure might serve as an illustration. The calculation results provide a description of system outcomes. Create a logical model of the proposed system using systems analysis. Using the structured systems analysis methodology, we visually represent the system as a collection of interconnected processes that convert input data into output data. Initial inquiry, systems survey, feasibility study, determination of information needs and system requirements, and delivery of systems requirements are all included in systems analysis.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

in recursion, what is the term to describe when the new stack frames for these recursive function calls extend beyond the allocated space in the stack?

Answers

in recursion, stack overflow is the term used to describe when the new stack frames for these recursive function calls extend beyond the allocated space in the stack.

What are stack frames?

Some computer languages generate and get rid of temporary variables using a stack frame, a memory management approach. To put it another way, it could be thought of as the accumulation of all data related to a subprogram call that is present on the stack. The runtime process is the only time that stack frames exist.

The local variables and function calls of the function are stored on the stack, one of the application memory segments. In our software, the stack frame is where other function calls or subroutines are placed as well as the memory for the local variables whenever a function is called.

To learn more about stack frames, use the link given
https://brainly.com/question/9978861
#SPJ4

you have been asked to install a wi-fi network in a building that is approximately 100 meters long and 25 meters wide. because of cost considerations, you will be using 802.11ac. at a minimum, how many wireless access points will you need?

Answers

For 802.11ac, wireless access points(AP) are three.  Wi-fi network coverage is up to 150 feet indoors; the range can be affected by building materials and other factors as well.

Requirements for capacity/throughput per user/application Knowing the user count will help with improving the above coverage estimates. When the location is intended for a high number of users, such as lecture halls, auditoriums, and stadiums, estimating the access point count using the number of people or devices is preferable.

For instance, a large sports arena with a rectangle-shaped seating bowl and 80,000 people has dimensions of 650 feet by 750 feet. An access point can easily cover 10,000 square feet thanks to outdoor WiFi signal dispersion, but we'll go with the more typical figure of 1600 square feet per access point from earlier. 487,500 square feet / 1600 = 305 access points when calculating coverage alone.

To determine the necessary AP when developing a WiFi project, one need to be aware of the following:

Area of Coverage and Floor PlanArea's dimensions and floor planMaterial for buildings or wallsUsers in number

To learn more about 802.11ac click here:

brainly.com/question/18370953

the series of fibonacci numbers contains the sequential values of 610 and 987. what is the next number in this series? 1,419 1,364 1,597 1,633 1,264

Answers

The next number in the sequence would be 1,597.

What is sequence?
Sequence
is the order in which things occur. It is an arrangement of events, objects, or ideas in a specific order. For example, when you count from one to ten, you are following a sequence. Events in a story can also be arranged in a sequence. In mathematics, sequences are sets of numbers that follow a pattern. In music, a sequence is a progression of notes, chords, or tones. In biology, a sequence refers to the order of nucleotides in a gene. Sequence is used to organize information and make it easier to understand.

The next number in the series of Fibonacci numbers is 1,597. This is because the Fibonacci sequence is a series of numbers where each number is the sum of the two numbers before it. So, the next number in the sequence would be 610 + 987 = 1,597.

To learn more about sequence
https://brainly.com/question/28644020
#SPJ4

you need to configure a windows workstation with the ip address of the proxy server for your network. click the tab in the internet properties window that you would use to do this.[General - Security - Privacy - Connections - Programs - Advanced]

Answers

Connections is the actual answer for the configuration of a windows workstation.

What do you mean by Windows workstation ?

For those with sophisticated data requirements, including data scientists, CAD experts, researchers, media production teams, graphic designers, and animators, Windows 10 Pro for Workstations is the ideal solution.

Workstation, a high-performance computer system that is primarily created for a single user and features powerful central processing, big storage, and excellent graphics capabilities.The substantially improved GPU found in workstations aids the CPU in reliving some work and in displaying visuals with excellent quality. Even if every laptop has a good graphic card for the high-quality display, the graphics on workstations will always be superior.(1) Any Windows-powered computer. look at workstation. (2) Using a client PC that is a Windows server. To benefit from the extra robustness and features included in server products, Windows server versions are occasionally used as desktop computers. Windows server, please.

To know more about Windows Workstation please click here ; https://brainly.com/question/29554975

#SPJ4

explain the important differences between a. a function call and system call b. execution of a regular function vs execution of the main() function of a process c. a context switch and a mode switch

Answers

Function calls belong in user mode, whereas system calls belong in kernel mode. When the main calls another function, execution control is passed to the called function, causing execution to start at the function's first statement.

