What defines employability

Answers

Answer 1
is this multiple choice or are you looking for the definition?

Related Questions

which feature of project management includes monetary compensation for the employees

Answers

Answer:

Extrinsic compensation

Explanation:

The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.

Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.

example of Non-monetary compensation includes certificate of honor, medical insurance .

example of monetary compensation includes : work Bonuses , salaries

She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?

A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging

Answers

Debugging is the answer

The process is Ana using is Debugging. Check below to see what the term is all about.

What is debugging used for?

Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.

Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.

Learn more about Debugging from

https://brainly.com/question/163290

#SPJ2

Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine

Answers

Answer: D. Scan the images with 600 DPI

Explanation:

Answer: D. Scan the images with 600 DPI

Explanation: Correct for Plato/Edmentum

Examples of hardware that computes on a network can share are the operating system and the web browsers

Answers

Answer:

False.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers

4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference

Answers

Answer:

A. interview

Explanation:

In VPython, which line of code creates a ball five units away from the user from the center?

ballPosition = _______

myBall = sphere(pos = ballPosition)


vector(0, 0, -5)


vector(0, -5, 0)


vector(-5, 0, 0)

Answers

The line of code creates a ball five units away from the user from the cente is  ballPosition = vector(0, 0, -5)

What is python code?

In Python, there is found to be a generally used coding language such as HTML, etc.

Know that it is often used in programming and software creation and as such, having the ballPosition =  to be vector(0, 0, -5) myBall = sphere(pos = ballPosition) is the right thing to do.

Learn more about VPython from

https://brainly.com/question/26497128

#SPJ2

what's wrong with this python code i don't know what's wrong with both of them

Answers

Answer:

Keep it in the format

first one:

def swapping_stars():

   line_str = ""

   for line in range(6, 8):

       for char in range(0, 6):

           if line % 2 == char % 2:

               line_str = line_str + "*"

           else:

               line_str = line_str + "-"

           print(str(line_str))

swapping_stars()

second one:

if you want it to go:

23456

def print_numbers(list):

   for i in range(1, len(list)):

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

if you want it to go

123456

def print_numbers(list):

   doneONE = False

   for i in range(1, len(list)):

       if not doneONE:

           print(str(list[i] - 1))

           doneONE = True

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

Explanation:

Which of these is a discipline?

software manager

customer service specialist

help desk technician

software engineering

Answers

Answer:

Option D

Explanation:

Discipline here refers to any educational course in which a person studies.

software manager , customer service specialist  and help desk technician are basically the job designations and not discipline in which one can pursue study.

However, software engineering is a discipline as one can educate himself/herself in this discipline and become a software engineer.

Hence, option D is correct

What is fish processing?

Answers

Fish processing involves preparing fish and seafood for delivery to consumers. Once fish is harvested, it must undergo several steps before it’s ready to be sold in the market. The process includes gutting, filleting and packaging of the product. Fish is a highly perishable food, so it must be carefully handled from the moment it’s caught until it’s sealed in packaging material

Your program has a loop where a user guesses a letter.

Your program compares the guess to each letter in the word.

Finish the code.

for n in range(lenWord):
if _______ == letter:
blanks = blanks[:n] + letter + blanks[n+1:]


correct[n]


correct


correct(n)

Answers

Answer:

its correct[n]

Explanation:

for n in range(lenWord):

if correct[n] == letter:

blanks = blanks[:n] + letter + blanks[n+1:]

A loop in a computer program is an teaching that repeats until a specified condition is reached.

In a loop structure, the loop asks a question. If the answer needs action, it is executed. The same question is asked  again until no other action is required.

What are loops used for in programming?

A Loop is employed to repeat a specific block of code a over and over. There are two main types of loops, for loops and while loops.

What are the 3 types of loops in programming?

In Java, there are three kinds of loops which are – the for loop, the while loop, and the do-while loop. All these three loop constructs of Java executes a set of replicated statements as long as a specified condition stays true.

To learn more about A loop, refer

https://brainly.com/question/26568485

#SPJ2

so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it

Answers

Answer:

That's tough...

