which of the following project management software is used to organize a flow of team activities and manage lists of tasks? A) SAP B) Microsoft SkyDrive

Answers

Answer 1

The project management software that is used to organize a flow of team activities and manage lists of tasks is D) Oracle Primavera.

Oracle Primavera is a project management software solution that helps to globally prioritize, plan, manage, and execute programs, projects, and portfolios.  Oracle Primavera is designed in such a way that can handle small and large projects in a number of diverse industries, such as information technology, construction, manufacturing, and energy.

Oracle Primavera is called a business intelligence software that offers a central repository for all portfolio, project, and resource data.

"

Question with missing options is as follows:

which of the following project management software is used to organize a flow of team activities and manage lists of tasks? A) SAP B) Microsoft SkyDrive C) G-oogle drive D) Oracle Primavera

"

You can learn more about Oracle Primavera at

https://brainly.com/question/11207967

#SPJ4


Related Questions

state five fonction of THE operating system​

Answers

Answer:

An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

Memory Management.

Processor Management.

Device Management.

File Management.

Security.

Control over system performance.

Job accounting.

Error detecting aids.

Show how components work together to achieve the goal. (a). university of sierra Leone (b). Democracy (c) College - school bus (d). Registration process at MMTU (e) Electrical fan​

Answers

Answer:

Explanation:

(a) University of Sierra Leone:

The University of Sierra Leone comprises three main constituent colleges: Fourah Bay College, College of Medicine and Allied Health Sciences, and Institute of Public Administration and Management. These colleges work together to achieve the university's goal of providing higher education to students in Sierra Leone. Each college offers a range of programs and courses, and students can take courses from multiple colleges to complete their degree. The university also has a central administration that oversees the functioning of the university as a whole.

(b) Democracy:

Democracy is a form of government in which power is held by the people through the process of free and fair elections. In a democratic system, citizens have the right to vote and participate in the decision-making process of the government. The key components that work together to achieve democracy include free and fair elections, a constitution that protects citizens' rights and limits the power of the government, an independent judiciary, and a free press. When these components work together, they help ensure that the government is accountable to the people and that citizens have a say in how they are governed.

(c) College - School Bus:

A college or school bus is a specialized vehicle designed to transport students to and from school or college. The bus is equipped with features such as a stop arm, flashing lights, and warning signs to ensure the safety of students while boarding or disembarking from the bus. The bus is operated by a trained driver who follows a pre-determined route to pick up and drop off students at designated stops. The college or school administration works with the bus company to ensure that the bus schedule and routes are optimized to meet the needs of the students.

(d) Registration process at MMTU:

The registration process at MMTU (Modern Manufacturing and Technology Unit) is designed to ensure that students can enroll in courses and complete their degree requirements in a timely and efficient manner. The registration process typically involves several components that work together, including course selection, scheduling, payment, and academic advising. Students typically meet with their academic advisors to select courses and create a schedule that meets their degree requirements. They then complete the registration process by submitting their course selections and paying any required fees. The MMTU administration ensures that the registration process is streamlined and that students have access to the resources they need to complete the process successfully.

(e) Electrical fan:

An electrical fan is a common household appliance that is designed to circulate air and provide a cooling effect. The key components that work together to achieve this goal include an electric motor, blades, and a casing. The electric motor drives the rotation of the blades, which then move air through the casing and out into the surrounding environment. The blades are typically made of lightweight materials and are designed to maximize airflow while minimizing noise. The casing is designed to direct airflow in a specific direction, and may include features such as speed controls, oscillation, and remote operation. When all these components work together, the electrical fan provides an effective and efficient way to cool a room or space.

In a democracy, the people hold the reins of power through the conduct of free and fair elections.

What is Democracy?

Citizens have the right to vote and participate in governmental decision-making in a democratic society.

Free and fair elections, a constitution that safeguards citizens' rights and places limitations on government power, an independent judiciary, and a free press are the main building blocks of democracy.

Together, these elements make it possible for the people to hold the government accountable and have a say in how their country is run.

