Question _.1 with 1 blankMiguel y Maru están muy cansados. Question 2 with 1 blankFelipe es muy joven. Question 3 with 1 blankJimena es muy inteligente. Question 4 with 1 blankLa madre de Marissa está muy contenta. Question 5 with 1 blankEstoy muy aburrido.

Answers

Answer 1

Answer:

Miguel y Maru están muy cansados.  - Miguel y Maru están cansadísimos

Felipe es muy joven. - Felipe es jovencísimo

Jimena es muy inteligente. - Jimena es inteligentísima

La madre de Marissa está muy contenta. - La madre de Marissa está contentísima

Estoy muy aburrido. - Estoy aburridísimo

Explanation:

In this activity we have to switch the statements to the absolute superlative of the expressions. In Spanish we can add the suffix -ísimo to an adjective to refer to the highest degree of something. It can be translated in ENglish to "really, extremely, super or quie". The statements in English are:

- Miguel and Maru are very tired - Miguel and Mary are extremely tired

- Felipe is very young - Felipe is super young

- Jimena is very smart - Jimena is really smart

- Marissa´s mother is very happy - Marissa´s mother is extremely happy

- I´m very bored - I´m super bored


Related Questions

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________

Answers

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True False

Answers

Answer:

The answer is True.

Explanation:

The enterprise DBMS can also be used with mobile DBMS.

Enterprise DMBS is the latest version of DBMS which is used in organizations and enterprises to handle a huge amount of Data.

Enterprise Database Management System is mainly designed to do large work simultaneously. It can handle multiple queries simultaneously.  

Multiple users (about 100-10,000 users) can access data at the same time and even they can manipulate simultaneously.

The features of Enterprise DBMS is to work efficiently, multi processing, fast, accurately, and handling huge burden of data.

which of these is a way hexadecimal is commonly used in computing?
A. represent IPv6 network address.
B. communicate with the CPU.
C. exchange data with peripherals.
D. to represent sound waves

Answers

Answer:

represent IPv6 network address.

Explanation:

Hexadecimal number is the representation of large data into small chunk. each number in hexadecimal is replaced by 4 bits of data. With the help of this number system we can reduce the size of the total data.

IPv6 address consist of hexadecimal number. If we represent this address in binary it will utilize 16 x 8 = 128 bits. 128 bit address is too long.

So, we convert the 18 bits data into hexadecimal. This conversion make this address smaller. To represent the IPv6 address, we usually use hexadecimal number representation.

Final answer:

Hexadecimal is commonly used in computing to represent IPv6 network addresses. It allows for a compact representation of large numbers. It is not typically used to interface directly with CPUs or peripherals and does not represent sound waves.

Explanation:

The hexadecimal system is commonly used in computing in a few different ways, and one of these ways is to represent IP versions 6, known as IPv6 network addresses. Unlike the binary and decimal systems, hexadecimal can represent large numbers in a more compact form, which is why it's often used for this purpose in computer systems. Hexadecimal is not typically used to communicate with CPUs or exchange data with peripherals, and it does not play a role in representing sound waves.

Learn more about Hexadecimal use in Computing here:

https://brainly.com/question/33626588

#SPJ3

Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle given values for the base b and the height h.2. Compute the interest earned in 1 year given the starting account balance B and the annual interest rate I and assuming simple interest, that is, no compounding. Also determine the final balance at the end of the year.3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

Answers

Answer:

Hi there! The question is checking your knowledge on Pseudocode. Pseudocode is a high level solution written in plain English to outline the steps needed for the program to work correctly. An implementation for the different parts of the question is written below.

Explanation:

1. Determine the area of a triangle

  declare formula for area calculation of triangle as ½ * (base * height)

  validate input parameters “base” and “height”

  apply formula and return result

2. Compute the interest earned Prompt user for input 2

   declare formula for interest calculation as annual interest rate * term *     starting account balance

   validate input parameters “interest_rate” and “starting_account_balance ”

   apply formula and return result as final balance at the end of the year as the interest earned + starting balance.