Explanation:

Answer:

ok and?

Explanation:

This is not a question

Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc. You're in charge of writing the safety rules and regulations for the company. Provide at least four discrete rules you would implement

Answers

Answer: maybe not put cheats no secret or easter eggs or hard challenges im not sure

Explanation:

The four discrete rules one  would implement can be

Provide no confidential company information to anyone who is not an employee of the company.Acknowledge sources obtained from other people's games or anything else with a copyright claim.Avoid abusing your power by cheating or abusing the games to benefit yourself or your associates.Maintain a positive workplace culture and show the utmost respect to everyone to increase productivity.

What is a  manager?

A manager refers to a person who is responsible head of any project and helps in arranging the resources, checking the progress, and timely completion of it in order to achieve the vision and goal of the organization.

Preventing workplace diseases and injuries, as well as the suffering and financial burden they can bring on employees, their families, and employers are the fundamental objective of safety and health initiatives.

Learn more about managers, here:

brainly.com/question/29023210

#SPJ5

Which line of code converts 3 to 3.0?

int(3)

type(3)

float(3)

single(3)

Answers

Answer:

float

Explanation:

BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.

blocks websites
filters all emails
filters social media
filters web searches
jams signals

Answers

Answer:

the first four options

Explanation:

they make the most sense

The Great Firewall of China is designed and developed to:

Block websites.Filter all emails.Filter social media.Filter web searches.

What is the Great Firewall of China?

The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.

In this context, the Great Firewall of China is designed and developed to domestically:

Block websites.Filter all emails.Filter social media.Filter web searches.

Read more on Great Firewall of China here: https://brainly.com/question/27411286

#SPJ2

just need to know if these are correct

Answers

Answer:

Yes, they are correct.

Answer:yea g

Explanation:

In today's e - commerce world, 'Disintermediation' may only affect intermediaries who are not performing value added services to customers. Do you agree with this statement? Explain why?

Answers

Answer:

No

Explanation:

Although 'Disintermediation' does affect these intermediaries I believe it also affects those that 'are' providing valuable services. This is because many other factors come into play when deciding to reduce intermediaries. Sometimes when a company has various intermediaries, a single one can provide the same value as two, therefore, for the company, it is more valuable to reduce the number of intermediaries that they have and provide more resources to fewer intermediaries so that they perform better for less pay. This is one of a few reasons why it can affect any intermediary, not just the ones that do not provide value.


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

Stages of reverse engineering

Answers

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

what is faster C++ or go lang

Answers

Answer:

C++

Explanation:

PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST

1.) Online crimes causing loss of money: give 5 names and examples to each

2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each

3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each

Answers

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?

Answers

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

first calculating device​

Answers

Answer:

abacus is first calculating device

Fingers, people counted using fingers first.

What is the output of this program?

grades = [89, 70, 98, 100, 83]

print(grades[-4])

Group of answer choices

89

100

70

98

Answers

Answer:

70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer

click on the _____button to move the selected text in the centre of the page (justify /centre)​

Answers

Answer:

centre

Explanation:

What is the check digit for the following original product number: 140501941 ? *

a)10
b)7
c)5
d)2

Answers

Explanation:

I think it is 7, but I could be wrong..... sorry

subscribe to twomad or you are cringe for the rest of your life kid

Answers

Answer:

What if I don't want to?..........

Lorann sends messages to Aiden that always go into Aiden’s Junk E-mail folder. Which process would best correct this problem so that Lorann’s messages no longer go into Aiden’s Junk E-mail folder?
A. adding Aiden to the Safe Senders list
B. adding Aiden to the Safe Recipients list
C. adding Lorann to the Safe Senders list
D. adding Lorann to the Safe Recipients list

Answers

C doing this for points

Answer:

b

Explanation:

I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD

Answers

I'm better then u in brawhlla

When using the Photo Album dialog box, a picture

cannot be modified in this view.
cannot have text added.
can be inserted from a file or disk.
will be permanent when added to the box.