Therefore, In a democracy, the people hold the reins of power through the conduct of free and fair elections.

To learn more about Democracy, refer to the link:

https://brainly.com/question/13158670

#SPJ2

1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions

Answers

The next step in the design process will be the design of different potential solutions. The correct option is D.

What is technological design?

Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.

A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.

A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.

Thus, the correct option is D.

For more details regarding technological design, visit:

https://brainly.com/question/26663360

#SPJ1

According to the text, which of the following technological advancements have aided the Internet's role in media convergence?
A. The development of digital technologies that allow information to be transferred as a series of binary codes
B. The development of smaller, personal computers, made possible through the development of microchips and microprocessors
C. The development of fiber-optic cable, which allowed a massive amount of information to be transmitted extremely quickly
D. All options are correct*

Answers

All options are correct. All the statements show technological advancements have aided the Internet's role in media convergence.

The Internet has played a significant role in the convergence of media, which refers to the combining of different forms of media such as television, radio, and print into a single platform or device. This convergence has been made possible by several technological advancements, including:

A. The development of digital technologies: Digital technologies allow information to be transferred as a series of binary codes, which can be easily transmitted and stored on a variety of devices. This has made it possible for people to access a wide range of media content, such as text, audio, video, and images, through the Internet.

B. The development of smaller, personal computers: The development of microchips and microprocessors has enabled the production of smaller, more powerful computers that can be easily carried and used by individuals. This has made it possible for people to access the Internet and media content from anywhere, at any time.

C. The development of fiber-optic cable: Fiber-optic cables are made of thin strands of glass or plastic and are used to transmit data over long distances. They have a much higher capacity for data transmission than traditional copper cables, making it possible to transmit a massive amount of information extremely quickly. This has allowed the Internet to support the streaming of high-quality video and other media content.

All of these technological advancements have contributed to the Internet's role in media convergence and have made it possible for people to access a wide range of media content from a single device.

Learn more about development: https://brainly.com/question/28011228

#SPJ4

Which of these measurements could be the measurement for a D sizing drawing
A.8 1/2 * 11in
B.11. * 17in
C. 14 * 20in
D. 20 * 26in

Answers

Out of the given options, the measurement that could be suitable for a D sizing drawing is option (D) 20 * 26 inches.

D sizing refers to a set of standardized paper sizes commonly used in architectural and engineering drawings. The D size paper measures 24 inches by 36 inches, or approximately 609.6 mm by 914.4 mm. While the exact dimensions may vary slightly, D sizing typically follows this general guideline.

Among the options provided, option D) 20 * 26 inches is the closest in size to the standard D size. While it is not an exact match, it is still within a reasonable range for D sizing drawings.

This measurement offers a similar aspect ratio and can accommodate the necessary information and details typically found in architectural and engineering drawings.

Options A) 8 1/2 * 11 inches, B) 11 * 17 inches, and C) 14 * 20 inches are not suitable for D sizing drawings. They are more commonly associated with letter-sized (A4) or tabloid-sized (A3) papers, which are smaller and may not provide enough space for detailed drawings or scale representation.

Therefore, option D) 20 * 26 inches is the most appropriate measurement for a D sizing drawing.

For more questions on D sizing drawing, click on:

https://brainly.com/question/31336003

#SPJ8

A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?

Answers

Since the  vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you  can respond is to  Refer the vendor to the right personnel.

What is an example of a reference vendor?

A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.

You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.

Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.

Learn more about pilot program from

https://brainly.com/question/28920126
#SPJ1

What are some methods of cyber bullying ?