Although the terms "system call" and "function call" are frequently used interchangeably, they have different meanings. While function calls are used to call a specific function within the program, system calls are used when a program wants to communicate with the kernel.The source program's functions carry out one or more particular tasks. To complete their respective roles, the main function can invoke these functions. Execution starts at the first statement in the function when main calls another function, passing execution control to the function. When a return statement is executed or the function's end is reached, a function returns control to main.A "mode switch" takes place within a single process. There are multiple processes involved in a context switch (or thread, or whatever). A context change does not always indicate a mode change (could be done by the hardware alone).

To learn more about system call click here:

brainly.com/question/13440584

#SPJ4

the arguments supplied to the if function, in order, are the condition for execution:_____.

Answers

The arguments written in the 'IF' function, in order, refer to the condition for execution: the result if the condition is true, and the result if the condition is false.

The 'IF' function is one of the most popular functions in MS Excel that allows for making logical comparisons between a value and what the result is expected. Hence, the 'IF' function can have two results. The first result is if the condition or comparison is true, and the second result is if the condition or comparison is false.

The syntax for the 'IF' function is as follows: IF(logical_test, value_if_true, [value_if_false]). Thus, the arguments supplied to the 'IF' function, in order, are the condition for execution: the result if the given condition is true, and the result if the given condition is false.

You can learn more about 'IF' function at

https://brainly.com/question/20497277

#SPJ4

was it necessary to install the second drive in workstation 2 in order to recover the data? what are two reasons you might not want to install the drive during recovery?

Answers

No it is not necessary to install the second drive in workstation 2 in order to recover the data.

Two reasons we might not want to install the drive during recovery are:

Either the drive connector on the motherboard is not working or the motherboard does not support the high speed SATA standard that hard drives use.

Why would you install an extra drive?

Having multiple drives in a system allows you to quickly and easily backup your data between drives in the event of a hardware failure or user error, and to keep important files in multiple places. You can make a copy of Advanced users can further protect their data with redundant arrays of independent hard drives.

What happens if I don't install the driver?

Every computer has multiple drivers that control various installed applications and hardware components. Without drivers, your computer's hardware and software may not work properly, or may not work at all.

Learn more about drive:

brainly.com/question/27800037

#SPJ4

how many disk blocks are needed to store the bit vector on disk, assuming each block is 512 bytes long?

Answers

2^108/2^9 = 2^99 blocks.Each block is 512 bytes(2^9).

Total capacity of disk is 3 TB = 2^40 *2^40*2^40= 2^120 bytes

Hence number of disk blocks = 2^120/2^9= 2^111 blocks

Hence there are 2^111 blocks in the disk and to manage free space among the blocks using bit vector, for each block 1 bit is used(value 1 - for free block or 0 - for allocated block). Therefore 2^111 bits is the size required to manage free space by using bit vector method.

These bits are stored in disk blocks which is 2^9 bytes in size. Hence to hold 2^111 bits( 2^111/2^3=2^108 bytes) it requires

2^108/2^9 = 2^99 blocks

To know more about disk blocks, visit;

brainly.com/question/16614000

#SPJ4

What are the four functions of security?

Answers

The four pillars of security include out-of-the-box security measures, compliance monitoring and evaluation, document management, and project management.

A document management system (DMS) is often an electronic tool used to track, share, manage, and save files and documents. A history log of the numerous versions created and edited by different users is kept in some systems that include this feature. There are several similarities between the phrase and content management system concepts. It is frequently seen as a part of enterprise content management (ECM) systems and connected to digital asset management, document imaging, workflow systems, and records management systems.

The development of software systems to manage paper-based documents started in the 1980s with a number of vendors. These systems dealt with paper documents, which could be anything from images to prints to published articles.

Learn more about document management here:

https://brainly.com/question/26384500

#SPJ4

Your php installation appears to be missing the mysql extension which is required by wordpress.a. trueb. False

Answers

The statement "Your PHP installation appears to be missing the Mysql extension which is required by Wordpress" is a true statement. This is caused when the PHP code in your site is not compatible with the version of PHP in your site currently using.

What is PHP?

PHP is an open source server-side scripting language that many developers use for web development. It's also a general-purpose language that you can use to create a variety of projects, including graphical user interfaces (GUIs).

