The events that happen in a story are called the _________________.
A) setting
B) plot
C) diagram
D) prewriting

Answers

Answer 1
Plot like what he said

Related Questions

A computer ______ is a potentially damaging program that affects a computer or device negatively by altering the way it works.

Answers

Hello!

The answer would be: virus.

Explanation, if you’d like to read it:
A computer virus is a type of program that can cause damage to a computer by causing a system failure, corrupting data, and wasting computer resources, among other things.

I hope that this helps you!

They will choose the design team on 2 April. (change this into passive voice)

Answers

Answer:

On 2 April the design team would be choosen by them

Drag each tile to the correct box.
Match each network type to an example of what it connects.
WAN
MAN
PAN
LAN
twenty computers in an office
laptop and a cell phone
a company's offices across a city
a company's offices across a country

Answers

In order of size:
PAN — Personal Area Network (phone hotspot, Bluetooth, AirDrop)
LAN — Local (town)
MAN — Metropolitan (city)
WAN — Wide (country, continent, planet)

Twenty computer in office —> LAN
Laptop + cell phone —> PAN
Offices across city —> MAN
Offices across country —> WAN

Which of the following is considered true regarding the future of technology?

It is evolving quickly and always changing.
There will be limited jobs in the future.
Only programmers will work in the computer science industry.
It will replace the need for human workers.

Answers

Hello!

The answer is:
-It is evolving quickly and always changing.

I hope that this helps you!

Write a statement that assigns the value 10 to the first element of an array of integers named minutes.

Answers

Answer:

Explanation:

i do not know what language you need because it has different syntax

Javascript:

const minutes = [];

minutes.push(10);

The final step in the software development life cycle involves.

Answers

Answer:

Operation and maintenance

Explanation:

It involves maintenance and regular required updates.

True or false? a binary file can never contain image or audio data.

Answers

Answer:

true

Explanation:

It is true that a binary file can never contain image or audio data.

What is a binary file?

A binary file is one that contains data in binary format, which consists of a series of sequential bytes, each of which is eight bits long.

The content must be interpreted by a program or a hardware processor that knows exactly how the content is formatted and how to read the data in advance.

Binary files are more efficient, which is one of their benefits. In terms of memory, storing values in numeric formats like IEEE 754, rather than text characters, uses less memory.

Furthermore, binary formats provide advantages in terms of access speed. Image or audio data can never be stored in a binary file.

Thus, the given statement is true.

For more details regarding binary file, visit:

https://brainly.com/question/14593514

#SPJ2

The range of cells receiving the content of copied cells is called the ____. A. receiver cell B. final cell C. receiving range D. destination area

Answers

The paste area is indeed the set of cells that will receive copied content, and the further discussion can be defined as follows:

Range cell:  

Inside Excel, a cell range is a cell group that has been chosen. Its range is typically symmetric (square), but it can also comprise individual cells. In a formula, a cell range can also be referenced.It refers to a set of organisms that use the address of the cell first and last cells in the range, separated by a colon, instead of a single cell address.

Find out more about the range cell here:

brainly.com/question/15513083

Direction: Complete the sentence by choosing the correct WORD

Answers

Answer:

Maybe try guestimating?

Explanation:

That's what I do sometimes.

Answer:

1. alcohol

2. tighten

3. crosshead

4. dust

5. ammoniated

6. bolts

7. loosen

Chris needs to take the opposite of a Boolean value. Which operator does so? A. == B. != C. = D. !

Answers

AIf the boolean is A,you would have to do !a

Explanation:

the explamation mark gets the opposite.So if 5 = !A, then A = -5

(dont quote me ,im not 100% postitive)

Web are websites that allow people to congregate online and exchange views on topics of common interest.

a. True

b. False

Answers

Answer:

B

Explanation:

B. False a web is not a Website

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive

Answers

The difference is that Dropbox  offers just 2 GB free storage space while  Microsoft's OneDrive gives 5 GB in terms of free storage space.

What is Microsoft OneDrive?

This  is known to be a file hosting software and it also does synchronization service given by Microsoft.

Some other  fundamental difference between Dropbox and OneDrive in terms of  Business is that Dropbox is known to often give unlimited storage for about $20 to paid user/month while OneDrive is said to only give unlimited storage for $10 per paid user/month.

Learn more about Dropbox from

https://brainly.com/question/20935392

What do we call the kernel program that moves all of a process's frames from main memory to the disk or the other way around

Answers

Answer:

This is called the swapper

Explanation:

The swapper's main job is to move processes between memory, and storage.

9. With each element of the list defining both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________ .

Answers

The list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the CipherSuite.

What is CipherSuite?

CipherSuite can be defined as a group of instructions used to produce network connections in a secure manner.

CipherSuite is associated with Transport Layer Security, which involves the usage of algorithms to protect data.

