A technology-literate knowledge worker: A. knows how and when to apply technology B. is a computer savvy worker C. knows all computer programming languages D. is knowledgeable about emerging technology

Answers

Answer 1

Answer:

A. knows how and when to apply technology

Explanation:

Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.

A technology-literate knowledge worker knows how and when to apply technology. This ultimately implies that, someone who is well grounded or informed about a technology understands how and when to apply technology.

Basically, knowing how to use a technology simply means he or she understands the appropriate method or technique to be used in the application of a technology such as when solving a problem. Also, knowing when to use a technology means to know the appropriate time to use a particular technology without it having any repercussion or adverse effect.

Answer 2

Answer:

A

Explanation:

Think about it like this:

A literate person in writing doesn't just know letters, they know how to put them together. Now put that in terms of computers.


Related Questions

What network appliance senses irregularities and plays an active role in stopping that irregular activity from continuing?
A) System administratorB) FirewallC) IPSD) IDP

Answers

Answer:

C IPS

Explanation:

its called in-plane switching It was designed to solve the main limitations

Someone explain? Java

Answers

First, the code initializes a variable of type int. The variable x = 15. The if statement runs if x is greater than 10, which x is greater than 10. The program prints A and B to the console. The else statement is ignored because the if statement runs.

What goes in the red blanks?

Answers

Answer: In the middle you would put the definition or meaning, on the right side you would put the code, on the left side you would put the code in between </    >.

Explanation:

During the TCP 3-way handshaking process, each side of the communication randomly generates a sequence number, and then sends that random value in a message with the SYN flag turned on. If the sequence numbers were NOT randomly generated and each side had used sequence number 0 to start communication, what potential pitfalls would you expect

Answers

Answer:

Following are the solution to this question:

Explanation:

The handshake TCP 3-way is working as follows:

[tex]Client ------SYN-----> Server\\\\Client <---ACK/SYN---- Server\\\\Client ------ACK-----> Server\\\\[/tex]

In TCP, both parties monitor what they sent from a data packet. It turns out it was an overall byte count of all of the sent. Its recipient may be using the hash value of the opposite user to recognize the receipts, however, TCP is a bi-directional data protocol, that requires both sides to also be able to correctly send data. Its parties involved must create the ISN, but the data packet does not start at 0, and that both sides must accept the ISN of all the other party. It ISN starts with such a random supply voltage (immediate Sequence Number) because TCP is two-way communication, all sides can "talk" but must thus produce an ISN as the starting data packet randomly. Throughout the exchange, both parties must notify another party about ISN which they have started.

When a malicious attacker can not randomly select and configure the hash value appropriately, a TCP-session (that can be secure links to a business, shop, or some other commercial business) could be hijacked. That device has to count every byte of a stream sent for the initial random data packet. It could the network users in just three communications agree from each control message value.

A specific field of series and the identification number is contained for each section. During the first SYN sent to the server, the client selects the original hash value (ISN). The ACK database will add it to the proposed ISN or forward that on the SYN to a client to suggest its ISN (ACKs should remind the sender always of the next planned byte). For instance, whenever the number used for the previous link is the same, the ISN of a Client could be rejected, but that's not taken into consideration.

Its client's ACK typically acknowledges the ISN mostly on the server which maintains contact between these sides, as defined by the acknowledgment sector of the server, ISN + 1 mostly on the server. Realize that perhaps the three-way handshake does not send some information. This should be kept till a link is formed. Its 3-way handshake was its universal process for just a TCP connexion to still be opened. Oddly, the RFC doesn't insist on which communications start that way, particularly when setting certain scale reliability in the Header field (three additional controlling bits are accessible besides SYN and ACK and FIN) because TCP assumes that certain control bits would be used during the connexion establishment and release, but others mostly during transferring data, a great deal of damage could be caused by merely messing up the six scale reliability with crazy variations, especially SYN / ACK / FIN which needs, uses, and completes a link concurrently.

To rename and save a document to OneDrive, you should use which option?

A: save
B: save as
I'm confused since both can let u rename but I can only pick one.

Answers

Answer:

Save as :)

Explanation:

Answer:

Download

Explanation:

I got the answer right on the exam

discuss at least three artefacts of organizational culture

Answers

Answer:

Artifacts

Espoused Value

Shared Basic Assumptions

Explanation:

Artifacts are the overt and obvious elements of an organization. They’re typically the things even an outsider can see, such as furniture and office layout, dress norms, inside jokes, and mantras. Yes, foosball and free food are also artifacts. Artifacts can be easy to observe but sometimes difficult to understand, especially if your analysis of a culture never goes any deeper. The Palo Alto office of IDEO famously has an airplane wing jutting out from one wall, a surprising and puzzling artifact if one doesn’t understand IDEO’s culture of playful experimentation and free expression.