The abbreviation PHP originally stood for Personal Home. But now it is a recursive acronym for Hypertext Preprocessor.

Learn more about PHP https://brainly.com/question/27750672

#SPJ4

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers.



Required:


If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

Answers

After the most recent updates, the remote access server was not rebooted, the most likely problem in this circumstance if some or all of these users were able to remotely connect in the past.

Rebooting is the act of purposefully or unintentionally restarting a previously operational computer system. Warm reboots, in which the system restarts while still powered on, and cold reboots, in which the power to the system is physically turned off and back on, are the two types of reboots. The reboot is known as a restart when the operating system closes all running programmes and completes all pending input and output tasks before beginning a soft reboot. Early electrical computers lacked an operating system and had limited internal memory. The input was often a Switch Register or a stack of punch cards. On systems using cards, turning on the computer was accomplished by pressing a start button, which issued a single command.

Learn more about rebooted from

brainly.com/question/13869329

#SPJ4

how to use a command line inside the notebook here to install the module astral from pypi jupyter hub

Answers

You may use the! (bang) operator to run shell commands inside of a Jupyter notebook to install the astral module from PyPI (the Python Package Index). For instance, the astral module can be installed using the following command:

!pip install astral

By doing this, you may make the astral module and its dependencies available for use in your Jupyter notebook by installing them from PyPI. The PyPI module can then be imported and used in your code as follows:

import astral

# Use the Astral module to do something...

Remember that the! operator cannot be used directly in the Jupyter Hub interface and is only available in Jupyter notebooks and in PyPI. You must run the command in a new notebook after creating one in order to use it.

To know more about PyPI(the Python Package Index) kindly visit

https://brainly.com/question/15872044

#SPJ4

You may use the! (bang) operator to run shell commands inside of a Jupyter notebook to install the astral module from PyPI (the Python Package Index). For instance, the astral module can be installed using the following command:

!pip install astral

By doing this, you may make the astral module and its dependencies available for use in your Jupyter notebook by installing them from PyPI. The PyPI module can then be imported and used in your code as follows:

import astral

# Use the Astral module to do something...

Remember that the! operator cannot be used directly in the Jupyter Hub interface and is only available in Jupyter notebooks and in PyPI. You must run the command in a new notebook after creating one in order to use it.

To know more about PyPI kindly visit

brainly.com/question/15872044

#SPJ4

Which function in the random library will generate a random integer from 0 to the parameter value inclusive?

Answers

The random.randint() function in the random library will generate a random integer from 0 to the parameter value inclusive.

Define a library.

A library in computer science is a group of non-volatile materials utilized by computer programs, frequently in the creation of software. Programmers can use a collection of prewritten code called a programming library to streamline processes. This library of reused code often focuses on a small number of widespread issues. A number of generic containers, functions, function objects, generic strings, and streams (including interactive and file I/O), as well as support for several language features, are all provided by the C++ Standard Library.

Several different pre-coded components are typically included in a library. These could be information on configuration, information on assistance and documentation, templates for messages, prewritten code and routines, classes, variables, or type specifications. Libraries can be either static or dynamic/shareable. Either one or both can be used to create a program.

To learn more about a library, use the link given
https://brainly.com/question/29407092
#SPJ4

write a function f to c that accepts a temperature in degrees fahrenheit and returns the temperature in degrees celsius. the equation is

Answers

The formula used to convert between Fahrenheit and Celsius is °C = 5/9(°F - 32). The temperature in Fahrenheit can be readily converted to Celsius using the Fahrenheit to Celsius method (F to C formula).

This math tells us that 37.78 degrees Celsius is equal to 100 degrees Fahrenheit.

temp = input("Input the  temperature you like to convert? (e.g., 45F, 102C etc.) : ")

degree = int(temp[:-1])

i_convention = temp[-1]

if i_convention.upper() == "C":

 result = int(round((9 * degree) / 5 + 32))

 o_convention = "Fahrenheit"

elif i_convention.upper() == "F":

 result = int(round((degree - 32) * 5 / 9))

 o_convention = "Celsius"

else:

 print("Input proper convention.")

 quit()

print("The temperature in", o_convention, "is", result, "degrees.")

