Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. Storage c. Retention d. Protection

Answers

Answer 1

Answer:

b. Storage

Explanation:

The Generally Accepted Record keeping Principles are a guideline that has been created for managing records in such a way that it supports the firm's  immediate and future regulatory, legal, risk mitigation, environmental and operational requirements. There are 8 different principles in this guideline and those are the principle of Accountability , Transparency, Integrity, Protection, Compliance, Availability, Retention, and Disposition. Therefore the one answer that is not a principle is Storage.


Related Questions

Which statement is true about conservation versus preservation? Conservation favors hunters. Conservation does not allow natural resources to be used. Preservation favors hunters. Preservation allows natural resources to be used.

Answers

Answer:

Preservation allows natural resources to be used.

Explanation:

Conservation means the prevention of wasteful use of some resources, and preservation means the act of preserving something. And that confirms all options mentioned are wrong except the option that states that preservation allows natural resources to be used. And hence, this is the right option for this question. We can certainly use natural resources through preservation.

Conservation favors hunter is a true statement about conservation vs preservation.

In recent years, caring for the environment has become relevant around the world, so environmentalists and governments propose the conservation and preservation of  the environment in general.

However, it is pertinent to clarify the difference between these two concepts.

Conserve means taking advantage of nature in different ways and maintaining it from time to time, an example of this is hunting seasons, in which at some times the hunting of animals is allowed and at other times it is radically suspended.Preserve refers to the constant maintenance of nature without significantly altering it. That is to say, it cannot be intervened, an example of this is the area's declared protected.

According to the above, the correct answer is A. Conservation favors hunters because conservation allows human intervention as long as it is "repaired" later.

Learn more in: https://brainly.com/question/8951472

What process involves the changing of a program's internal structure without changing the way the program works?

Answers

Answer:

Code Refactoring

Explanation: Code Refactoring is

A systematic process of improving a code without changing its functionality. It can be used to change a "mess" into a clean code.

Refactoring is the process of restructuring an existing computer code, changing the factoring without changing its external behavior. It is intended to improve nonfunctional attributes of the software it is expected to achieve this by continuously improving the design of code, hence making it easier and easier to work with.

Therefore the process of "changing of a program's internal structure without changing the way the program works" Is Code Refactoring.

Item 19 A student pushes a box across a rough horizontal floor. If the amount of work done by the student on the box is 100 J and the amount of energy dissipated by friction is 40 J, what is the change in kinetic energy of the box

Answers

Answer:

60 J

Explanation:

Given,

Work done to push the box = 100 J

Energy dissipated by friction = 40 J.

According to work energy theorem work done is equal to change in kinetic energy.

Change in Kinetic energy = Work done by student + Work done by friction

Change in Kinetic energy = 100 J - 40 J

Work done by the friction will be negative because it will act in opposite direction of force applied.

Change in Kinetic energy = 60 J

Anna has designed an iOS app for a large shopping mall. She creates a location facility that includes a map of the actual mall. Shoppers can double tap on any part of the map to get a popover that lists the names of goods selling in that area. Which pattern of interaction design is Anna using?

Answers

Anna's iOS app for the mall uses an event-driven interaction design pattern that leverages dynamic maps to provide shoppers with information about goods available in different mall areas they interact with. This design provides a structured navigation experience, making use of modern GPS functionalities.

Anna is using an interaction design pattern in her iOS app for a large shopping mall. Specifically, when shoppers double-tap on any part of the integrated mall map, they receive a popover that lists items for sale in that area. This design pattern is known as event-driven responses, where the system reacts to user actions, and in this case, provides useful information based on the location within the app. This pattern enables a useful organization by focusing on the importance of location and is an example of how dynamic maps facilitate user interaction by allowing the customization of visible information.

The design leverages modern GPS functionality to provide location-sharing capabilities, enhancing the shopping experience by helping users navigate the physical space of the mall more effectively. Unlike static hardcopy maps, this dynamic map encourages user interaction, allowing users to change the scale, and visible area or even select specific features of the map, much like how spatial questions are answered with GIS overlaying pertinent information.

