what is workplace procedure?​

Answers

Answer 1

Answer:

MY ANSWER

Explanation:

Workplace procedures explain specific action plans for employees when carrying out a policy. Workplace procedures are important because they tell your employees how to deal with a situation and when.14 Mar 2021

Answer 2

Answer:

ksksozozozosmsmsmssoqoqaokanzxbbxjdjsoaoalassbsbsjjajajakakakakanananannan


Related Questions

features of action files​

Answers

Answer and explanation:

An ".action" file is a file written in Xcode and used by the Automator program, whose function is to create automations in macOS.  Action files contains specific actions that can be combined with other actions to create an automated process.

This type of file is used to automate tasks in macOS, usually with Finder (file manager) or another program.  

Action files are especially useful for repetitive tasks, such as creating sequential batch folders, editing images, or deleting files.

For the nested transaction model: 1. When does failure of one transaction force the failure of other transactions? 2. Why are a child's transactions "anti-inherited" by its parent when it commits? 3. How do multi-level transactions handle this issue?

Answers

Throughout the course of the trading day, an investor performs several cash transactions in his account which total $12,000.

Currency Transaction Reports mandated by Anti-Money Laundering rules require a report to be filed when any of the below stated transactions occur in an account.

1. If the daily aggregate cash transactions of an individual exceeds $10,000

2. if 2 different transactions within a 12 months period seems related and their aggregate exceeds $10,000 must be reported.

3. Any suspicious customers action that suggest that they are laundering money or otherwise violating federal criminal laws and committing wire transfer fraud, check fraud, or mysterious disappearances should be reported.

Learn more about transactions on:

https://brainly.com/question/24730931

#SPJ4

define application software​

Answers

Answer: An application software is a type of software that the user interacts with, while a system software is a type of software that the system interacts with.

Hope this helped you :)

identify the final stage of the object found in the image in the given text

identify the final stage of the object found in the image in the given text

Answers

Answer:

science fiction book

Explanation:

a specific confidence interval obtained from data will always correctly estimate the population parameter. a. true b. false

Answers

b. False  The statement "a specific confidence interval obtained from data will always correctly estimate the population parameter" is b. false. Confidence intervals provide a range of values within which the population parameter is likely to fall, but there is no guarantee that it will always capture the true parameter value.

While a confidence interval provides an estimate of the population parameter, it is not a guarantee that it will always be correct. The interval is based on a sample from the population and there is always a possibility of sampling error or bias. Additionally, the level of confidence chosen for the interval can affect the width of the interval and therefore the accuracy of the estimate.

However, the goal of using a confidence interval is to provide a range of values that is likely to contain the true population parameter with a certain level of confidence.

Learn more about interval  here:

https://brainly.com/question/30486507

#SPJ11

Which memory do computers use to read information that has been previously
loaded?

A.Hard drive
B.RAM
C.ROM
D.Virtual memory

Answers

The answer to your question is

b) RAM

What is the primary tool that retrieves data and helps users graphically design the answer to a question

Answers

Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

What is Query by Example?

It is a database query language where the first results presented are those that the search engine considers the most relevant for the search carried out.

It is characterized by having a system for ranking and ordering search results that allows the user to return more relevant results.

Therefore, we can conclude that Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.

Learn more about Query by Example (QBE) here: brainly.com/question/7479160

walkthroughs combine​ observation, inspection, and inquiry to assure that the controls designed by management have been implemented. question content area bottom part 1 true false

Answers

True, walkthroughs combine​ observation, inspection, and inquiry to assure that the controls designed by management have been implemented.

What is a walkthroughs?

A walkthrough is a term in internal control used to describe a situation whereby the auditor selects one or a few document(s) for the initiation of a transaction type and traces them through the entire accounting process using a combination of  observation, inquiry,  and inspection to assure that the controls designed by management have been implemented. Auditing standards require the auditor to perform at least one walkthrough for each major class of transactions

Learn more on walkthrough from:

https://brainly.com/question/15831196?referrer=searchResults

#SPJ4

Explain how encoding and decoding is an integral part of the field of photography. Use details to support your response.