3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

   declare formula for time calculation of triangle as time = distance / speed

   validate input parameters for mileage “M” and speed “S”

   apply formula and return result

At the beginning of his​ webpage, Byron used​ a(n) __________ to provide readers with all the key points while skipping over the details. A. reference B. teaser C. narrative D. summary E. orientation

Answers

Answer:

Summary

Explanation:

The summary provides a short description of the particular relating website. A summary is that part of the record that consists of all key details.  it is considered a brief statement and or conclusion that consists if the all-important key point of writing. The main purpose of the summary is to include all that point that can provide an idea about the piece of writing.

Answer:

At the beginning of his​ webpage, Byron used​ a(n) summary to provide readers with all the key points while skipping over the details.

OPTION. D

The term _____ distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product.

Answers

Answer:

"It user" is the correct answer for the above question.

Explanation:

It users are the user who is generally using the computers and the It system for their work. But the It workers works is to install the service and to develop the service for the IT users.Hence anybody can say that there is a many difference between It user and the IT workers.The above question-statement also wants to states the same difference between the IT user and the It workers. So after putting the "it user" in the above question blanks the statement means the same. Hence "IT user" is the correct answer.
Final answer:

The term that distinguishes a person who uses technology from those who develop and support it is 'user'. Users interact with technology for practical purposes, whereas IT workers handle the technical aspects.

Explanation:

The term that distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product is user. Users are generally the individuals or organizations that utilize the technology for various purposes such as word processing, gaming, or accessing the internet. In contrast, IT workers include providers, hardware and software developers, and others who play key roles in web security, commerce, and communications. Users interact with the technology at a commonsense level, using devices and applications for specific tasks, whereas IT professionals work with the computer systems at a more technical or design level.

WHAT ARE THEY USED FOR Developing tank 2. Contact print 3xer 4. Developer 5. Darkrooms 6. Acid stop bath 7. Enlarger 8. Johann Heinrich Schulze

Answers

1. Developing tank is a developing tank is a light-tight container used for developing film. A developing tank allows photographic film to be developed in a daylight environment

2. Contact print is a photographic image produced from film; sometimes from a film negative, and sometimes from a film positive or paper negative.

3. Developer is one or more chemicals that convert the latent image to a visible image

4. A darkroom is used to process photographic film, to make prints and to carry out other associated tasks. It is a room that can be made completely dark to allow the processing of the light-sensitive photographic materials, including film and photographic paper.

5. Stop bath is a chemical bath usually used in processing traditional black-and-white photographic films, plates, and paper used after the material has finished developing.

6. Enlarger is a specialized transparency projector used to produce photographic prints from film or glass negatives, or from transparencies.

7. Johann Heinrich Schulze proved that the darkening of silver salts, a phenomenon known since the 16th century and possibly earlier, was caused by light and not heat

The video on your laptop needs to be updated. You have researched online, and according to the manufacturer, you can install a new video card in your laptop. What is the most likely slot connection you will use to install a new video card in your laptop?

Answers

Answer:

Mini PCIe .

Explanation:

If the video on the user's laptop requires to be changed and he has been reading elsewhere and can install video card in his laptop as per the producer. Then, Mini PCIe is the slot interface he will probably use to install a video card in his laptop because it was actually develop to store graphics cards and other peripherals.

_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
a. Modeling
b. Prototyping
c. Scrum
d. RAD

Answers

Answer:

Option b("Prototyping") is the correct answer for the above question.

Explanation:

Prototyping is a type of Model which follows the phases of SDLC and used to develop the software project.In this model only a copy of the software is developed and seen by the customer that the developer is developing the right thing or there may be any changes.The above question asked about the Model which is used to provide a copy of the software. That model is known as the Prototyping Model which is described above. Hence Oprion b (Prototyping) is the correct answer for the above while the other is not because:-Option 'a' states about Modeling which is not a model of SDLC.Option c states about Scrum, which does not provide the prototype to the customer.Option d states about RAD which is not the correct answer.