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problema. patch
b. bot
c.logic bomb
d.Trojan horse

Answers

Answer:

Option A i.e., Patch.

Explanation:

The effective intrusion towards the data system is sometimes related to inadequate layout or execution of the system. Upon discovery of this flaw, application designers rapidly construct and release a patch to solve the issue.

A patch seems to be the series of improvements intended to modify, resolve or enhance a system program or even its associated information. It requires resolving protection problems as well as other defects, known patch corrections or bugfixes, and enhancing the accessibility, reliability, or efficiency of these patches.

what is the sentinel value in the following code snippet?
public static void main(String[] args)
{
int age = 0;
int sum_of_ages = 0;
int stop = 1;
Scanner reader = new Scanner(System.in);
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
while (age != -1)
{
sum_of_ages = sum_of_ages + age;
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
}
System.out.println("Sum of ages " + sum_of_ages);
return 0;
}

Answers

The answer to the problem is 5

The sentinel value in the following code snippet is 1.

What is sentinel value?

An algorithm that uses the presence of a sentinel value as a condition for termination, generally in a loop or recursive algorithm, is known as a sentinel value in computer programming.

For instance, the number "-1" can be used as the sentinel value in a loop algorithm that computes non-negative integers because the computation will never encounter that value as a valid processing output. Also known as a signal value or a flag value.

A while loop can also be used as a sentinel loop. Until it encounters a certain value that indicates the end, a sentinel loop keeps processing data. The sentinel is the name of the exceptional value. For the sentinel, any value is possible.

Therefore, in the following line of code, the sentinel value is set to 1.

To learn more about sentinel value, refer to the link:

https://brainly.com/question/28541937

#SPJ5

__________ refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

Answers

I think it is good for the environment

How should an administrator test the functionality of DNS operation on a domain controller, as well as troubleshoot issues with DNS forwarders, delegation, dynamic updates, and record registration?

Answers

Answer:

Using dcdiag /test:dns

Explanation:

Using dcdiag / test: dns, the admin can check certain performance of the following controller's DNS service and also troubleshooting concerns including DNS forwarders, relocation, dynamic notifications and authentication. So, the following answer is correct according to the given statement.

Antoinette wants all her worksheets to have the same formatting for text, colors, and graphical effects applied to create a specific look and feel. Antoinette needs to apply a _____.

Answers

Answer:

Theme is the correct answer of this question.

Explanation:

To create a similar look and feel, Antoinette requires all her worksheets to have the same formatting applied for text, colors and graphical effects. Antoinette has a theme to apply.

A theme in computing is a default package that comprises details of the design appearance.A theme typically consists of a collection of images and colors in the screen layout and display for the visual function elements.These are used to optimize the design and sound of a machine component.

You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send packet #1 from 00:11:22:33:44:55 to 66:77:88:99:00:11 which arrives at port 1 of your switch. Next, packet #2 is sent from 22:33:44:55:66 to 00:11:22:33:44:55 which arrives at port 3 of your switch. Which of the following are true?
1. Packet #1 is broadcast on all ports
2. After the first packet is received, the switch associates 66:77:88:99:00:11 with port 1
3. Packet #2 is only sent out on port 1
4. Packet #2 is sent out on ports 1, 2, 4

Answers

Answer:

Option 2 is correct.

Explanation:

When the user recently switched over that port Ethernet device, which is, no addresses have yet been acquired as well as a client has been linked on each port. He sends #1 packet from 00:11:22:33:44:55 to 66:77:88:99:00:11 arriving at the device's port 1. Next packet #2 is transmitted between 22:33:44:55:66 to 00:11:22:33:44:55 that appears at the switch's port 3.

So that the Package # 2 will be sent only through port 1 by the user who switched over the network.

Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires:______.1. P1 requests tape drive 1 and gets it.2. P1 requests tape drive 2 but it is blocked.3. P2 requests tape drive 1 but it is blocked. A. Pl requests drive 2. B. P2 requests drive 2 and gets it. C. P2 requests drive I but is blocked. D. Pl releases drive 1.

Answers

Answer:

b. P2 requests drive 2 and gets it.

Explanation:

Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they’re allocated on an "as requested" basis. Soon the following sequence transpires: P2 requests drive 2 and gets it.

The following HTML form passes a value to sleepy-time.php with the name sleepHours. Which PHP statement would correctly receive this value and assign it to a PHP variable named $sleepHours?

How many hours do you sleep each night:

Answers

Answer:

$sleepHours = $_POST['sleepHours'];

Explanation:

The following HTML form passes a value to sleepyTime.php with the name sleepHours. Which PHP statement would correctly receive this value and assign it to a PHP variable named $sleepHours?

<form action = "sleepyTime.php" method = "post">

<p>How many hours do you sleep each night:

<input type = "text" size = "20" name = "sleepHours">

</p>

<input type = "submit" value = "Can I sleep now?">

</form>

In PHP, the $_POST statement is a superglobal variable that is used to collect values from HTML forms.  It is this $sleepHours = $_POST['sleepHours']; statement that will correctly receive the value and assign it to a PHP variable named $sleepHours.

Consider a scenario in which Host A wants to simultaneously send packets to Hosts B and C. A is connected to B and C via a broadcast channel—a packet sent by A is carried by the channel to both B and C. Suppose that the broadcast channel connecting A, B, and C can independently lose and corrupt packets (and so, for example, a packet sent from A might be correctly received by B, but not by C). Design a stop-and-wait-like error-control protocol for reliably transferring packets from A to B and C, such that A will not get new data from the upper layer

Answers

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Anyway, after getting acknowledgment from B, C and D will A immediately send a package here. So that we can establish a procedure whereby A must wait until all three acknowledgments are provided.

Start waiting for the specified scenario or situation:

⇒ For sender (sender is A here):

Keep the following steps repeated before all packets are shipped out.

Step 1 : Place in the broadcast network a fresh packet and configure the wait bit= 1 and the ack bits= 000 and begin the timer (t=0). While bit allows while for the sender(A) to deliver the next packet. Ack parts will hold the earned acknowledgments until now. When first bit= 1 then ack obtained from B, if second bit= 1 then ack obtained from B and instead ack collected from D if the last bit= 1.Step 2 : Once sender(A) receives a new acknowledgment, change the ack bits through generating the resulting bit= 1.Step 3 : Test if bits of the ack = 111 otherwise render a bit of wait = 0. Go so far as to step 1 and proceed to step 2.Step 4 : Whether A has been waiting for t= t0 time and therefore not gotten at least one ack, then place a certain packet on the channel and make t=0, ack bits= 000 and start preparing bit= 1. Then move forward with step 2.

⇒ For receiver (receiver are B, C and C here):

Step 1 : Wait for another package.Step 2 : On delivery of the new document, send ack to the provider and begin countdown t = 0.Step 3 : When no latest packet arrives in t= t0 time then give the existing packet acknowledgment again. As it indicates the channel ack may be missing.Step 4 : Taking a move to 1.

Final answer:

For reliable packet transfer from Host A to Hosts B and C via a broadcast channel, a stop-and-wait-like error-control protocol with redundancy, error detection, and acknowledgment mechanisms is used. Host A sends a packet, waits for acknowledgments from both B and C, and resends to only those hosts that did not acknowledge, using sequence numbers to track packets.

Explanation:

In a scenario where Host A must send packets to Hosts B and C through a broadcast channel that can lose and corrupt packets, a stop-and-wait-like error-control protocol would require mechanisms for error detection and recovery. In this protocol, A sends a packet to both B and C and waits for an acknowledgment from both before sending the next packet. If A receives an acknowledgment from B but not from C, it only needs to resend the packet to C. Each packet contains sequence numbers to ensure that if a packet has to be resent, the receivers can distinguish the new packet from any previous ones. Furthermore, implementing redundancy, such as sending multiple copies or additional data for error checking (like checksums or CRC codes), enhances the reliability of the transmission.