Answers

Answer:

Encoding and decoding are integral to the field of photography as they are important components of the process of creating and interpreting photographic images. Encoding is the process of translating the visual information in a photograph into a form that can be understood and stored. Through encoding, the photographer is able to capture and store the visual information that is seen in a photograph. Decoding is the process of interpreting the encoded information, which allows the viewer to understand the meaning of the photograph and to connect with the image on an emotional level. Through decoding, the viewer is able to gain insight into the photographer’s intent and the mood of the photograph. By understanding the codes used in photography, viewers are able to gain a greater appreciation for the photographer’s work

Explanation:

what does reporter failure mean on adt alarm system

Answers

On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.

How does the ADT alarm system function?

ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.

ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.

Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.

Learn more about the ADT alarm system, refer to:

https://brainly.com/question/28199257

#SPJ5

In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.

ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.

When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:

Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.

Learn more about network on:

https://brainly.com/question/29350844

#SPJ6

list three natural defects of wood

Answers

Answer:

rotting, drying out, decay

Explanation:

decay, rotting, drying out

write an algorithm to solve for the surface area of a cone​

Answers

This is the algorithm to find the surface area of cone and can be tested using Python programming language.

Algorithm to Solve for Surface Area of Cone

1. Input the height (h) and radius (r) of the cone.

2. Calculate the slant height (l) of the cone using the Pythagorean theorem:

l = √(r² + h²).

3. Calculate the base area (A_base) of the cone: A_base = pi * r².

4. Calculate the lateral surface area (A_lateral) of the cone: A_lateral = pi * r * l.

5. Calculate the total surface area (A_total) of the cone: A_total = A_base + A_lateral.

6. Output the total surface area (A_total).

You can test this algorithm by using this Python code:

import math

def calculate_cone_surface_area(radius, height):

   slant_height = math.sqrt(radius**2 + height**2)

   base_area = math.pi * radius**2

   lateral_surface_area = math.pi * radius * slant_height

   total_surface_area = base_area + lateral_surface_area

   return total_surface_area

# Example usage:

radius = 5.0

height = 8.0

surface_area = calculate_cone_surface_area(radius, height)

print("Surface area of the cone:", surface_area)

Learn more about algorithm here:

https://brainly.com/question/24953880

#SPJ1

What coversheet is attached to protect a secret document.

Answers

Answer:

SF 704, SECRET cover sheet

PLEASE HURRY AND ANSWER
YOU WILL GET THE POINTS
Order the steps for creating additional calendars in Outlook 2016.
Click the New Calendar
Name the new calendar.
Click the Folder tab.
Place it in the Calendar folder
Open the Calendar view.

Answers

Answer:

1. Open the Calendar View

2. Click the folder Tab

3. Click the new calendar button

4. Name the New calendar

5. Place it in the Calendar Folder

Explanation:

I got it right.

write a program (in main.cpp) to do the following: a. build a binary search tree t1. b. do a postorder traversal of t1 and, while doing the postorder traversal, insert the nodes into a second binary search tree t2 . c. do a preorder traversal of t2 and, while doing the preorder traversal, insert the node into a third binary search tree t3. d. do an inorder traversal of t3. e. output the heights and the number of leaves in each of the three binary search trees.

Answers

Answer:

#include <iostream>

using namespace std;

struct TreeNode

{

   int value;

   TreeNode *left;

   TreeNode *right;

};

class Tree

{

  private:

     TreeNode *root;

     void insert(TreeNode *&, TreeNode *&);

     void destroySubTree(TreeNode *);

     void deleteNode(int, TreeNode *&);

     void makeDeletion(TreeNode *&);

     void displayInOrder(TreeNode *) const;

     void displayPreOrder(TreeNode *) const;

     void displayPostOrder(TreeNode *) const;

     int height(TreeNode *) const;

     int nodeCount(TreeNode *) const;

     int leafCount(TreeNode *) const;

  public:

     Tree()

        { root = NULL; }

     ~Tree()

        { destroySubTree(root); }

     void insertNode(int);

     bool searchNode(int);

     void remove(int);

     void displayInOrder() const

        { displayInOrder(root); }

     void displayPreOrder() const

        { displayPreOrder(root); }

     void displayPostOrder() const

        { displayPostOrder(root); }

     int height() const

        { return height(root); }

     int nodeCount() const

        { return nodeCount(root); }

     int leafCount() const

        { return leafCount(root); }

};

void Tree::insert(TreeNode *&nodePtr, TreeNode *&newNode)