Answers

Answer:

HARASSMENT

IMPERSONATION

INAPPROPRIATE PHOTOGRAPHS

WEBSITE CREATION

VIDEO SHAMING

A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.​

Answers

Answer: $1,500

Explanation:

The future value of value using simple interest is:

Future value = Value * ( 1 + rate * time)

2,400 = Value * (1 + 15% * 4)

2,400 = Value * 1.6

Value = 2,400 / 1.6

Value = $1,500

Write a program that will ask the user to input how many numbers are in a list. A loop is used to load the list
beginning with number 1. The user is then asked to enter a number between 0 and the biggest number in the list.
The original list is displayed. A function is then called that accepts 2 arguments (the list and the number entered
by the user) and then displays all numbers from the original list that are larger than the number entered by the
user. (!!IMPORTANT: a main function MUST be used for this program – the main function MUST call the display
larger function, passing the list and input value as arguments to determine and display numbers larger than the
number input by the user)

Answers

The program that will ask the user to input how many numbers are in a list is given below.

How to explain the program

Lst is the original empty list

# number of elements as input

n = int(input("How many numbers will be added to original list : "))

# iterating till the range

for i in range(0, n):

   ele = int(input())

   lst.append(ele) # adding the element

n1 = int(input("Enter a number Between 0 and "+str(n)+":")) // enter smaller number elememts

print("The list number smaller than "+str(n1)+" are :")

print(lst[0:n1])  

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

what does the record of a spreadsheet run

Answers

The record in a spreadsheet refers to a row of data that contains information about a specific entity or item within the spreadsheet. It represents a single entry or observation in the dataset being managed. Each record typically consists of multiple fields or columns that hold different attributes or properties related to the entity being represented.

In a spreadsheet, records are organized vertically in a tabular format, with each record occupying a separate row. The fields within a record are aligned horizontally across the columns of the spreadsheet. For example, if you are managing a sales spreadsheet, each record may represent a specific sales transaction and the corresponding fields could include information such as the date, customer name, product sold, quantity, price, and total amount.

The record of a spreadsheet is essential for organizing and managing data effectively. It allows you to store and track individual units of information in a structured manner. With records, you can easily locate and reference specific data points, perform calculations, analyze patterns, and generate reports.

Moreover, the records in a spreadsheet are highly flexible and dynamic. You can add new records as new data becomes available, modify existing records to update information, or delete records that are no longer relevant. This flexibility enables you to maintain an up-to-date and accurate dataset.

The record of a spreadsheet is crucial for performing various data manipulation tasks, such as filtering, sorting, and performing calculations. By working with records, you can extract specific subsets of data based on certain criteria, sort records based on different fields, and perform calculations or analysis on selected records.

In summary, the record of a spreadsheet represents a single entry or observation in a dataset. It consists of multiple fields that hold specific attributes or properties related to the entity being represented. Records are essential for organizing, managing, and analyzing data within a spreadsheet, allowing for effective data manipulation and analysis.

for more questions on spreadsheet

https://brainly.com/question/26919847

#SPJ11

which of the following best describes compounds.
A. They can only be separated chemically
b. they are always liquid at room temperature
c. they contain the atoms of just one element
d. they have the same properties as their elements

Answers

A. They can only be separate chemically

Answer:

A.

Explanation:

What will be the different if the syringes and tube are filled with air instead of water?Explain your answer

Answers

Answer:

If the syringes and tubes are filled with air instead of water, the difference would be mainly due to the difference in the properties of air and water. Air is a compressible gas, while water is an incompressible liquid. This would result in a different behavior of the fluid when being pushed through the system.

When the syringe plunger is pushed to force air through the tube, the air molecules will begin to compress, decreasing the distance between them. This will cause an increase in pressure within the tube that can be measured using the pressure gauge. However, this pressure will not remain constant as the air continues to compress, making the measured pressure unreliable.

On the other hand, when the syringe plunger is pushed to force water through the tube, the water molecules will not compress. Therefore, the increase in pressure within the tube will be directly proportional to the force applied to the syringe plunger, resulting in an accurate measurement of pressure.

In summary, if the syringes and tube are filled with air instead of water, the difference would be that the measured pressure would not be reliable due to the compressibility of air.

A LAN is a: O processing control unit network of computer systems that share the use of software and hardware
O type of modem O word processing software system O graphic design system

Answers

A LAN is a: B. network of computer systems that share the use of software and hardware.

What is a hardware?