To address potential eavesdropping and signal corruption, techniques borrowed from quantum communications, such as monitoring error rates and confirming key bits over an open channel, could theoretically be employed to enhance security in the digital communication domain. This would, however, be a more complex and less practical solution for a simple broadcast problem. The primary focus in error-control protocols for a broadcast channel is ensuring packet integrity and correctly acknowledging receipt.

The concept of 'spooky action at a distance' as mentioned in the question context may be a metaphor comparing quantum entanglement where information seems to be shared instantaneously over distances, which is not directly applicable to the design of a reliable error-control protocol for a broadcast channel in digital communications.

When federal courts are evaluating digital evidence from computer-generated records, what exception is applied to hearsay?'

Answers

Answer:

Business-records exception

Explanation:

The Business-records exception which is also known as the Business Entry Rule, this is an exception to the evidentiary rule (which rules out hearsay from a trial) that permits business records to be admitted if the appropriate foundation is laid to show the document is dependable and can be relied upon.

SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendors v JOIN invoices i ON v.vendor_id = i.vendor_id WHERE invoice_total - payment_total - credit_total > (SELECT AVG(invoice_total - payment_total - credit_total) FROM invoices) GROUP BY vendor_name ORDER BY balance_due DESC (Please refer to the code example above.) When this query is executed, the rows will be sorted by:________.a. balance_due in descending sequence b. invoice_id c. vendor_id

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The above question asked about the order of the result which is derived from the above query. The above query holds an order by clause in desc order which is used to produce the result in descending order.The descending order result is produced on the behalf of balance_due attributes and the option a also states the same. Hence option a is correct while the other is not because:-Other is not states that the result is produced on the behalf of descending order.

Answer:a

Explanation:

Local-area network (LAN) A It interconnects locations scattered throughout a metropolitan area. 2 Wide-area network (WAN) B It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus. 3 Metropolitan-area network (MAN) C It interconnects network components within a local region. 4 Personal-area network (PAN) D It interconnects network components that are geographically dispersed between two locations.

Answers

Answer:

Local-area network (LAN - It interconnects network components within a local region

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

Explanation:

Local-area network (LAN - It interconnects network components within a local region, it is smaller compared to a WAN

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.it uses routers to link between the geographical locations

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to standard output the square of the variable's value.

Answers

Answer:

#include <iostream>

using namespace std;

int main ()

{

int num;

cin>>num;

cout << num<< " " << 2 num << " " << numnum;

return 0;

}

Explanation:

See answer

What specific record type is found in every zone and contains information that identifies the server primarily responsible for the zone as well as some operational properties for the zone?

Answers

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could be modeled by a computer and explain one benefit and one drawback of doing the simulation on a computer instead of real world.

Answers

Answer:

Explanation: one scenario that can be modeled by computer simulation is weather forecasting like the possibility of it to rain in the next few days

Main advantages of simulation

Study the behavior of a system without building it

Main disadvantages of simulation include:

Expensive to build a simulation model.

Modeling disease spread via computer simulations allows rapid scenario testing. Benefit: Efficient evaluation of interventions. Drawback: Potential inaccuracies due to simplified assumptions.

Imagine modeling the spread of a contagious disease like COVID-19 using computer simulations. A benefit of using computer models is the ability to quickly test various scenarios (e.g., different levels of vaccination, social distancing measures) in a controlled environment. This can provide insights into which interventions are most effective without the time and cost associated with real-world trials.

However, a drawback is the potential for inaccuracies if the model does not accurately reflect real-world complexities. Factors such as human behavior, which can significantly impact disease transmission, may be difficult to simulate accurately. Moreover, unforeseen variables or interactions may not be accounted for, leading to misleading results.