{

  if (nodePtr == NULL)

     nodePtr = newNode;

  else if (newNode->value < nodePtr->value)

     insert(nodePtr->left, newNode);

  else

     insert(nodePtr->right, newNode);

}

void Tree::insertNode(int num)

{

  TreeNode *newNode;

  newNode = new TreeNode;

  newNode->value = num;

  newNode->left = newNode->right = NULL;

  insert(root, newNode);

}

void Tree::destroySubTree(TreeNode *nodePtr)

{

  if (nodePtr)

  {

     if (nodePtr->left)

        destroySubTree(nodePtr->left);

     if (nodePtr->right)

        destroySubTree(nodePtr->right);

     delete nodePtr;

  }

}

void Tree::deleteNode(int num, TreeNode *&nodePtr)

{

  if (num < nodePtr->value)

     deleteNode(num, nodePtr->left);

  else if (num > nodePtr->value)

     deleteNode(num, nodePtr->right);

  else

     makeDeletion(nodePtr);

}

void Tree::makeDeletion(TreeNode *&nodePtr)

{

  TreeNode *tempNodePtr;

  if (nodePtr == NULL)

     cout << "Cannot delete empty node.\n";

  else if (nodePtr->right == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->left;

     delete tempNodePtr;

  }

  else if (nodePtr->left == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

  else

  {

     tempNodePtr = nodePtr->right;

     while (tempNodePtr->left)

        tempNodePtr = tempNodePtr->left;

     tempNodePtr->left = nodePtr->left;

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

}

void Tree::remove(int num)

{

  deleteNode(num, root);

}

bool Tree::searchNode(int num)

{

  TreeNode *nodePtr = root;

  while (nodePtr)

  {

     if (nodePtr->value == num)

        return true;

     else if (num < nodePtr->value)

        nodePtr = nodePtr->left;

     else

        nodePtr = nodePtr->right;

  }

  return false;

}

void Tree::displayInOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayInOrder(nodePtr->left);

     cout << nodePtr->value << endl;

     displayInOrder(nodePtr->right);

  }

}

void Tree::displayPreOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     cout << nodePtr->value << endl;

     displayPreOrder(nodePtr->left);

     displayPreOrder(nodePtr->right);

  }

}

void Tree::displayPostOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayPostOrder(nodePtr->left);

     displayPostOrder(nodePtr->right);

     cout << nodePtr->value << endl;

  }

}

int Tree::height(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

  {

     int lHeight = height(nodePtr->left);

     int rHeight = height(nodePtr->right);

     if (lHeight > rHeight)

        return (lHeight + 1);

     else

        return (rHeight + 1);

  }

}

int Tree::nodeCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

     return (nodeCount(nodePtr->left) + nodeCount(nodePtr->right) + 1);

}

int Tree::leafCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else if (nodePtr->left == NULL && nodePtr->right == NULL)

     return 1;

  else

     return (leafCount(nodePtr->left) + leafCount(nodePtr->right));

}

int main()

{

  Tree tree;

  int num;

  cout << "Enter numbers to be inserted in the tree, then enter -1 to stop.\n";

  cin >> num;

  while (num != -1)

  {

     tree.insertNode(num);

     cin >> num;

  }

  cout << "Here are the values in the tree, listed in order:\n";

  tree.displayInOrder();

  cout << "Here are the values in the tree, listed in preorder:\n";

  tree.displayPreOrder();

  cout << "Here are the values in the tree, listed in postorder:\n";

  tree.displayPostOrder();

  cout << "Here are the heights of the tree:\n";

  cout << tree.height() << endl;

  cout << "Here are the number of nodes in the tree:\n";

  cout << tree.nodeCount() << endl;

  cout << "Here are the number of leaves in the tree:\n";

  cout << tree.leafCount() << endl;

  return 0;

}

Mail Tips can be displayed on the top of the message address bar for different circumstances, such as
automatic replies when the recipient is
and can refer the sender to another
a moderated group where the message requires
before it can be sent to the recipients.

Answers

Answer:

automatic replies when the recipient is

✔ out of the office

and can refer the sender to another

✔ recipient

.

a moderated group where the message requires

✔ approval

before it can be sent to the recipients.