Several company users are frequently forgetting passwords for their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?A. Implement single sign-on.B. Enable multifactor authentication.C. Configure biometric authentication.D. Remove complex password requirements.

Answers

Answer:

Option A i.e., Implement single sign-on.

Explanation:

Many corporate users often forget credentials for various mobile phones and apps. Then, Implementing single sign-on is the sys admin which reduces the amount of ticket requested to that of the helpdesk.

SSO is perhaps a method of authorization which enables the user to control various software using single collection of login information. This is a simple procedure in companies, in which a company locates different resources for connected to a network of local region.

____ convert a program design developed by a systems analyst or software developer using one of many computer languages.

Answers

Answer:

"Programmer " is the correct answer for the following question.

Explanation:

A programmer is a person who created the software They are basically a coder who develop a code for the program or the software. They are specialists in some in the programming code area. The programmer are writing the program for a different kind of software.

The main objective programmer they convert the program design which is developed  by a systems analyst or system designer using a different kind of computer language  

What feature in Excel automatically displays a list of field headings when you begin to create a structured reference?

Answers

Answer:

Formula Auto-Complete

Explanation:

To minimize typing and syntax errors, you can create and edit formulas with Formula Auto-Complete.

After you type an = (equal sign) and begin typing to start a formula, Excel displays a dynamic drop-down list of valid functions, arguments, defined names, table names, special item specifiers—including [ (open bracket),, (comma), : (colon)—and text string that match the letters you type. An argument is the cell references or values in a formula that contribute to the result. Each function uses function-specific arguments, which may include numeric values, text values, cell references, ranges of cells, and so on

Which microphones are considered to have the best quality?
External
Headset
Internal
USB

Answers

Answer:

External Microphones

Explanation:

External Microphones provide smoother sound they are used in podcasts, studios, and radio stations.

Answer:

External.

Most internal and Headset mics are made of cheap microphones that are terrible quality. USB mics on the other time have a bad time responding.

Have a great day!

Readers who can easily locate and understand important information in a document will be more likely to agree with its arguments. True False

Answers

Answer and Explanation:

It is right readers can easily understand the situation and information that has given in any document. As the reader has many qualities such as

Good readers summarize what they read.

Readers make a prediction and visualize what they read

Readers revise and make inferences

Readers ask questions

Readers make connection

It is quite natural for a reader to understand the document with arguments.

The terms "data", "information", and "knowledge" have specific meanings. With regard to a customer satisfaction application used in the automobile industry, which of the following is an example of data?
a. the ability to create a program that provides rewards for dealerships with high levels of customer satisfaction and corrective action plans for dealerships that have low levels of satisfaction.
b. the web-based application that collects and stores records of customer satisfaction surveys and allows dealerships to view their data.
c. reports that summarize ratings for a specific dealership including a calculation of the average rating across all survey questions and a calculation of summary statistics for groups of questions that correspond to important dimensions such as dealership staff, satisfaction with product, quality of service and so on.
d. records containing numerical ratings from customer surveys completed online after each visit to a dealership.

Answers

Answer:

An example of data that matches the terms "data", "information", and "knowledge" have specific meanings. With regard to a customer satisfaction application used in the automobile industry Is:

c. reports that summarize ratings for a specific dealership including a calculation of the average rating across all survey questions and a calculation of summary statistics for groups of questions that correspond to important dimensions such as dealership staff, satisfaction with product, quality of service and so on.

Explanation:

a. is incorrect because we are talking about the intrinsic or abstract concept of data or information instead of the competence to apply all of this knowledge to perform a task. So it is incorrect.

b. It is incorrect because like in the case before we are talking about the intrinsic meaning of data not about the process to gather it.

d. this could have been right, however, it is incorrect because data or information has many ways to be obtained not just one.