Espoused values are the company’s declared set of values and norms. Values affect how members interact and represent the organization. Most often, values are reinforced in public declarations, like the aptly named list of core values, but also in the common phrases and norms individuals repeat often. Herb Kelleher was famous for responding to a variety of proposals from Southwest colleagues with the phrase “low cost airline,” reaffirming the espoused value of affordability.

Shared basic assumptions are the bedrock of organizational culture. They are the beliefs and behaviors so deeply embedded that they can sometimes go unnoticed. But basic assumptions are the essence of culture, and the plumb line that espoused values and artifacts square themselves against. Zappos call center employees share a strong belief that providing outstanding service will result in loyal customers, so much so that employees send potential customers to other retailers if Zappos doesn’t have the item in stock. Basic assumptions manifest themselves in a variety of ways. Sometimes they’re reflected in the espoused values and in artifacts, sometimes not. But when basic organizational assumptions don’t align with espoused values, trouble arises. Enron produced a 64-page manual outlining the company’s mission and espousing its core values, but judging by their very “creative” accounting practices, it’s questionable if the executives at the top had ever read it.

The __________ IP address is the IP address of the local IP host (workstation) from which Wireshark captures packets.

Answers

Answer:

Source

Explanation:

Wireshark is a packet sniffing tool used by network administrators and hackers to monitor data transfer activities within a network.

The wireshark software captures packet in the network from the source workstation or host from which it runs.

Computed tomography uses magnetic waves to capture the image.
True or False ?

Answers

Answer:

True

Explanation:

I did it

Answer:

False

Explanation:

How did the advertising company know he was interested in those shoes? Or in that store?

Answers

Answer:

Because they have ads based on what you search most

Explanation:

Which command displays various pieces of information about the current IOS version, including the licensing details at the end of the command's output

Answers

Answer:

The show version command

Explanation:

It is the show version command that display various pieces of information about the current IOS version, including the licensing details at the end of the command’s output.

This command is an example of a command that can be used to gather information about the current IOS version running on the given router.

It also has the capability of giving several other manufacturing information about the router in question. Summarily, it helps to give information about details related to the hardware present (e.g memory) and the software (e.g IOS version of the router)

Kelsey noticed one of the new employees at her job is struggling with the amount work assigned to her. What can Kelsey do to support her co-worker?

A: Complete the work for her co-worker.
B: Offer to help her co-worker.
C: Ignore her co-worker. It's none of her business.
D: Document it, then tell her manager.

Answers

Answer:B. Offer to help her co-worker.

Explanation: She can help, but A, meaning she would do all the work for her co-worker and Kelsey not get paid.

B is the best option!

-AW

Answer: B offer to help her co-worker.

Explanation:

Just trust me I did the test.

You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?

Answers

Answer:

Map

Explanation:

I put it in on Edg and got it correct, hope this helps :)

Answer:

The correct answer is map

Explanation:

I just did the assignment on edge 2020 and got it right

what is the importance of ICT in agriculture​

Answers

Answer:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

Explanation:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

1. List three hardware computer components? Describe each component, and what its function is.

Answers

Explanation:

I can't just describe it hope this much is fine for the....

Answer:

Three hardware components are;

input deviceoutput deviceC.P.U

The input devices are used to get data into a computer.

The output device are used to get processed data out of a computer.

The C.P.U which is known as the central processing unit, it is known as the brain of the computer, it takes the raw data and turns it into information.

What field in the IP header can be used to ensure that a packet is forwarded through no more than N routers

Answers

Answer:

The Time-to-live field

Explanation:

The time to live (TTL) is also the hop limit, it is a way of limiting the lifespan of data that is on a system or network. The TTL is set when a TCP packet has been sent. It is the number of routers that it can go through until the packet is gotten rid of or discarded. The Time to Live ensures that a packet is is forwarded through not more than N routers.

Write a function biggestAndRest that accepts one argument---a list containing integers. biggestAndRest should then return a tuple with two items: (1) the largest integer in the original list and (2) a nested tuple containing the rest of the items in the original list. For example, biggestAndRest([3,1,4,2]) should return (4, (3,2,1))

Answers

Open your python console and execute the following .py code.