In conclusion, while computer simulations offer speed and flexibility in testing hypotheses, ensuring their accuracy and reliability in representing real-world dynamics is crucial to deriving meaningful insights and making informed decisions.

please help asap
Compare and contrast if-else and elif statements. Give examples.
What are the relational operators? How are they used?

Answers

Answer:

a. Comparison of if-else and elif:

if else follow as:

If (Condition)

{

In case if condition true, expression in this section executes

}

else

{

In case condition is false, expression in this section executes

}

elif Statement follows as:

If (Condition)

{

In case if condition true, expression in this section executes

}

{

in case, condition is false, move to elif block

elif (Condition)

{

In case elif condition true, expression in this section executes

}

else

{

In case elif condition is false, expression in this section executes

}

}

Explanation:

In if else, program first check the condition in "if statement", if condition is true it move into the body of "if " and execute the expression. If the condition is false it moves to the body of "else" and execute the expression.

elif is another block of condition in If else condition,It works as in "if statement" if the condition is true the program executes the expression of body of "if body". If the condition is false, it moves to another block of "elif", where it again check some other condition found in "elif statement". If the condition of "elif statement" is true it executes the expression of "elif body" otherwise in case of false condition it execute the expression in "else body".

It follows as: if - elif-else

Answer

b. the relational operators

Relation operators are the operators that are need in the expression to establish relationship between different operands of the expression.

Explanation:

In few expressions, their are some operators used to establish or show the relationship between different operands. These operator could be Equal (=), Greater than(>), Less than (<), Greater than equal to (>=) and Less than Equal to (<=).

These operators can be used in conditional statements that are used to check the relationship between operands and values through these operators.

Example

if (a>5)

{

if value of is greater than 5 then body of if will execute.

}

else

{

If value of a is less or equal to 5, this section will execute.

}

Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have sufficient capacity for future needs?" and "Will the hardware and software environment be reliable?"
a. schedule feasibility
b. technical feasibility
c. economic feasibility
d. operational feasibility

Answers

Answer:

technical feasibility

Explanation:

This is the process of validating the technology assumptions, architecture and design of a product or project. A technical feasibility study shows the details of how you intend to deliver a product or service to customers. Puts into consideration the following :

materials, labor, transportation, where your business will be located, and the technology that will be necessary to bring all this together.

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

Answers

Answer:

/var/log

Explanation:

The /var/log location identifies the location to view the log file.

Records of usage of a particular OS or software can be viewed in the log file. They usually provide a detailed view of the events of an application or system.

Log files usually provide a massive guide for troubleshooting a service, application or OS. Due to the possibility of a service or application to generate log files, these come in handy when a service malfunction, because it contains detailed information about the events of that service or application.

A computer file that contained high-resolution, scaled images of hundreds of individual plants from a recently surveyed island, but no other information about the plants, might allow you to separate the plants into species using which species concept

Answers

Answer: Morphological

Explanation: Morphology in biology is the study of organisms using just their form and structure. It is the form and structure of an organism.

Morphological Grouping allows you to use the size, shape, and structure of an organism or one of its parts to know the specie that organism belongs to. Using traditional systems of taxonomy, classifications can be based on the morphological characteristics of organism, and from the question the characteristics of the plants which can be are clearly captured with high resolution computer can be used to group the plants into species using the morphological concept.

In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. grid quantum hybrid cloud private cloud scalable

Answers

Answer: hybrid cloud

The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses within a specified time range is called the __________.

Answers

Answer:

Loss Frequency is the correct answer of this question.

Explanation:

Calculating the probability of an event combined with the frequency of the attack to calculate the estimated number of losses within a given time period is called the loss frequency.

Occurrence of losses is how often there will be losses. The incidence of losses is used to assess the probability of similar future losses.If the risk of property damage or ability to perform is unlikely to occur or evolve in the future, you would have low frequency of losses.

For Example:- Loss level for exposure to groundwater if your company is in a wetland is probably high.