Therefore, c is the correct answer because it describes the intrinsic concept of data and how it is identified in the context.

According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Speaking Dyadic Communication Group Communication Interpersonal Communication Dyadic Communication AND Interpersonal Communication

Answers

Answer:

The Last option: Dyadic Communication AND Interpersonal Communication

is the correct one.

Explanation:

Communication can be defined as the process in which one may convey his thoughts or inquires about things.

There are many types of communications as listed above.

Intrapersonal CommunicationInterpersonal CommunicationDyadic CommunicationSmall Group CommunicationPublic CommunicationMass CommunicationOrganizational Communication Intercultural Communication.

Under all these, Interpersonal communication and Dyadic communication are the ones that are between two people.

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

I hope it will help you!

Answer:

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

A small company has developed a specialized software product that it configures specially for each customer. New customers usually have specific requirements to be incorporated into their system, and they pay for these to be developed and integrated with the product. The software company has an opportunity to bid for a new contract, which would more than double its customer base. The new customer wishes to have some involvement in the configuration of the system. Explain why, in these circumstances, it might be a good idea for the company owning the software to make it open source.

Answers

Answer:

It would be good for the company to make the item open source since it lessens the progression costs and attempts.

If turned into open source then the code would be available to the customers and are they could to take off upgrades and modify it to their own specific needs. It reduces the company's efforts, satisfies the customers whilts including them.

Open sourcing the software could facilitate better customization for new customers, distribute development efforts, foster innovation, build a supportive community, enhance trust, expand the market, and create strategic partnerships. These advantages could help the company successfully manage the increased customer base and meet the specific needs of the new contract.

In these circumstances, making the software open source could be a beneficial strategy for several reasons:

Enhanced Customization and Flexibility:

Allowing the new customer to have involvement in the configuration of the system could be more easily facilitated if the software is open source. The customer can directly access and modify the source code to tailor the software to their specific needs. This could lead to higher customer satisfaction as their unique requirements are met more efficiently.

Shared Development Efforts:

By making the software open-source, the company can leverage the development resources and expertise of its new and existing customers. These customers can contribute improvements, new features, or bug fixes back to the software, enhancing its overall quality and functionality without the company bearing the full development cost.

Faster Innovation:

Open-source projects benefit from the collective innovation of a larger community. With more users and developers involved, new ideas and improvements can be implemented faster, keeping the software competitive and up-to-date.

Building a Community:

Open-source software can help create a community of users and developers who are invested in the success of the software. This community can provide support, share best practices, and contribute to the software's growth, which can be particularly valuable for a small company looking to expand its customer base.

Increased Trust and Transparency:

Potential customers may be more inclined to choose an open-source solution because of its transparency. They can review the code to ensure it meets their security and quality standards. This can be especially important for new customers who wish to be involved in the configuration process.

Market Expansion:

Making the software open-source can attract more users and potential customers who prefer open-source solutions. This could lead to additional revenue streams, such as offering paid support, custom development services, or premium features on top of the open-source base.

Strategic Partnerships:

Open-sourcing the software can open doors to partnerships with other companies, developers, and organizations that might be interested in contributing to or using the software. These partnerships can provide additional resources and opportunities for growth.

During class, your professor mentions an interesting article about Obama's networking in Iowa. From the Library homepage's list of Articles Indexes and Databases (Links to an external site.), find the Sociological Abstracts index and search it using these terms: presidential networking and Iowa to locate an article published in Feb 2010.

Subject terms are useful for finding similar articles on your topic. Which one of the following is a subject term used for this article? (Remember - if you are off-campus you may need to login to the index with your NetID).
internet T/F

Answers

Answer:

True.