Code:

def biggestAndRest(lis):

   mxE = max(lis)

   maxIdx = lis.index(mxE)

   l2 = lis.copy()

   l2.pop(maxIdx)

   return mxE,tuple(l2)

r = biggestAndRest([3,1,4,2])

print(r)

Output

(4, (3, 1, 2))

Discussion

From [3,1,4,2] it became (4, (3, 1, 2))

following the principle of the function biggest and rest

What is the best reason a student should cite an online source for a school report?

It demonstrates the credibility of the online source.
It shows the student wants to get a good grade.
It shows the student was interested in the topic.
It demonstrates the length of time it took to write the report.

Answers

Answer:

A

Explanation: B and C are easy to cross off, as they aren't related strictly to citing your sources. D doesn't make sense because anything can be cited in any amount of time. The answer is A.

Answer:

it demonstrates the credibility of the online source for a school report

Explanation:

you can apply a gradient or solid background to a publication.​

Answers

Oh okay that’s wassup

Answer:

TRUE!

Explanation:

Click on background

Why is the role of the computer in banking system?

Answers

Answer:

The role of computer in banking system is that it maintain customer accounts, ledger, updating, electronic fund transfer and processing of huge amount of cheques, credit cards and and the major transaction that take place daily.

The roles of the computer in the banking system are to store the account,  information of customers and verify the financial records in a matter of seconds.

What is the function of computers?

A computer's four major functions are to receive data and instructions from a user, process the data according to the instructions, and display or store the produced data.

Computers are used in banks for a variety of purposes. For starters, they aid in saving customer account information and authenticating financial data in a matter of seconds.

Therefore, the computer's role in the banking system is to maintain customer accounts, and ledgers, update electronic fund transfers, and the processing of large amounts of checks, credit cards, and important transactions that occur on a daily basis.

To learn more about the function of computers, refer to the link:

https://brainly.com/question/15827489

#SPJ5

Look at the following assignment statements:

word1 = "skate"
word2 = "board"

What is the correct way to concatenate the strings?


newWord = word1 / word2
newWord = word1 + word2
newWord = word1 * word2
newWord = word1 = word2

Answers

The correct way to concatenate the strings is:

newWord = word1 + word2

Answer:

newWord = word1 + word2

Explanation:

Write a function, named series_of_letters, that takes a reference to a vector of chars and returns nothing. The function should modify the vector to contain a series of letters increasing from the smallest letter (by ASCII value) in the vector. Note, the vector should not change in size, and the initial contents of the vector (excepting the smallest letter) do not matter.

Answers

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

#include <vector>//defining header file

#include <algorithm>//defining header file

#include <iterator>//defining header file

using namespace std;//use namespace

void series_of_letters(vector<char> &d)//defining a method series_of_letters that accept a vector array  

{

char f = *min_element(d.begin(), d.end()); //defining a character array  that holds parameter address

   int k = 0;//defining integer vaiable  

   std::transform(d.begin(), d.end(), d.begin(), [&f, &k](char c) -> char//use namespace that uses transform method  

   {

       return (char)(f + k++);//return transform values

   });  

}

int main() //defining main method

{

   vector<char> x{ 'h', 'a', 'd' };//defining vector array x that holds character value

   series_of_letters(x);//calling series_of_letters method

   std::copy(x.begin(),x.end(),//use namespace to copy and print values

           std::ostream_iterator<char>(std::cout, " "));//print values

}

Output:

a b c

Explanation:

In the above code, a method "series_of_letters" is defined that accepts a vector array in its parameter, it uses a variable "d" that is a reference type, inside the method a char variable "f" is defined that uses the "min_element" method for holds ita value and use the transform method to convert its value.

Inside the main method, a vector array "x" is defined that holds character value, which is passed into the "series_of_letters" to call the method and it also uses the namespace to print its values.

When you want to add information to a document, what role does your operating system play?

Answers

Not sure how to answer this question but I have a laptop so when you want to edit or type on a document, that’s already made, click “Editing document”. If you want to make your own click “Open”. Then, click save as if you want to add your name to the document and save it to your device :)

When you want to add information to a document, the operating system assigns the file its name, location, and size.

What is an operating system?

An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

The file's name, location, and size are determined by the operating system. When you add information to a word-processing document, one of the functions of your operating system is to store unsaved work in temporary storage.