A researcher plans to identify each participant in a certain medical experiment with a code consisting of either a single letter or a pair of distinct letters written in alphabetical order. What is the least number of letters that can be used if there are 12 participants, and each participant is to receive a different code?

Answers

Answer:

5 Letters

Explanation:

So we need 12 distinct codes made of a single letter or a pair of letters.

What would be the least number of letters?

Lets try with 3 letters A, B and C

The possible combinations are: A, B, C, AB, AC, BC

These are 6 codes and we need 12 so lets try more A, B, C and D

The possible combinations are: A, B, C, D, AB, AC, AD, BC, BD, CD

These are 10 codes and we need 12 so lets try more A, B, C, D and E

The possible combinations are:

A, B, C, D, E, AB, AC, AD, AE, BC, BD, BE, CD, CE, DE

Finally we got 15 distinct codes which are more than 12 so the least number of letters needed are 5.

Using formula:

Four letters = 4C1 + 4C2 = 4 + 6 = 10

Five letters = 5C1 + 5C2 = 5 + 10 = 15

Which of the following statements is true of a server? Question 18 options: A) It supports processing requests from remote computers. B) It provides access only for one user at a time. C) It stores the results of computations in the main memory. D) It creates a backup of all information within a system.

Answers

Answer:

Option (A) is the correct answer of this question.

Explanation:

The server supports the processing requests from the remote computers. A system is a device built to accommodate inquiries from many other external systems and customers to execute transactions. Employees are called private computer ,tablets, including phones which connect websites.

Network resources are handled through servers.The server is a software application or tool providing a service to some other software program and its customer, also identified as those of the user.

Other options are incorrect because they are not related to the given scenario.

Option A is correct, It supports processing requests from remote computers.

A server is a computer or system that is designed to provide services or resources to other computers or users on a network.

It handles requests and provides services such as file storage, data processing, hosting websites, email services, and more.

These requests can come from remote computers or clients connected to the network, and the server is responsible for processing and responding to those requests.

To learn more on Server click:

https://brainly.com/question/32909524

#SPJ6

Which of the following differentiates grid computing from cloud computing? Grid computing is a natural evolution of the widespread adoption of virtualization and utility computing. Grid computing uses a large number of computers. Grid computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Grid computing involves over-the-Internet provision of dynamically scalable and often virtualized resources. Grid computing is applied to a single large problem.

Answers

Answer:

Grid computing is applied to a single large problem.

Explanation:

In grid computing, resources are used in collaborative pattern and also in grid computing, the users do not pay for use.

In cloud computing, resources are used in centralized pattern. While in grid computing, resources are used in collaborative pattern usually to solve a single large problem.

Cheers

Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats that she can leverage. What are the two main ad formats used in a Standard Display campaign?A. Text ads.B. Responsive Display ads.C. Call-only ads.D. In-stream video ads.E. Uploaded ads (Image & AMPHTML).

Answers

Answer: B and E

Responsive display ads and uploaded image ads

Explanation:

A responsive display ad is an advert that can automatically adjust its size and format to suits any available ad space. Responsive display ads are the default ad type for the Google Display Network.

While the uploaded image ads AMPHTML (Accelerated Mobile Pages) is just perfect for mobile devices as it loads faster than other type of ads.

Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud. When Paul turns his computer back on, it starts to boot and then shuts off again.What is a possible problem with Paul’s computer?