Explanation:

At the time of attending the class, the professor discusses an informative article regarding Iowa's networking with Obama. From those in the collection of Publications Indexes and Databases (References to an external site) of it's Libraries webpage, identify and scan the Sociological Analyses index using such terms: Political networking and Iowa to identify an article in Feb 2010.

Thus, topic words are helpful to identify related articles on the topic for students. Internet is the reference used for this article.

Data represent real-world things including raw facts such as audio and video data. Group of answer choices True False

Answers

Answer:

The answer is "False".

Explanation:

Digital information is the abstract, deterministic expression of information or functions, in information theory and systems engineering. This refers to data being collected, which is processed and transmitted.

It is most frequently used in computer science and electronics, especially in which real-world data is transformed into binary numbered form as in photography and audio, that's why the given statement is false.

What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, for instance, by tailoring its website to individuals or groups based on profile information?

Answers

Answer:

Personalization

Explanation:

Recommendation systems are becoming a powerful tool in our times today, from only shopping to healthcare provision. One major aspect of Recommender systems is Personalization.

Personalization is a concept of adjusting a service or product to greatly suit the customer. Personalization can be drawn by the information provided by the individual such as location, gender, marital status, etc. or drawn from other inferences retrieved from the customer, such as:

the most clicked service category of a customer, customer browsing patterns or services or products previously obtained by a customer.

These inferences retrieved from customers can greatly improve customer satisfaction and get them drawn to the system.

Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array. (Assume the line may contain whitespace characters and the total number of the characters in the line is less than 50)

Answers

Answer:

Following are the statement in the C++ Programming Language.

//set character data type variable

char line[50];

//get character input from the user

cin.get(line, 50);

Explanation:

Following are the description of the statement.

In the above statement, we set character data type array variable that is 'line' and its index value is '50' that means the following variable not contain more than 50 character elements. In the other line, we get character type input in the following variable 'line' from the user through the get() method.

Final answer:

To read a line of console input into a char array named line of size 50 in C++, use 'char line[50];' to declare the array and 'std::cin.getline(line, 50);' to read the input, including whitespaces.

Explanation:

To declare a char array named line of size 50 in C++ and read a line of console input that may contain whitespace characters into this array, you can use the following code snippet:

char line[50];
std::cin.getline(line, 50);

Here, cin.getline is a function that reads characters from the standard input stream (cin) into the line array until a newline character is encountered or the maximum length of the array is reached, which is specified as 50 characters in this case. Notice that this reads the entire line, including any whitespace, such as spaces or tabs, and stops reading once it hits the limit or encounters a newline character, which is the end-of-line indicator.

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

Answers

Answer:

The correct answer to the following question will be "CAPTCHA".

Explanation:

This CAPTCHA technology, an abbreviation for the Completely Automated Public Thought experiment to tell Humans and Computers system Apart.A CAPTCHA is typically a blurred image on a similarly warped or multi-colored backdrop, with a sequence of distorted characters.

Therefore, CAPTCHA is the right answer.

As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. Immediately after, your cell phone rings, again disturbing the flow of conversation. Both of these are instances of:

Answers

Answer:

Interference.

Explanation:

As the user is communicating with their friend through the mobile, most of their interaction is interrupted by the noise of an airplane flying at low hight. Instantly afterward, the user's mobile phone rang, disrupting the communication once more.  

So, according to the following scenario both of those are examples of interference.

Final answer:

The disruption of the conversation by an airplane and a cell phone ring are examples of physical noise, which includes environmental sounds that interfere with the ability to hear.

Explanation:

The scenario described, where the sound of an airplane flying low and the ringing of a cell phone disrupt a conversation, are instances of physical noise. Physical noise includes various environmental sounds that interfere with hearing.

Examples like construction noise, planes, or loud music nearby can make it difficult to catch what the speaker is saying. In crowded places, where the frequency content of sounds overlaps, masking can also occur, making it hard to hear less intense sounds.