In Computer technology, a hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched such as the following;

Central processing unit (CPU)KeyboardMonitorSwitchMouseRouter

What is a LAN?

In Computer networking, a LAN is an abbreviation for local area network and it can be defined as a group of personal computers (PCs), smartphones, printers, or terminals that are located within the same area and are connected by a common network cable or communication circuit.

In conclusion, a local area network (LAN) is composed of computer systems that make use of both software and hardware.

Read more on hardware here: brainly.com/question/959479

#SPJ1

What is software and explain the five types of software

Answers

Question: What is software and explain the five types of software

Explanation: The system software which is controlled and managed by the use of set of instructions and programs is called software.

Ex: Windows 7/8/10/xp etc...

the  types of software are'

system software and application software

Android.

CentOS.

iOS.

Linux.

Mac OS.

MS Windows.

Ubuntu.

Unix.

Answer:

What is system software and explain its types?

System Software

A system software aids the user and the hardware to function and interact with each other. Basically, it is a software to manage computer hardware behavior so as to provide basic functionalities that are required by the user.

WHICH OF THE FOLLOWING IS A CLASSICAL ALGORITHM APPLIED TO MEDERN CRYPTOGRAPHY
A: LINEAR SEARCH
B: PSEUDORANDOM NUMBER GENERATOR
C: BINARY SORT
D: MODULAR ARITHMETIC

Answers

The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

What is a pseudo random generator in cryptography?

In regard to the theoretical computer science and cryptography, a pseudorandom generator (PRG) is known to be used for a class of statistical tests.

It is said to be one that is known to be a kind of a deterministic method that is often used in the mapping if a random seed so that it can be able to be a longer type of pseudorandom string.

It is one where there is no need for statistical test in the class that can be used to tell the difference between the output of the generator as well as that  of the uniform.

Therefore, The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

Learn more about CRYPTOGRAPHY from

https://brainly.com/question/88001
#SPJ1

Explain expansion bus

Answers

Answer:

okay here

Explanation:

An expansion bus is an assortment of wires that allows for computer expansion with the use of an expansion board, a printed circuit board inserted into an expansion slot on the motherboard or backplane that provides additional features to a computer system.

The expansion bus is a collection of cables that facilitates the growth of a computer system by operating an expansion board, or by using a backplane, which facilitates the evolution of a computer system. In addition, the computer system will also be provided with additional features.

Hope this helps :)

digital crate to miss meat​

Answers

Im sorry, this makes no sense. i think it is supposed to be an analogy, but i would need more info or background about the question

Answer:

Wait......What is the question or why did u put that??? I am so confused rn. lol

Explanation:

What are the core steps to add revisions or features to a project?(1 point)
Responses

Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.

Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.

understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.

Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.

Answers

The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)

How  is this so?

 

The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on   the project, creating a list of functionality requirements,and developing   the requirements of the feature.

These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.

Learn more about project management at:

https://brainly.com/question/16927451

#SPJ1

What additional uses of technology can u see in the workplace

Answers

Answer:

Here are some additional uses of technology in the workplace:

Virtual reality (VR) and augmented reality (AR) can be used for training, simulation, and collaboration. For example, VR can be used to train employees on how to operate machinery or to simulate a customer service interaction. AR can be used to provide employees with real-time information or to collaborate with colleagues on a project.Artificial intelligence (AI) can be used for a variety of tasks, such as customer service, data analysis, and fraud detection. For example, AI can be used to answer customer questions, identify trends in data, or detect fraudulent activity.Machine learning can be used to improve the accuracy of predictions and decisions. For example, machine learning can be used to predict customer churn, optimize marketing campaigns, or improve product recommendations.Blockchain can be used to create secure and transparent records of transactions. For example, blockchain can be used to track the provenance of goods, to manage supply chains, or to record financial transactions.The Internet of Things (IoT) can be used to connect devices and collect data. For example, IoT can be used to monitor equipment, track assets, or collect data about customer behavior.

These are just a few of the many ways that technology can be used in the workplace. As technology continues to evolve, we can expect to see even more innovative and creative uses of technology in the workplace.

Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should

select Control Panel, then Network Protocols, then Internet
select the radio button, then change the adapter settings protocol
select the Security tab, then PPTP, and then Allow Protocols
select Set Up a Public Connection, then Disable Protocols

Answers

Answer:

select Control Panel, then Network Protocols, then Internet

Explanation:

Seeing as Juan is a network admin, he has access to the programs of the computer. Being tasked with setting up a VPN, he must go to the control panel, then network protocols (to see the network rules, per say), then the internet tab to finally set up the VPN.

To allow safe communication, Juan must select control panel  then, network protocols, and then  internet. Therefore, option A is correct.

What is VPN ?

You can interact secretly and securely within your corporation using a virtual private network (VPN), which is an extension of a company's intranet over the preexisting structure of either a public or private network.

The i5/OS operating system is utilised by both businesses, and a VPN connection can give them the protection they require to communicate between their respective networks. Compared to using conventional non-switched lines, creating a VPN is more cost-effective.

To allow a safe communication, the network operator should allow the internet protocol to interpret and which can be activated from the control panel. Hence, option A is correct.

Find more on VPN:

https://brainly.com/question/29432190

#SPJ3

Explain the importance of internal and external communication when managing a cyber-attack.

Answers

When managing a cyber-attack, effective communication is crucial for mitigating the attack's impact and minimizing damage to the organization's reputation and operations. Both internal and external communication plays a significant role in managing a cyber-attack, and their importance can be explained as follows:

Internal Communication: Internal communication is vital for ensuring that everyone in the organization is aware of the cyber-attack, its impact, and their roles and responsibilities in managing the incident. Some key aspects of internal communication during a cyber-attack include:

Rapid communication: The internal communication channels should be well-established and tested regularly, to ensure that information can be disseminated quickly and accurately in the event of an attack.

Coordination: Internal communication helps to ensure that different teams and stakeholders are working together effectively to respond to the attack. For example, the IT team may need to work closely with the legal team to address any legal implications of the attack.

Empowerment: Clear and effective internal communication can help to empower employees to take the necessary actions to protect the organization's systems and data. For example, employees may need to be instructed to change their passwords or avoid opening suspicious emails.

External Communication: External communication is equally important, as it helps to maintain trust and transparency with stakeholders outside of the organization. Some key aspects of external communication during a cyber-attack include:

Crisis management: External communication helps to manage the crisis by communicating with stakeholders such as customers, partners, regulators, and the media. It's essential to be transparent about the attack and provide regular updates on the organization's response.

Reputation management: The organization's reputation may be at risk during a cyber-attack, and external communication can help to mitigate this risk. For example, prompt communication can demonstrate that the organization is taking the attack seriously and working to protect its customers and partners.

Legal compliance: External communication may be required by law or regulatory bodies. Failure to communicate promptly and effectively can result in legal and financial penalties.

In summary, effective communication, both internal and external, is essential for managing a cyber-attack. It helps to coordinate the response, empower employees, manage the crisis, maintain the organization's reputation, and comply with legal and regulatory requirements.

Need help with Exercise 6

Need help with Exercise 6

Answers

The program based on the question requirements are given below:

The Program

import java.io.File;

import java.io.IOException;

import java.util.Scanner;

public class EncryptText {

       

       // read file and return all content as a String

       public static String readFile(String filename) throws IOException {

               Scanner scanner = new Scanner(new File(filename));

              String content = "";

               while(scanner.hasNextLine()){  

                       content += scanner.nextLine();

               }

               return content;

       }

       

       // fills entire grid with stars "*"

       public static void initializeGrid(char [][] grid, int m, int n) {

               for(int i = 0; i<m; i++)

                       for(int j = 0; j<n; j++)

                               grid[i][j] = '*';

       }

       

       // does the encryption

       public static void fillGrid(char [][] grid, int m, int n, String filename) throws IOException {

               

               // read file

               String text = readFile(filename);

               

               // fill entire grid with stars

              initializeGrid(grid, m, n);