Learn more about method here-

https://brainly.com/question/18088056

#SPJ4

one of cisc's major limitations is that the instructions cannot be broken down into fast micro-instructions. group of answer choices true false

Answers

One of CISC's major limitations is that the instructions cannot be broken down into fast micro-instructions ----- False

CISC processors :

CISC processors have the advantage of easy and flexible implementation of microprogramming. Therefore, they can be decomposed into fast microinstructions. It's also cheaper than wiring the entire control unit. The microcode instruction set is written to match the HLL structure, so the compiler isn't complicated either. So they are fast, have small code size and many cycles per second.

Features of CISC –

Complex instructions and therefore complex instruction decoding. Instructions are bigger than words. Instruction execution may take more than one clock cycle. Fewer general purpose registers because the operations are performed in the memory itself. Complex addressing mode.

Learn more about CISC Processor :

brainly.com/question/13497456

#SPJ4

PLEASE HELP THIS IS SERIOUS 1000 POINTS!!!!!!! ALSO GIVING BRANLIEST!!!!!!!!

You are doing an Internet search for vegetarian recipes. One Web site you visit is called "Don't Be an Animal Murderer." What is the likely primary goal of this Web site? to entertain the viewer to provide clear, balanced, and unbiased information about the topic to sell a product to persuade or change the thinking or actions of others

Answers

Answer:
To persuade or change the thinking or actions of others.

Answer: D. to persuade or change the thinking or action of others

This is 100% correct

Explanation:

Select the correct answer. Which important design element indicates that posters have proper visual balance of text and graphics? A- order B- focus C- visual grammar D-grid E- graphics​

Answers

A key design component shows that posters have the right visual balance of text and pictures.

What design components specifically focus on visuals?

The foundational aspects of a product's aesthetics include line, shape, negative/white space, volume, value, color, and texture. These are known as the elements of visual design. The principles of design, on the other hand, explain how these components can and should work together for the optimal outcomes.

What elements and principles of the artistic process are used in the creation of a poster's graphic design?

Posters for each of the seven design principles—contrast, rhythm, unity, emphasis, pattern, movement, and balance—as well as the seven design elements—illustrate and explain value, color, form, shape, line, space, and texture.

To know more about posters visit:-

https://brainly.com/question/8242738

#SPJ1

Other Questions
who transports hannah to an alternative version of her life in family for christmas? The majority of immigrants that entered the United States during the industrial age came from what were the key issues that led to the collapse of the skywalk in the duncan v missouri board of architects case people with a major depressive disorder experience a chronic mood disorder characterized by persistent sadness, despair, and hopelessness. a client with a compound fracture of the femur is in balanced skeletal traction. which assessment data must be reported immediately? sarah used 2.5 cups of cheese in a dish that serves 10 people. what constant of proportionality relates the number of servings to cups of cheese? In the book the Giver, how does Jonas feel about his community in chapters 10-13? when used systemically, antifungal drugs tend to cause more adverse effects than antibiotics because: Describe social contract theory. Dont Get IT FROM THE WEB !!! How many core capabilities span all mission areas FEMA? Latanya has $1.90 worth of nickels and dimes. She has a total of 24 nickels and dimes altogether. Determine the number of nickels and the number of dimes that Latanya has. the absolute number of people in poverty a. is much higher in 2019 than in 1959. b. has not changed much between 1959 and 2017. c. is much lower in 2017 than in 1959. d. has steadily decreased between 1959 and 2017. (ITS DUE IN 30 MINUTES)Frigidia is a colony in Antarctica. The colony is 1,000 square kilometers in size. Currently, 30,000 people live there. Last year, 10,000 children were born and 2,000 people immigrated. 20,000 people died and 5,000 emigrated. It is believed that the island could support up to 50 people per square kilometer.The current growth rate is ___.43%-43%4.3 %-4.3% Founder of the NAACPBooker T WashingtonWEB DuBoisMarcus Garvey what internet explorer tools menu option allows active scripting sites to be added for sites you trust? an organ pipe is made to play a low note at 27.5 hz, the same as the lowest note on a piano. assuming a sound speed of 343 m/s, what length of open-open pipe is needed? Why do wolves symbolize loyalty? Select the six steps produce markets follow to adjust to scarcity and rising or falling prices.a determinant changesmarket equilibrium occurscurves shiftthe price changesthe market limits goodsresources are allocateddesire for goods decreasesa shortage or surplus ensuesOdesire for goods increases millions of women migrate to other countries each year in search of economic opportunities. many of them work primarily in what sector? The growth hormone axis contains at least one example of a negative feedback loop.a. Trueb. False