Additionally, unexpected loud noises like a cell phone ringing can capture attention, often referred to as bottom-up attentional capture due to their environmental origin.

A method or system of government for information management or control; an example is the Information Technology Infrastructure Library (ITIL) that we are using as a way to organize our course.
a) true
b) false

Answers

Answer:

The answer is A. True

Explanation:

Information governance is a framework or methodology of the government for information control and management.

ITIL (Information Technology Infrastructure Library) is an example of information governance, it was developed by the Central Computer and Telecommunications Agency (CCTA) of the British government. It has gone through various revisions and currently possesses five books, at first it contained more than 30 books.

What are two ways Google Ads can fuel your business goals?
A. Reach more users by placing ads on all search engines.
B. Get more of the right people to visit your website.
C. Enable premium membership subscriptions.
D. Increase online, in-app, in-person, and over-the-phone sales.
E. Cap the number of ads you pay for, based on your business.

Answers

Answer:

B. Get more of the right people to visit your website.

D. Increase online, in-app, in-person, and over-the-phone sales.

Explanation:

Google ads or adsense is a google advertising platform for organisations or individuals with the intent to advertise their products and services on the internet on a wide range of websites, with a limited subscription of video content, product listing and installed application for web users advertising services.

It uses data analytics and search engine optimization to determine the right users to advertise the products to and also increase online and in-application advertisement, and in-person and over-the-phone sales and advertisement.

A junior security analyst is working on a new ticketing system called ITCustomers. Now and is working in a new field within the tickets dealing with human mistakes as security incidents. A business executive, while traveling, was surfing a gambling site on his laptop at the airport and downloaded a virus that infected the company’s e-mail system. In filling out the ticket, the junior analyst selected "carelessness with laptops" as the human error. Was the junior analyst’s description of the human mistake on the ticket accurate? Why or why not?

Answers

Answer:

Junior analyst's description isn't right.

Explanation:

"carelessness with laptops" isn't the correct description for the mistake or error, and looks like some physical event occurred like laptop computer getting damaged, because of the error, rather than software virus infection.

A more accurate description would be "not being careful enough while surfing the internet and visiting websites".

After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?

a SME for further investigation
a cyberoperations analyst for help
an alert analyst for further analysis
the SOC manager to ask for other personnel to be assigned

Answers

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

___ is the amount of data that a storage device can move from the storage medium to the computer per second.

Answers

Answer:

The answer is "data transfer rate".

Explanation:

The rate of information transfer is the sum of digital information, that travels from one destination to another at a particular time. This can also be viewed as transportation frequency from one place to another one of a given quantity of information. It is the processing power of the larger and specified map, which significantly lowers the data transfer rate.

jcm 100A _____________ is an object that functions as a part of the set or as a tool used by the actors. A. two-shot B. flag C. prop D. dolly E. All of the options are correct.

Answers

Answer:

The answer is "Option C"

Explanation:

The property master is a genius proprietor, it will be directly to blame for the purchase, acquisition, development, correct setting and/or supervision of every support necessary to processing in a film, tv, and movies production, and certain option were wrong, which can be described follows:  

In option A,  It is wrong, because it is a continuous short, that is taken in the same sets, In option B,  It is a device, which is used in the motion picture.  In option D, It is a wheel cart camera, that is used in the shooting, that's why it is wrong.

"Which of the following is not an example of a project? Select one: a. Creating a website for a company b. Raising money for a disaster relief trip c. Starting-up a restaurant d. Emptying the recycling everyday"

Answers

Answer:

d. Emptying the recycling every day"

Explanation:

Stages of a project:

Definition, Initiation (Identify key Stakeholders, Formally authorize Project, Kick-off Project)Planning (Plan Project Leadership, Assemble Project team, Cost).Execution - Monitoring & Control (Direct and Manage Project work, monitor progress, lead project).Closure (Deliver the Scope, Document Lessons Learned, Release Project Team and Close Project).