               

               // i = row, j = column, for grid

               int i = 0, j = 0;

               

               // picks a char c from file text and populates the grid

               for(int k=0; k<text.length(); k++) {

                       

                       char c = text.charAt(k);

                       

                       // even row - fill left to right

                       if(i % 2 == 0) {

                               grid[i][j] = c;

                               j++;

                       }

                       // odd row - fill right to left

                       else {

                               grid[i][n-j-1] = c;

                               j++;

                       }

                       

                       // if end of column, go to next row and restart column

                      if(j == n) {

                               i++;

                               j = 0;

                       }

                       

                       // if end of rows, stop populating grid

                       if(i == m) {

                               break;

                       }

               }

       }

       

       // extract chars in column-major order

       public static void displayGrid(char [][] grid, int m, int n) {

               for(int j = 0; j<n; j++) {  // cols

                       for(int i = 0; i<m; i++) // rows

                               System.out.print(grid[i][j]);

               }

       }

       

       // start        

       public static void main(String[] args) throws IOException {

               

               String filename = "input.in";

               

               // define grid dimensions, m = rows, n = cols

               int m = 4, n = 8;  

               

              // define the grid

               char grid[][] = new char[m][n];

               

               // call the function to fill grid

               fillGrid(grid, m, n, filename);

               

               // show encrypted text

              displayGrid(grid, m, n);

                       

       }

}

Read more about programs here:

https://brainly.com/question/23275071

#SPJ1

Need help with Exercise 6
Need help with Exercise 6
Need help with Exercise 6
Need help with Exercise 6

12.2 question 3 please help

Instructions

Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}

Answers

Answer:

def swap_values(dcn, key1, key2):

   temp = dcn[key1] # store the value of key1 temporarily

   dcn[key1] = dcn[key2] # set the value of key1 to the value of key2

   dcn[key2] = temp # set the value of key2 to the temporary value

positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}

print("Initial dictionary: ")

print(positions)

swap_values(positions, "C", "PF")

print("Modified dictionary: ")

print(positions)

Explanation:

What help in executing commands quickly

Answers

Answer:99

Explanation:  Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.

At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.

After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.

Problem:

audio

The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?

audio

the production of light from an organism’s body

audio

the study of creatures that live in the ocean

audio

to move around underwater water like a fish

audio

an organism with a whip-like part it uses to move around in the water

2.) Using Constants and Variables to create a Program (10 points)
You are going to write out a program below that will help calculate the total amount of money made per
week, based on a 5 day work week and making $8 per hour.
You will need to create (2) Constant variables
You will need to create (3) variables

Answers

Using Constants and Variables to create a Program is given below.

How to create the program

# Establish constant values

DAYS_PER_WEEK = 5

HOURLY_WAGE = 8

# Introduce changeable parameters

hours_worked = 0

daily_earnings = 0

total_earnings = 0

# Ask user regarding hours labored each day

for day in range(1, DAYS_PER_WEEK + 1):

   hours_worked = int(input(f"How many hours did you work on day {day}? "))

   daily_earnings = hours_worked * HOURLY_WAGE

   total_earnings += daily_earnings

# Display aggregate income for the week

print(f"You made a total of ${total_earnings} this week.")

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?

Answers

Answer:

Redundant networks are generally more reliable.

Explanation:

The complete question is in this brainly link;

https://brainly.com/question/18302186

This is based on knowing the importance of a redundant network.

C. Redundant networks are more reliable

A redundant network is one that helps to increase the reliability of a computer system.

Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced.

This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.

Thus, redundant networks are more reliable.

Read more at; brainly.com/question/17878589

Explain how I can clear my site suggestions in the chrome app

Answers

Open the Chrome browser on your Android device, pick "Bookmarks" from the menu by pressing the "Menu" button. Tap and hold the bookmark you want to delete once the list of bookmark thumbnails shows.

What are site suggestions?

As users enter keywords in a search field, suggested queries show up in a menu. As users write each letter of their search, a list of suggestions that display below the search box are updated.