Explanation:

got it right on edge 2020-2021

Automatic replies when the recipient is out of the office and can refer the sender to another recipient. A moderated group where the message requires approval. Before it can be sent to the recipients.

What are office gestures?

In the workplace, gestures can communicate a lot of information without the speaker ever saying a word. Employees respond to other people's body language as perceived at work.

Interactions at work are influenced by facial expressions, eye contact, and touch. Some refer to it as body language. Some refer to it as kinesics. A gesture is a visible body activity that conveys specific messages in place of or in addition to words. It is a type of nonverbal or nonvocal communication.

Therefore, Automatic responses can direct the sender to another destination if the intended recipient is unavailable. A discussion forum where messages must be approved. Before the recipients can receive it.

To learn more about office gestures, refer to the link:

https://brainly.com/question/25547729

#SPJ2

A small manufacturing business wants to hire a landscaping service to
maintain its lawn. The purchasing department has narrowed its choices to
Tom's Green Thumb and M&C Minions. Jillian wants to research customer
reviews before writing a recommendation. Which online search method
would be most helpful?
O
A. Use an online catalog to search for "choosing a landscaper."
) B. Use the company's database to find records of past landscaping
choices.
C. Use a search engine to search for "Tom's Green Thumb reviews"
and "M&C Minions reviews."
D. Use a search engine to search for "top 10 landscapers" or "best
landscaping tips.

Answers

Answer:

C. Use a search engine to search for "Tom's Green Thumb reviews"

and "M&C Minions reviews."

Explanation:

Reviews from a search engine are the best recommendation.

Write a C program for STM32F407 Micro-Controller according to below given circumstances:

Suppose we have to make a automated toy car which can sense hurdles using an IR sensors (attacked to its front, back, left and right) and gives output to the stm controller when there is no hurdle and 1 when it senses a hurdle. Car has 4 motors which will be operated using 2 motor-drivers L293D. All the IR sensors & motor drivers are connected with stm controller and will be operated with coding. After sensing a hurdle, it takes following actions:

1- when hurdle = front, it checks left and right and turns at one direction.

2- if front, left and right have hurdles then the car moves backwards.

Answers

Here is the C program for STM32F407 Micro-Controller according to the given circumstances: #include #include void Delay(void) {int i;for(i=0;i<1000000;i++);} void Forward(void) {GPIOA->ODR = 0X21;GPIOB->ODR = 0X01;Delay();}

void Right(void) {GPIOA->ODR = 0X20;GPIOB->ODR = 0X09;Delay();} void Left(void) {GPIOA->ODR = 0X01;GPIOB->ODR = 0X04;Delay();} void Stop(void) {GPIOA->ODR = 0X00;GPIOB->ODR = 0X00;Delay();} int main(void) { RCC->AHB1ENR |= RCC_AHB1ENR_GPIOAEN;RCC->AHB1ENR |= RCC_AHB1ENR_GPIOBEN;GPIOA->MODER &= ~GPIO_MODER_MODER0_0;GPIOA->MODER &= ~GPIO_MODER_MODER1_0;GPIOA->MODER |= GPIO_MODER_MODER5_0;GPIOA->MODER |= GPIO_MODER_MODER7_0;GPIOA->OTYPER &= ~GPIO_OTYPER_OT_0;GPIOA->OTYPER &= ~GPIO_OTYPER_OT_1;GPIOA->OTYPER &= ~GPIO_OTYPER_OT_5;GPIOA->OTYPER &= ~GPIO_OTYPER_OT_7;GPIOA->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR0;GPIOA->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR1;GPIOA->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR5;GPIOA->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR7; GPIOB->MODER &= ~GPIO_MODER_MODER0_0;GPIOB->MODER |= GPIO_MODER_MODER6_0;GPIOB->OTYPER &= ~GPIO_OTYPER_OT_0;GPIOB->OTYPER &= ~GPIO_OTYPER_OT_6;GPIOB->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR0;GPIOB->OSPEEDR |= GPIO_OSPEEDER_OSPEEDR6; while(1) { if(GPIOA->IDR & GPIO_IDR_IDR_3) {Forward();} if(GPIOA->IDR & GPIO_IDR_IDR_4) {Right();} if(GPIOA->IDR & GPIO_IDR_IDR_6) {Left();} if(GPIOA->IDR & GPIO_IDR_IDR_2) {Stop();} } return 0; }

This C program controls an automated toy car that uses IR sensors attached to its front, back, left, and right to detect obstacles. It outputs 0 to the stm controller when no obstacle is detected and 1 when an obstacle is detected. The car has four motors that will be controlled using two L293D motor drivers. All of the IR sensors and motor drivers are connected to the STM controller and will be controlled using code. The following actions are taken after an obstacle is detected: If the obstacle is in front, check the left and right sensors, and then turn in one direction. If there are obstacles in front, left, and right, move the car backward.