The option that is not an example of a project is Emptying the recycling every day"

What is a project?

A project  can be regarded as an undertaking that is been carried out collaboratively or by someone to achieve a purpose.

This could be possibly involving research or design, and other process.

Learn more about project at;

https://brainly.com/question/16934135

Other Questions
Indicate whether the information makes sense or not.Un curso duro es muy fcil.a) sib) no I gotta write these in singular and plural form form "Sally is a real estate broker. Among her acquaintances is a motel clerk named Tom who gives Sally the names of people moving to town. In exchange Sally pays Tom a stipend for the names. Tom does not hold a real estate license. Is this a legal practice? A function is defined as {(0, 1), (2, 3), (5, 8), (7, 2)}. Isaac is asked to create one more ordered pair for the function. Which ordered pair can he add to the set to keep it a function? (1) (0, 2) (4) (1, 3) (3) (7, 0) (2) (5, 3) Uranium hexaflouride (UF6) has a triple point at (T, p) = (337 K,152 kPa). Suppose you have a (gaseous) sample of UF6 at atmospheric pressure and room temperature. If you keep cooling your sample, will it undergo a phase transition from gas liquid or from gas solid? Suppose Natasha currently makes $50,000 per year working as a manager at a cable TV company. She then develops two possible entrepreneurial business opportunities. In one, she will quit her job to start an organic soap company. In the other, she will try to develop an Internet-based competitor to the local cable company. For the soap-making opportunity, she anticipates annual revenue of $465,000 and costs for the necessary land, labor, and capital of $395,000 per year. For the Internet opportunity, she anticipates costs for land, labor, and capital of $3,250,000 per year as compared to revenues of $3,275,000 per year. (a) Should she quit her current job to become an entrepreneur? (b) If she does quit her current job, which opportunity would she pursue? If it is 8:50 a.m., what will the time be 4 hours and 20 minutes later? One of the major challenges of supply chain management is forward buying. maintaining the visibility of inventory at acceptable levels at all times. building safety-stock inventory storage bins. pushing inventory back to vendors. Match each term with the correct part of the graph. Demand curve: Supply curve: Equilibrium point: Claire is buying a new bicycle for $295. If thesales tax is 4.75%, what will she pay in total? the length of a rectangle is 3 yards more than twice the width x the area is 629 yd. Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point of Sale (POS) terminal and cashier collect from you and what pieces of data about the transaction did the POS terminal pull from a database to complete the sale? In addition to the data collected and retrieved what information was generated by the POS terminal at the end of the order, as it is being completed?Identify the following parts of a common grocery store transaction as data, information, or knowledge.1. An item's UPC number 2. Change back to customer 3. General changes to demand in different seasons 4. Cost each Data 5. Quantity purchased 6. Non-taxable total 7. Extended cost (quantity times cost each) 8. Amount tendered 9. Sales of an item for the last week 10. Upcoming holidays and customer's special needs 11. How paid (cash, charge card, debit card) 12. Shopper loyalty card number 13. Taxable total What is the equation of the line passing through the point (-3,1) that is perpendicular to the line 2x+y=0 Based on the passage, what does subgenre mean? Use the following recursive formula to answer the question.a1=3/2an=an1+1/2What is a9? A piece of wire 40 cm long is cut into two piece, each to be bent to make a square.The length of a side of one square is to be 4 longer than length of a side of the other. How should the wire be cut What is the requirement for an applicant who desires to begin the process to become a U.S. missionary? suppose you borrowed $112,500 at 5 1/2 % interest on June 10 for 72 days. your bank uses the exact interest method. Determine the amount of interest on the loan? What is chief Joseph (sorrowful) about? Why An article in this morning's issue of the State City Times describes an initiative to build new sidewalks and bicycle paths to improve residents' "physical and mental health and well-being." The initiative is MOST likely to require the professional advice of a _____ psychologist.