On your Android device, launch the Chrome browser, then select "Bookmarks" from the menu by clicking the "Menu" icon.

Once the list of bookmark thumbnails appears, tap and hold the bookmark you want to delete.

Open Chrome on your iPhone or iPad to disable link previews.Click on More Settings.Look for and select Content Settings.Disable Show Link Previews.

Thus, this way, one can clear site suggestions in the chrome app.

For more details regarding server, visit:

https://brainly.com/question/30168195

#SPJ1

Assign a pointer to any instance of searchChar in personName to searchResult #include iostream» 2 #include 3 using namespace std; 4 5 int main() 6 har personName [190]"Albert Johnson" 7 char searchChar 1 test passed All tests passed char* searchResult nulipt r; 10 searchChar-J'; IYour solution goes here 12 13 if (sea rc h Result coutくく"character ! nullptr) { found." くく endl; 15 16 else 17 18 19 20 return 0; 21 cout << "Character not found." << endl; Run

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

#include <cstring>//header file

using namespace std;

int main() //main method  

{

   char personName[100] = "Albert Johnson";//defining a char array  

   char searchChar;//defining char variable

   char *searchResult = nullptr;//use pointer type char variable to holding value as nullptr

   searchChar = 'J';//holding char value

   char *ptr = personName;//using pointer type char variable that holds a value

   while (*ptr) //defining while loop that checks *ptr value

   {

       if (*ptr == searchChar) //use if that check *ptr value is equal to searchChar

       {

           searchResult = ptr;//holding ptr value in searchResult

       }

       ptr++;//incrementing ptr value

   }

   if (searchResult != nullptr) //use if that checks searchResult value not equal to nullptr

   {

       cout << "Character found." << endl;//print message

   }  

   else //else block

   {

       cout << "Character not found." << endl;//print message

   }

   return 0;

}  

Output:

Character found.

Explanation:

In this code inside the main method, a char array is declared that holds values.  

In the next step, some char variable and pointer type char variable are declared that holds values.

Inside the while loop, the pointer variable is used, and in the if the block it checks its value and holds its values.

Outside the loop, it checks searchResult value not equal to nullptr and prints the value as per the given condition.

Answer:

deez lOL LOLOLOLOL

Explanation:

Complete the sentences describing a computer innovation.

Software and technology that allow people to work together on a task are known as ____?​

Answers

Answer:

Collaboration

Answer:

Software and technology that allow people to work together on a task are known as collaboration tools

Explanation:

Complete the sentences describing a computer innovation. Software and technology that allow people to

A mid-sized company's IT security engineer is attempting to make it more difficult for their wireless network to be compromised. She is using techniques such as using a random challenge-response dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-based encryption. What form of wireless attacks is she defending against

Answers

The form of wireless attacks is she defending against is Hijack .

Hijack attack on a system?

Cyber hijacking is a term that is also called  computer hijacking. This is known to be a  type of network security attack where  the attacker often have full control of computer systems, software programs and others.

Due to the attack, the company or firm cannot have control over their system and as such the engineer  in the above firm is defending against is Hijack.

The options are below

What form of wireless attack is she defending against?