To know more about C program refer for:

https://brainly.com/question/33196025

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

select whether the statement is true or false. transaction processing systems are more complex and more frequently used than expert systems. (True or False)

Answers

The statement "Transaction processing systems are more complex and more frequently used than expert systems" is False.

Transaction processing systems (TPS) and expert systems are two different types of information systems used in organizations. TPS is designed to process large volumes of routine transactions such as sales, inventory, and payroll, while expert systems are designed to mimic human expertise in solving complex problems in specific domains.

In terms of complexity, expert systems are typically more complex than transaction processing systems. Expert systems require extensive knowledge representation, rule-based reasoning, and inference mechanisms to provide intelligent decision-making capabilities. On the other hand, transaction processing systems primarily focus on data processing and management, with relatively simpler workflows and processes.

Regarding the frequency of use, transaction processing systems are generally used more frequently than expert systems. TPS is designed to handle daily operational activities that generate a high volume of transactions, such as processing customer orders or recording financial transactions. Expert systems, on the other hand, are utilized in specific situations where domain expertise is required, and their usage is typically less frequent compared to TPS.

Therefore, the statement that transaction processing systems are more complex and more frequently used than expert systems is False.

To learn more about transactions visit:

brainly.com/question/28992427

#SPJ11

When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called

Answers

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

The process When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

What is the Lightweight Directory Access Protocol?

An open, supplier conditioning and reinforcement for providing distributed directories technology solutions over an IP network are called the Lightweight Directory Access Protocol.

By enabling the sharing of data about people, systems, networks, services, and applications throughout the network, directory services play a crucial role in the development of intranet and Internet applications.

LDAP is frequently used to offer a central location to store users and passwords. As a result, several software programs and services can connect to the LDAP server to verify users.

The interaction When LDAP traffic is made secure by utilizing a Secure Attachments Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.

More about the Lightweight Directory Access Protocol link is given below.

https://brainly.com/question/28364755

#SPJ12

Which Windows Server core technology can you use to install, configure, and remove server roles and features?
a. AD DS
b. NTFS
c. Microsoft Management Console
d. Server Manager

Answers

The correct answer is d. Server Manager. Server Manager is a Windows Server core technology that allows users to install, configure, and remove server roles and features. It provides a centralized management interface for managing server roles, features, and server groups.

Windows Server includes a variety of core technologies that facilitate different aspects of server management. In this case, the technology that allows the installation, configuration, and removal of server roles and features is Server Manager. Server Manager is a graphical management tool that provides a centralized interface for managing server roles and features in Windows Server.

Server Manager simplifies the process of managing server functionalities by allowing administrators to easily install or remove roles and features with just a few clicks. It provides a comprehensive view of the server's configuration, allowing administrators to monitor and manage various aspects, such as roles, services, and resources.

Server Manager is designed to streamline server management tasks, enabling administrators to efficiently configure and maintain server roles and features. It offers a user-friendly interface and powerful tools that help simplify the deployment and management of server functionalities in Windows Server environments.

know more about Server Manager :brainly.com/question/30608960

#SPJ11

By inspecting the raw data in the packet content window, do you see any headers within the data that are not displayed in the packet-listing window? if so, name one.

Answers

No, even though the raw data and the information displayed in the packet-listing window appear to match identically, we don't see any headers.

Describe the HTTP GET Method.

When requesting data from a specific source, the HTTP (HyperText Transfer Protocol) GET method is utilized. Additionally, it can be used to isolate a certain variable from a group. The HTTP POST method asks the providing browser to send data into the server's message system. The GET method and the POST method can both be used to access HTML structures. Whether the POST method or the GET method is chosen, it will affect how form data is sent to the server. For Example-

GET /hello.htm HTTP/1.1

User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)

Host: www.checkers.com

Accept-Language: en-us

Accept-Encoding: gzip, deflate

Connection: Keep-Alive

Learn more about HTTP here:

https://brainly.com/question/13152961

#SPJ4

two. health information technology has applications across 5-platforms, what are they? and, what are the in-depth ways in which hit can be exploited in each platform?