Transport Layer Security can be defined as a computational cryptographic protocol aimed at protecting information.

Learn more about Transport Layer Security here:

https://brainly.com/question/14425531

Write the pseudocode for two modules which could be incorporated into the application planned for Lungi in Question 1.   The first module must:  a. Allow Lungi to enter the description and size of the blankets.  b. Store the details entered in arrays.  c. Provide Lungi with the option to view the list of blankets captured.  If Lungi wishes to view the list of blankets, the contents of the arrays should be passed to another module.   The second module should:  a. Receive the arrays as arguments.  b. Write the contents of the arrays to a text file that Lun​

Answers

The sample pseudocode for the given question is:

ENTER #blanket size;STORE #blanket;DISPLAY "Do you want to see the blankets captured?" #answer;IF #answer: "Yes";

What is a Pseudocode?

This refers to the informal language that is used by computer programmers to produce an algorithm and is an important step in problem-solving.

The complete pseudocode is:

THENDISPLAY #blanketELSEEND

Read more about pseudocodes here:

https://brainly.com/question/24735155

#SPJ1

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue

Answers

The most likely cause for this issue is that the DNS server and DHCP server can be seen or found in different domains.

What is DHCP server?

A DHCP Server is known to be a kind of a network server that is said to function by automatically giving and placing IP addresses, default gateways and other kinds of parameters of a network to the computers of their client devices.

Note that  when the DNS server and DHCP server can be seen or found in different domains, the issue of updating automatically can arise.

Learn more about DHCP server from

https://brainly.com/question/10097408

#SJ1

How to unlock hp laptop forgot password without disk.

Answers

On the sign-in screen, press and hold the shift key, click the power icon , select Restart, and continue pressing the shift key until the Choose an option screen displays. Click Troubleshoot. Click Reset this PC, and then click Remove Everything. Click Only the drive where Windows is installed.

Or you can take it to a person who is a specialist in this situation.

I don’t know I don’t know I don’t know I don’t know

An ethical code may not address specific issues because…


A. Technology is such a broad area that a code cannot cover it all.


B. Technology evolves so quickly so the code may not be up to date


C. It tests the ethics of personnel and addresses general issues


D. Ethical codes have no legal authority to penalize offenders

Answers

An ethical code may not address specific issues because, technology evolves so quickly, so the code may not be up-to-date.

What is a code of ethics?

A code of ethics is the combination of ethical guidelines and the honest practices which needs to be followed in an organization.

The technology changes at a high rate. It effects on work ethics with the same rate. An ethical code may not address specific as technology moves so fast.

The options of the given problem are,

A. Technology is such a broad area that a code cannot cover it all.B. Technology evolves so quickly so the code may not be up-to-dateC. It tests the ethics of personnel and addresses general issuesD. Ethical codes have no legal authority to penalize offenders

Here, the second option is correct, which talk about the pace of technology.

Thus, an ethical code may not address specific issues because, technology evolves so quickly so the code may not be up-to-date.

Learn more about the ethical code here;

https://brainly.com/question/24606527

#SPJ1

Answer:Below

Explanation:

Which of the following media forms is the Federal Communications Commission able to regulate content on?
a. FM radio
b. AM radio
c. television stations
d. the Internet
d. satellite radio

Answers

Answer:

-FM radio

-AM radio

-television stations

Explanation:

What kind of specialized monitor is used for cell phones with screens that wrap around the edges of the phone and for curved monitors whose edges wrap toward the viewer

Answers

The kind of specialized monitor used for cell phones with screens that wrap around the edges of the phone are flexible screens.

What are flexible screens?

The  flexible screens example is  OLED screens. They are known to be made through the medium of organic materials that is said to often brings out light when electricity is said to be passed through it.

Note that the use of these screens do not need any form of backlights to function as they are produce to be thin enough to the give the place or point where they are said to be of  flexible screens.

Learn more about monitor from

https://brainly.com/question/1590202

You have been asked to acquire a printer for a business. You have been told that it should be easy for users to print to the printer from their smartphones and tablets. What feature should you look for when selecting the printer

Answers

A feature that you should look for when selecting the printer is a wireless connection.

What is a printer?

A printer can be defined as an electronic output (peripheral) device that is designed and developed for printing paper documents containing texts or images.

In this scenario, a feature that you should look for when selecting the printer for this business is a wireless connection because it would make it easy for users to print to the printer from their smartphones and tablets, especially through the use of a bluetooth or wifi.

Read more on printer here: https://brainly.com/question/17100575

A ________ is a type of virus that self-propagates using the internet or other computer network.

Answers

Answer:

A computer worm

Explanation:

.....................................

How have computer technology entrepreneurs such as steve jobs and jeff bezos most directly affected the twenty-first-century economy?.