Eavesdropping Insertion Hijack Replay

Learn more about Hijack from

https://brainly.com/question/23294592

Other Questions
which statement about protein folding is not true? question 34 options: generally, helices and sheets are found in different layers of a protein structure. burial of hydrophobic residues requires at least two layers of secondary structure residues close together in primary structure are often close together in tertiary structure. the conformation is most stable in a right-handed twist. the backbone of a sheet cannot readily hydrogen bond to an adjacent helix. you are working as a security expert in an e-commerce enterprise. your company recently decided on a short-term collaboration with a small business named buyme, and the following issue arose. whenever your customers purchase any product from buyme, the e-commerce website redirects them to the buyme website, asking for additional authentication. this results in customers abandoning their purchases. to solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from buyme without additional steps. how should you implement this without storing the customers' credentials on the buyme server? Which of these terrestrial planets would be the most likely to have active volcanoes on it right now?A planet that is larger than Earth and is less than 2 billion years old in a network users log in to the network instead of their local computers and are granted access to resources based on that login. group of answer choices client-server server local area peer-to-peer describe the reabsorption that takes place in the proximal tubule, loop of henle, distal tubule, and collecting duct. compare and contrast the relative amounts of reabsorption that takes place in the different segments. By undergoing meiosis, each primary spermatocyte ultimately gives rise to how many sperm cells? give the structure of the product you would expect from the reaction (if any) of 2-butyne with one molar a. use all communication methods available that are suitable for the team and follow up in writing when communicating verbally. remember that cultural and individual diversity may help project teams solving unforeseen problems during the course of the project. b. when you are about to form a team for your project, keep in mind that some cultures are developed, others are more primitive. some have values, some not. you should consequently avoid choosing members from countries with cultures that are not similar to your own. c. cultural dilemmas can prevent any project from being successful. they should therefore be smoothed or suppressed so as to make sure that they cannot disrupt project work. your effort should concentrate on communication that can help reach that goal. d. as norms regarding communication habits differ significantly across various cultures, communicating between people from different countries should only be done using written or verbal language. the nonverbal dimension simply bears too many risks. protected members of a base class are like _, but they may be accessed by derived classes. aluminum does not corrode because: question 19 options: an aluminum object is a better oxidizing agent than iron a layer of aluminum oxide coats the metal surface aluminum is coated with a stronger reducing agent all the above we learned how changes in the product markets cause changes in the labor markets. consider the market for candles, and suppose there is a decrease in demand for candles. what happens? a. increases the demand for workers who make candles and decreases their equilibrium wage. b. decreases the demand for workers who make candles and increases their equilibrium wage. c. decreases the demand for workers who make candles and decreases their equilibrium wage. d. increases the demand for workers who make candles and increases their equilibrium wage. what occurred as a result of the glorious revolution and the english bill of rights of 1689? g mips for question 1, write a program that asks the user for 5 integers and prints them in the reverse order from how the user inputted them (using your modified printintarray subprogram). 84. When men and women are in a room together, men tend to look at ____, and women tend to look at ____.physically attractive women; physically attractive women as well rather than hire federal workers to make infrastructure repairs to interstate highways, the government contracted with local construction companies in the affected areas to complete the work. this an example of which of the following? Using a compensating differential wage theory, some individuals earn more than others because workers1.who earn more are more productive.2.need to earn more to be willing to accept dangerous working conditions.3.need to earn more to be willing to accept a safe indoor job.4. who are more educated and better trained are able to earn more than the equilibrium wage.5. who earn more tend to be concentrated in a single occupation. which of the following is true? a) the commission may suspend or revoke the license of a license holder who discriminates against an owner, potential buyer, landlord, or potential tenant. b) the texas real estate commission may suspend, but not revoke, the license of a real estate license holder who discriminates against an owner, potential buyer, landlord, or potential tenant. c) the commission may only place on probation the license of a license holder who discriminates against an owner, potential buyer, landlord, or potential tenant. d) the commission may make a license holder pay punitive damages if the license holder discriminates against an owner, potential buyer, landlord, or potential ten 2.which of the following statements best describes a keynesian approach to economics? a)aggregate demand is the most important driving force in the economy, but free-markets have no self-balancing mechanisms that lead to full-employment; therefore, government intervention is often necessary to stabilize an economy. b)politics determines economics, the nature of economics is conflictual, and the main actors are nation-states; therefore, the main goal of economic activity is the maximization of national interest. c)individual freedom to pursue interests/wealth in an open market free of government interference with the role of government to primarily protect property rights. d)resources flow from a periphery of poor and underdeveloped countries (global south) to a core of wealthy states (global north) enriching the latter at the expense of the former. poor countries are systemically locked into this unfavorable situation. Describe the relationship between carbon emissions and urban density as shown on the graph.As urban density increases, per capita carbon emissions decrease. examine the method used to arrange a marriage and show the effects on those involved things fall apart