Answers

Answer:

can't have text added and will be permanent when added to the box

Other Questions
Mr. Bradley was diagnosed with schizophrenia seven years ago. Prior to the onset of his illness, he was attending medical school and planning to be a pediatrician. However, his delusions and hallucinations made it impossible for him to finish school, and after attempting a series of lower-level jobs, Mr. Bradley gave up on being able to keep a job or earn a living. He now lives in a run-down hotel on skid row. Mr. Bradley's story fits the ___________________ theory of social class and schizophrenia. The function f(x) = 1.25x^2 models the packaging costs, in cents, for a box shaped like a rectangular prism. The side lengths are 2x in., 2x in., and 0.5x in. What are reasonable domain and range values for this function, if the longest side length of the box can be no greater than 20 in.? Write the answers in interval notation. A recipe requires 6 1/8 cups of milk Ran put in 3 7/8 cups and emptied a container. How much more milk does he need to put in? Let A be a matrix with independent rows. A. Show that AAT is invertible. B. Show that if b is any vector in Col(A), then the equation Ax = b has a solution in Row(A) given by xR = AT (AAT )1 b. (The matrix AT (AAT )1 is called the pseudoinverse of A, and is usually denoted by A+ . It is a right inverse of A, and coincides with the two-sided inverse A1 if A is square.) c. The mapping of Col(A) to Row(A) given by xR = AT (AAT )1 b is an isomorphism It is known that screws produced by a certain company will be defective with probability 0.01, independently of each other. The company sells the screws in packages of 10 and offers a money-back guarantee that at most 1 of 10 screws are defective. That is, the package would have to be replaced if greater or equal to 2 screws are defective. What proportion of packages sold must the company replace Is this the reason why the wall art subculture is on the rise? YES NO(i) Lack of preservation of art work(ii) Art Festival held in Delhi to liven up walls in Delhi(iii) Gandhis image painted on Delhi Police Headquarters(iv) Professionally executed work of art Amelia made a line plot of her scores on 25-point math quizzes.What is the difference between the total of her most frequent number of points per quiz andthe total of her greatest number of points scored per quiz? A. 0 points B. 6 points C. 18 points D. 22 points Match the definition to the term.meansexpositionpurposethesisprocess analysisa statement, coming at the beginning of the report, telling what it's abouta step-by-step examination of how something workshow the agent accomplished the actiona presentation or explanation of information, such as a travelogueWhat were the agent's motives? For what reason was the action done? Someone please help! WILL MARK BRAINLIST!! solve for x please answer this question Hi, I need help please!Jacob stood in line to pick up a souvenir postcard at the museum. All the postcards were either blue, white, or green, with a picture of a fish, insect, or bird. There was an equal number of each type of postcard. What is the probability that Jacob was randomly handed a green postcard with a fish on it?A): 1/6B): 1/9C): 1/2D): 1/3Thanks so much, I would truly appreciate it! :) Why do people believe in interactionism paraan sa pagtutulungan sa bayan ng sangguniang panlalawigan A corporation can continue to exist after the death of its owners? True or false need an essay 200 words about the Asian hate crimes. for ROTC by tomorrow at 12PM Which phrase most clearly expresses the speakers desire to be michievous? Read the passage. excerpt from The Alchemist by Paul Coelho When I had my sheep, I was happy, and I made those around me happy. People saw me coming and welcomed me, he thought. But now I'm sad and alone. I'm going to become bitter and distrustful of people because one person betrayed me. I'm going to hate those who have found their treasure because I never found mine. And I'm going to hold on to what little I have, because I'm too insignificant to conquer the world. He opened his pouch to see what was left of his possessions; maybe there was a bit left of the sandwich he had eaten on the ship. But all he found was the heavy book, his jacket, and the two stones the old man had given him. How do the two stones affect the meaning in this passage How is the distribution of mineral resources in the pacific islands related to how different islands are formed?5-7 SentencesNO LINKS!!!! How many different codes can a combination lock have if there are 4 numbers on the lock and each number can be from 0-9? Plz help me well mark brainliest if correct!!....