Answers

Applications of health information technology can be found on five different platforms: cloud computing, bioprinting, robotics, artificial intelligence, and robotics. [scroll down for more information]

Who uses cloud computing?

A wide range of use cases, including backup data, recovery plans, email, virtualization software, computer and testing, big data analytics, including customer-facing web apps, are being used by businesses of every size, type, and sector.

1) Artificial intelligence (AI) is a technology that imitates human cognitive functions. By assisting in data mining and boosting care delivery, AI can improve healthcare.

2) Robotics, like AI, uses robotic machines to carry out physical and mental tasks. Examples include exoskeletons for paralyzed patients and robot prostheses used in healthcare for replace missing limbs.

3) Bioprinting is a method that allows it to print human tissue cells in three dimensions. This opens up new avenues for research into the molecular causes of diseases and the development of 3D printed medications like Sprintam.

4) The creation of nanomachines that can detect ailments and administer medications when introduced into a person's blood is a component of nanomedicine, which makes use of nanotechnology.

5) Cloud computing offers a cost-effective and effective method of storing patient data, enhancing patient care and facilitating quicker data exchange between healthcare institutions. It is an essential piece of technology again for healthcare sector.

To know more about cloud computing visit :

https://brainly.com/question/29737287

#SPJ4

define reading and writing that regards storage​

Answers

Answer:

Reading and writing on computers and other gadgets require storage.

HOPE THIS HELPS

HAPPY THANKSGIVING

Match the parts of the e-mail message with the letters that label them. Note: your answer will be a number, not a letter!

1. A. 2.B. 3.C. 4.D. 5.E.

1)E-mail
2)the body of the message is typed here
3)indicates the importance of the message
4)provides the messages purpose 5)shows the message still needs attention.

Answers

Note that the above parts of the e-mail message with the letters that label them is matched accordingly:

A. 2

B. 1

C. 4

D. 3

E. 5

Why are emails important?

Emails are a widely used communication tool, and they are important for several reasons.

First, they allow people to send and receive messages quickly and easily, regardless of distance. This is particularly important for business, where timely communication is critical for success.

Second, emails provide a written record of conversations and information, which can be stored and easily retrieved for future reference.

Third, emails are a cost-effective way to communicate, as they eliminate the need for paper, printing, and postage.

Finally, emails are flexible and can be used for a variety of purposes, including sending documents, scheduling meetings, and keeping in touch with friends and family.

Learn more about Emails:

https://brainly.com/question/14380249

#SPJ1

Which of the following statements is FALSE?

the value of the ID attribute....

a. may not start with a number
b. must be unique within each document
c. must not start with a special character
d. should be lowercase?

Answers

Answer:

d. Should be lower case?

for the ip address, 10.10.40.2/19, what is its subnet address and subnet mask in decimal?

Answers

To find the subnet address and subnet mask in decimal for the IP address 10.10.40.2/19, please follow these steps:

1. Convert the prefix length (/19) to a binary subnet mask:
  The prefix length of 19 means that the first 19 bits are set to 1, and the remaining bits are set to 0. The binary subnet mask will look like this: 11111111.11111111.11100000.00000000

2. Convert the binary subnet mask to decimal:
  11111111.11111111.11100000.00000000 in decimal is 255.255.224.0. This is the subnet mask.

3. Perform a bitwise AND operation between the IP address and the subnet mask to find the subnet address:
  IP address (in binary): 00001010.00001010.00101000.00000010
  Subnet mask (in binary): 11111111.11111111.11100000.00000000
  Subnet address (in binary): 00001010.00001010.00100000.00000000

4. Convert the binary subnet address to decimal:
  00001010.00001010.00100000.00000000 in decimal is 10.10.32.0. This is the subnet address.

Your answer: For the IP address 10.10.40.2/19, its subnet address is 10.10.32.0, and its subnet mask in decimal is 255.255.224.0.