Answers

Answer:

Explanation:

Steve Job and Jeff Bezos has the uniques idea brought into the world, which both of them have similar ideas of how the future of technology should be like, Steve helps push with new innovations like smart devices that we uses, while Jeff use those devices to help people or consumer able to trade like buying and selling on the internet with ease, and behind the scenes, there were trillion of dollars moving around (just the number). Because of their ideas people start to believe or take an advantages of it right away since it was already there for us to be using.

What is the intermediate value of arr after two iterations of the outer for loop in the call sort(arr)

Answers

Answer: D: "Ann" "Mike " "Bill " "Lisa" "Mary" "Jose" " Shari" "Walt"

Explanation:Goes through selection sort and after 2 iterations, the largest elements are swapped with the last 2 elements of the array.

The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image attached.

What is intermediate value in programming?

This is known to be a variable that is often employed in assisting so that one can be able to compute what they want

Concluisvely, The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image is because it will help you to have what you are after with the codes.

Learn more about ntermediate value from

https://brainly.com/question/11195842

#SPJ2

A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext

Answers

Answer:

A block cipher breaks down plaintext messages into fixed-size blocks before converting them into ciphertext using a key.

Explanation:

A _________________is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack. A. Confidentiality B. Integrity C. Authenticity D. Vulnerability

Answers

Has to be D. Vulnerability

If you really had no idea look at your options and notice that D is the only noun too

When would it be necessary to shoot in 4K according to the presentation?

Answers

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

A computer hacker trying different combinations of characters to crack a password is a ________.

Answers

Answer:

Brute force attack

A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. Select the two correct answers, then click Done.

Answers

A raid 1 and mirrored system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives.

What is Disk mirroring?

In data storage, disk mirroring is a term that connote the doubling of logical disk volumes into a different physical hard disks so that it will always be available.

Conclusively, Note that this is mostly used in RAID 1. A mirrored volume is known to be full logical depiction of separate volume copies and as such the answer above is correct.

Learn more about system from

https://brainly.com/question/25594630

Dear, ( Name of Iphone store)
As soon as I bought my Iphone and got home, it didn't work. If I send it back, can you tell me what is wrong with it or get me a new one?
Thanks!
From ( Your Name )

Answers

Answer:

Yes! The apple store will help you

Explanation:

Other Questions
True or False: The Meiji Emperor wanted to modernize because the samurai were becoming too powerful. Holding all else constant, if people who are currently discouraged workers decide to start looking for jobs again, you will see: Group of answer choices a decrease the labor force participation rate. a decrease in the unemployment rate. an increase the unemployment rate. no effect on the unemployment rate. no effect on the labor force participation rate. Which statement about clothing and the perceptions of others is not verified by research?. if x+y= -10 and x=2 what is the value of x Why did the mexican cession result in renewed sectional tension SOMEONE PLS HELP THANK YOUDoes magnitude effect the strength of attraction more than distance?Or Does distance effect the strength of attraction more than magnitude? What is the sum of the geometric sequence 1, 3, 9, ... if there are 11 terms? (5 points) 29,524 55,987 87,381 88,573 Select the correct answer.Typically, adults look for friends who are: Which of the following was not true about the Silk Road in ancient China? The Silk Road was not technically a road. The entire Silk Road was controlled by China. The Silk Road included routes over both land and sea. Most travelers on the Silk Road traveled by camel. letter for upscaling park A store's change in total revenue over a 4-month period is $1240. What is the average change in revenue per month for that period?Answer Choices: $4960$310$310$4960 6. What is the purpose of reasons in a persuasive essay? A. to state the writer's opinion B. to keep the reader interested C. to support the writer's opinion D. to state the opposite viewpoint The group of disorders that is characterized by severely impaired cognitive processes, personality disintegration, affective disturbances, and social withdrawal is termed ____ How many grams are in 2.2 kilograms? What determine which genes will be an advantage and which ones will be a disadvantage?Help me Please (double points) What is 40/17 rounded to the nearest hundred Your friend is curious about relationships and experiences in your family. Answer each of her questions according to the subject provided. Replace the direct object with the corresponding direct object pronoun, and remember to change the verb when necessary. if you know the answers to the SAM 04-11 Quin hace qu en tu familia? lmk Glass does not transmit ultraviolet radiation. Suggest what happens to ultraviolet radiation when it is incident on glass. (1 mark) There are two mechanics who work on cars. For each mechanic, the relationship between x, the number of hours worked, and y, the total cost, in dollars, is described below. The equation y = 36x represents the total cost charged by Mechanic A for the number of hours worked. The graph shown below represents the total cost charged by Mechanic B for the number of hours worked. What art movement did you like the best, Romanticism or Realism? Explain your answer, give at least three reasons