Therefore, when you add information to a document, the operating system names locates and sizes the file.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ6

python Factoring of integers. Write a program that asks the user for an integer and then prints out all its factors. For example, when the user enters 150 (which equals 2 * 3 * 5 * 5), the program should print: The factors of 150 are: 2 3 5 5

Answers

Answer:

Written in Python:

num = int(input("Number: "))

i = 2

print("The factors of "+str(num)+" are ",end='')

while num > 1:

     if num%i == 0:

           num = num/i

           print(str(i)+" ",end='')

           i = 2

     else:

           i = i + 1

Explanation:

This line prompts user for input

num = int(input("Number: "))

This line initializes divisor, i to 2

i = 2

This line prints the literal in quotes

print("The factors of "+str(num)+" are ",end='')

The following while loop checks for divisor of user input and prints them accordingly

while num > 1:

     if num%i == 0:  This checks for factor

           num = num/i  Integer division

           print(str(i)+" ",end='')  This prints each factor

           i = 2  This resets the divisor back to 2

     else:

           i = i + 1

The program that asks the user for an integer and then prints out all its factors is represented as follows:

x = int(input("please input an integer: "))

for i in range(1, x+1):

  if x%i == 0:

     print(i)

The first line of code ask the user to input the integer number.

Then we loop through the the range of 1 to the inputted integer plus one.

The integers is then divided by the looped numbers . if it has no remainder then it is a factor.

Finally, we print the factors.

learn more about python here; https://brainly.com/question/17184408?referrer=searchResults

3.5) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculous

Which of the following are parts of the Physical Layer?


connectors

pins

cables

pointers

Answers

Answer:cables

Explanation:

Answer:

Cable And Connectors

Explanation:

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC

Answers

Answer: 3001.

Explanation:

The Server would acknowledge the 3001 information after it receives two packets of data from the personal computer, which is being used to communicate with the web server of the TCP (Transmission Control Protocol) with a window of 6000.

A TCP is the defined standard which is used for establishing and maintaining a network conversation. this is a medium from which applications programs exchange data.

The TCP is explicitly called the Transmission Control Protocol which allows computing devices to communicate and exchange information by sending packets over a network. Hence, the byte of information acknowledged after receiving 2 packets of data is 3001.

Size perpacket data = 1500 bytes Number of packets sent = 2

The bytes of information acknowledged by the web server can be calculated thus :

Size per packet data sent × number of packets

1500 × 2 = 3000

Therefore, the bytes of information that would be acknowledged by the web server is 3001.

Learn more : https://brainly.com/question/12191237

Write a C program which dynamically allocates memory to define an integer array with the length 15 by using the calloc function. Do not forget to free the memory in the end of your program. What happens if you attempt to print your string before and after freeing memory

Answers

Answer:

When you try to print values from the array before setting free the memory previously allocated, it will return values that were inserted while runtime.

For this it is used the calloc, that is a function of the stdlib.h library, of the C programming language. Its objective is to create a vector of dynamic size, that is, defined during the execution of the program. It differs from the malloc function, also from C, because in addition to initializing the memory spaces, it also assigns the value 0 (zero) to each one. It is useful, because in C when a variable is declared, the space in the memory map used by it probably contains some garbage value.

Code:

#include <stdio.h>

#include <stdlib.h>

int main()

{

   int* ptr;

   int n, i;

   n = 15;

   ptr = (int*)calloc(n, sizeof(int));

   if (ptr == NULL) {

       printf("\n Memory is not allocated");

       exit(0);

   }

   else {

       printf("\n Memory allocated");

       for (i = 0; i < n; i++) {

printf("\n Input value in the array at position %d: ",i);

scanf("%d",&ptr[i]);

       }

      printf("\n The elements of the array are: ");

       for (i = 0; i < n; i++) {

           printf("%d, ", ptr[i]);

       }

free(ptr);

   }

return 0;

}

The formula for calculating your BMI is below.

BMI=703weight in pounds(height in inches)2
Which line of code will correctly calculate the BMI? Select 3 options.


bmi = 703 * weight / height ** 2

bmi = 703 * weight / height * height

bmi = (703 * weight) / height ** 2

bmi = 703 * weight / (height * height)

bmi = 703 * weight / height ^ 2

Answers

The first, third, and fourth choices are correct.

The line of code that will correctly calculate the BMI are bmi = 703 * weight/height ** 2, bmi = (703 * weight) / height ** 2,. and bmi = 703 * weight / (height * height). The correct options are a, c, and d.

What is BMI?

Body mass index is a measurement based on a person's weight and height. The BMI is calculated by dividing the body weight by the square of the size, and it is expressed in kilograms per square meter (kg/m2) since weight is measured in kilograms and height is measured in meters.

Body Mass Index (BMI) is calculated by dividing a person's weight in kilograms (or pounds) by their size in meters squared (or feet). People who are exceptionally muscular may have a high BMI because muscle weighs more than fat.