Learn more about subnets here:

https://brainly.com/question/30995993

#SPJ11

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

CODEHS 3.5.4 Obi-Wan Says



You should ask the user for three pieces of information

You should confirm their name and how many droids and Wookiees they want to meet

You should confirm their name and how many droids and Wookiees they want to meet

CODEHS 3.5.4 Obi-Wan Says You should ask the user for three pieces of informationYou should confirm their

Answers

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

# prompts user of name

num_droid = int(input('number of droids : '))

#prompts for number of droids

num_wooks = int(input('number of wookiees : '))

#prompts for number of wookiees

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

#displays the information as a complete sentence

A sample run of the program is attached

Learn more : https://brainly.com/question/25506437

CODEHS 3.5.4 Obi-Wan Says You should ask the user for three pieces of informationYou should confirm their
Other Questions
two mechanics worked on a car. the first mechanic charged $115 per hour, and the second mechanic charged $85 per hour. the mechanics worked for a combined total of 35 hours, and together they charged a total of $3575 . how long did each mechanic work? WORK ENERGY & POWER CROSSWORDNEED HELP ASAP I'll give you brainliest Read this passage.Galileo Galilei was a scientist who studied objects in space. He firmly believed that the planets revolved around the sun. This was not commonly accepted during his time, though, and Galileo often struggled to convince others of heliocentrism.Which sentence could be added to the passage and maintain its formal style?A. Can you believe people didn't believe him?B. These days, though, everybody knows he was totally right.C. Over time, however, he was proven to be correct.D. Those folks who disagreed with him were dead wrong, though, and now everyone knows it. Let X be the average of a sample of 16 independent normal random variables with mean 0 and variance 1. Determine c such thatP (|X| < c) = .5 5x + y = 910x 7y = 18 Jackson, a conservative Republican, and Jessica, a liberal Democrat, both watch the same news show in separate houses. Neither are happy with the coverage of a particular story. What is the BEST explanation for how this can be What factors influencing nutritional practices in the United States could be changed to improve health? mercury is about 0.4 au from the sun on average (40% of the earth-sun distance). according to kepler's 3rd law, a year on mercury (i.e., it's orbital period) is a year on earth. Government ________ is an obstacle to change and economic efficiency in many parts of Sub-Saharan Africa and has a negative impact on social and economic development, as well as on the environment and resource management. Thats the Opposite1.Draw arrows on a numberline to represent thesesituations:a. The temperature was -5degrees. Then thetemperature rose to 5 degrees.b.A climber was 30feet above sea level. Then shedescended 30 feet.2.Whats the opposite?a.Running 150 feet east. - ___b.Jumping down 10 steps.___c.Pouring 8 gallons into afish tank. - _____ What process or property can directly affect the temperature of air or water, but NOT land?A)ConductionB)ConvectionC)IsolationD)Radiation Thomas jefferson articulated the real rationale for throwing british rule in the declaration of indepence as? The Iroquois use the ideas in this myth toA: Explain how natural phenomena came to beB:describe why animals are important to peopleC: Explain the complexities of human relationshipsD:describe the reasons people use different hands When preparing the retained earnings statement, ________ is(are) subtracted in order to derive at the ending balance of retained earnings pls help 40 points!! Augie created this chart about the two kinds of waves.A 2-column table with 3 rows titled 2 Kinds of Waves. The first column labeled Title 1 has entries the transfer energy is perpendicular to the direction of the wave motion, particles move up and down, particles move only slightly. The second column labeled Title 2 has entries the transfer direction is parallel to the direction of wave motion, particles move side to side, particles move only slightly.Which best labels the chart?Title 1 is Longitudinal Waves, and Title 2 is Transverse Waves.Title 1 is Transverse Waves, and T To support rice producers, the government imposesa price floor of $50 per ton. a. what quantity will be traded in the market? why? a market research company wishes to know how many energy drinks adults drink each week. they want to construct a 85% confidence interval for the mean and are assuming that the population standard deviation for the number of energy drinks consumed each week is 0.8 . the study found that for a sample of 159 adults the mean number of energy drinks consumed per week is 7.6 . construct the desired confidence interval. round your answers to one decimal place. Prepare anin-depth business proposal for a real estate company who wants tosell a 4 acres land. Most pre-european north american societies relied on healer-visionaries for spiritual guidance, a practice known as? (-10) (-12) use appropriate symbol < or >