Answers

Answer:

there is a lot of heat in his computer he should let the computer rest for some time and then use it again

Other Questions
The piece of writing doesn't change if the topic or audience changes; the writer is in total control.TrueFalsePLEASE HELP HURRY The dimensions of a closed rectangular box are measured x, y and z as 100 cm, 70 cm, and 30 cm, respectively, with a possible error of 0.2 cm in each dimension. The surface area and the volume of the box is given by the equations S(x, y, z) = 2xy + 2xz + 2yz, V(x, y, z) = xyz Find the linear approximation of S at the point (96, 69, 29). b. Suppose the box has been measured with a ruler that has one centimeter gradation, find the actual maximum error in measuring the surface of the box. c. Find L(101,71,31) -L(100,70,30) d. Use differentials to estimate the error in the measurement of the surface area of the box. e. Compare the answers of parts c to d and the d to b. What do you conclude? f. A coat of paint of thickness 0.0002 cm is applied to the exterior surface of the box. Use differentials to estimate the amount of the paint needed. What was Eisenhower's "covert action policy? How many grams of magnesium are needed to completely reactwith 2.00 mol of O2 in the synthesis reaction that producesmagnesium oxide? Someone helpPlzzz I need an answer At a given temperature, 4.92 atm of Cl2 and 4.65 atm of Br2 are mixed and allowed to come to equilibrium. The equilibrium pressure of BrCl is found to be 1.597 atm. Calculate Kp for the reaction at this temperature. Cl2(g) + Br2(g) 2 BrCl(g). Give answer to 2 decimal places. Jack inherited a perpetuity-due, with annual payments of 15,000. He immediately exchanged the perpetuity for a 25-year annuity-due having the same present value. The annuity-due has annual payments of X. All the present values are based on an annual effective interest rate of 10% for the first 10 years and 8% thereafter. Calculate X. Which words are precise adjectives? Check all that apply.hidingmoistsweatercheckerboardredsee A shoe factory produces 20 units of output. Its average fixed cost (AFC) = $25, average total cost (ATC) = $35, and marginal cost (MC) = $15. The shoe factories average variable cost (AVC) is ________. Please hurry its urgent Blocks A (mass 2.00 kg) and B (mass 6.00 kg) move on a frictionless, horizontal surface. Initially, block B is at rest and block A is moving toward it at 2.00 m/s. The blocks are equipped with ideal spring bumpers. The collision is head-on, so all motion before and after the collision is along a straight line. (a) Find the maximum energy stored in the spring bumpers and the velocity of each block at that time. (b) Find the velocity of each block after they have moved apart. How were people who lived far away from the big cities able to stay up withcurrent fashions and trends? "To-do" lists should be used to __________. A. list yearly goals B. alphabetize items C. prioritize tasks D. set hourly schedules Please select the best answer from the choices provided. A B C D 1. Su inters por las letras y la literatura comenz desde muy pequeo. a. cierto b. falso 2. Fue una persona con muchas pasiones y realiz varios oficios en su vida. a. cierto b. falso 3. Fue conocido como un hombre muy trabajador. a .cierto b. falso 4. Durante gran parte de su vida se identific con la naturaleza. a. cierto b. falso 5. Comenz a escribir libros de carpintera y botnica, y luego escribi poesa. a. cierto b. falso 6. Cuentos de la selva es una coleccin de relatos para nios donde los animales son los protagonistas. a. cierto b. falso After rollercoaster years of success and decline, Apple has found itself once again on top of its game. However, rivals like Microsoft and Google are pushing competitiveness. In fact, many of Apples rivals have the same or similar product offerings. Apple has hired you as a futurist. Help the company continue to diversify its products and maintain strategic competitiveness through new innovations and improved technologies. Through which strategy should Apple pursue its next big hit.a. Unrelated Diversificationb. Related Diversification Operational definitions allow researchers to:______. A. Formulate hypotheses that can be tested during an experiment.B. Avoid the placebo effect in experimental settings.C. Measure the constructs they are interested in.D. Obtain informed consent from participants. Some scientists believe that global warming will bring about extreme weather.Please select the best answer from the choices providedT or F Which structure does a web page normally use to define an area of focus?Many web pages use a ______structure to define an area of focus. A page break can be prevented from being added before or after a heading by using the keyword _____ in the page-break-before or page-break-after properties. ABC Corporation just issued 10-year, $1,000 par value bonds, with a 9% coupon with interest paid annually. The current required rate of return (i.e., YTM) is 7.5%. The current price of the bonds is approximately:_______