Therefore, the correct options are:

bmi = 703 * weight / height ** 2bmi = (703 * weight) / height ** 2bmi = 703 * weight / (height * height)

To learn more about BMI, refer to the link:

https://brainly.com/question/28517673

#SPJ2

does Assembler directives execute at runtime?

Answers

Answer:

Instructions are executed at run-time. Directives are instructions for the assembler and thus are not really executed at all.

Explanation:

Critical Thinking 5-1: DoS Attacks Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently (within the last two years)

Answers

Explanation:

The DDoS attacks occur when a bad actor bombards an online network or service with very large amounts of traffic in an effort to overwhelm the network and then disrupting the services from their full operation.

Some of the most widely publicized DoS attacks that have occurred recently include:

The AWS (Amazon Web Services) DDoS Attack occurred in February 2020.The GitHub DDoS attack which occurred in February 2018.The Dyn DDoS attack which occurred in October 2016.

What is the smallest value that can be written to the address of the LED array in order to turn on all 8 LEDs

Answers

Answer:

0xFF

Explanation:

0xff is a computer programming character which is the hexadecimal number FF that has an integer value of 255. It is represented as a binary in 00000000000000000000000011111111 (under the 32-bit integer).

In this case given that 0xFF has a one (1) in bits 0 to 7, thus representing the value, 0xf01000ff, will turn on all 8 LEDs.

Hence, the correct answer is "0xFF"

Other Questions
Divide and simplify 6/8 divided by 2/5 You are 11 years old. You have been separated from your family by a war. In order to survive, you must walk to an area of safety hundreds of miles away. On the journey you must avoid soldiers and dangerous wildlife, and manage to find food and water. The journey will take months. You do not know if you will survive or ever see your family again. If this was an experience you had to live through, how do you think it would affect the person you grew up to be? One way we can find the unit rate of a fraction is to subtract the denominator from both the numerator and denominator, True or False? What is it called when females get delayed puberty 84 ounces of liquid detergentfor $10.64Find the unit rate Assume that the distance from Earth to the moon is exactly 238,855 miles and that it took astronauts 75 hours to reach the moon in 1969. How far did the astronauts travel each hour, on average, during their trip to the moon? 4(x+2) + 2x = 44 solve for x What good was the most important to the Portuguese in Africa initially?SilverGoldCattleGuns Will give BRAINLIEST help pls!!! In the 1800s, some women began to demand the right to vote because a.they had achieved greater independence.b. wanted to abolish factory work.c. wanted to outlaw slavery.d. wanted to keep their paychecks. Please awnser asap!!! 20 points!! According to the law of conservation of mass, how many hydrogen and chlorine atoms are required for this reaction? A 1 hydrogen atom and 1 chlorine atom B 1 hydrogen atom and 2 chlorine atoms C 2 hydrogen atoms and 1 chlorine atom D 2 hydrogen atoms and 2 chlorine atoms A person weighing 200 pounds stands on snowshoes. If the area of each snowshoe is 400 square inches, the pressure on the snow is What happened about 15,000 years ago to help making farming possible? A faucet leaks at a rate of 2 milliliters per second. What is the rate in liters per minute?A12 -B0.12 L/min12LTD120 L/min A motorcyclist started a race from the start line and from rest, and accelerated with the acceleration of 3m/s2 for 8 secs. Then he was moving with a constant velocity for 2 secs. What was the racers position from the start line after 9+2 seconds from the start of the race? Which of the following is an alkali metal? An investment of 90,600.00 earns 15.6% annual interest, compounded continuously. If no funds are added or removed from this account what is the future value of the investment after 14 years? Round your answer to the nearest penny. Can you find the mDCA. 20 POINTS AND BRAINLIEST What is the solution to this inequality?7(2m -3/7 ) < 16m + 7A. M < -5B. M > -5C. M < -52/49D. M > -52/49 During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter: A new food delivery robot on a college campus is doing test runs at a constant speed of 4 miles per hour. The average test run is 3 miles fromthe campus cafeteria but varles a distance of 1.5 miles more or less than that.If x is the number of hours the robot is performing a test run, the equation that can be used to find the minimum and maximum time (inhours) for a test run is A. | 3x - 4 | = 1.5B. | 4x - 3 | = 1.5C. | 4x - 1.5 | = 3D. | 3x - 1.5 | = 4For each test run, the minimum time isA. 0.375B. 0.625C. 0.75D. 0.83and the maximum time isA. 2.125B. 1.125C. 1.875D. 1.83